Home // CYBER
CYBER 2016, The First International Conference on Cyber-Technologies and Cyber-Systems
Type: conference
Notes: IARIA Conference.
Editors:
Thomas Klemas, SimSpace Corporation, Boston, USA
Rainer Falk, Siemens AG, Germany
ISSN: 2519-8599
ISBN: 978-1-61208-512-8
Location: Venice, Italy
Dates: from October 9, 2016 to October 13, 2016
Articles: there are 13 articles
Network Complexity Models for Automated Cyber Range Security Capability Evaluations
Thomas Klemas and Lee Rossey
keywords: Network; network complexity; network theory, graph theory; degree; connectivity; connectance; centrality; degree centrality; hyper-edge; hypergraph; information theory, eigen decomposition; eigen vector; eigen value; eigen centrality; Bonacich centrality;
Advanced Swarm Imaging for Three-Dimensional Mapping
Martin L. Duncan, Paul D. Weil, and Thomas J. Klemas
keywords: Swarm Imaging; Internet-of-Things; cloud services; digital imaging; mapping; data visualization; high-resolution 3D imaging; Web services; APIs; sensemaking
Cyber Assessor: Assessment Framework to Characterize Cyber Aptitudes
Thomas Klemas
keywords: data analytics; cybersecurity; cybersecurity assessment; risk management; NIST; FFIEC; NERC
Intelligent Data Leak Detection Through Behavioural Analysis
Ricardo Costeira and Henrique Santos
keywords: Anomaly Detection; Machine Learning; Data Mining; Support Vector Machines
Quantifiable Measurement Scheme for Mobile Code Vulnerability Based on Machine-Learned API Features
Hyunki Kim, Joonsang Yoo, and Jeong Hyun Yi
keywords: Android; Vulnerability; Application Assessment
Single Sign-On Webservice with Adaptable Multi Factor Authentication
Sandra Kübler, Christian Rinjes, Anton Wiens, and Michael Massoth
keywords: web-based single sign-on; multi factor authentication; digital identity; security levels
Forensic Analysis of the Recovery of Wickr’s Ephemeral Data on Android Platforms
Thomas Edward Allen Barton and M A Hannan Bin Azhar
keywords: wickr; android; ephemeral messaging; forensic analysis; data sanitization; mobile forensics
Designing An IEC 61850 Based Power Distribution Substation Simulation/Emulation Testbed for Cyber-Physical Security Studies
Eniye Tebekaemi and Duminda Wijesekera
keywords: Cyber Security; Communication Protocols; Simulation Testbed; Cyber-Physical Systems; Smart Grid; Power Substation Automation
Exchanging Database Writes with Modern Crypto
Andreas Happe and Thomas Loruenser
keywords: Internet, Network security, Web services
Experiment of Sensor Fault Tolerance Algorithm combined with Cyber System for Coil Tilter on the Smart Hybrid Powerpack
Jaegwang Lee, Janggeol Nam, Buchun Song, Hyeonwoo Kim, Iksu Choi, and Hunmo Kim
keywords: Coil tilter; Smart Hybrid Powerpack (SHP); Electro Hydraulic Actuator (EHA); fault tolerance; Machine GUI; Office GUI; Mobile GUI.
An Approach for Protecting Privacy in the IoT
George O. M. Yee
keywords: privacy; protection; IoT; policy; compliance
Consideration of Security Threats for Identification System in Internet of Things
Daewon Kim, Jeongnyeo Kim, and Yongsung Jeon
keywords: internet of things, identification, object identifier; security threats
Advanced Device Authentication: Bringing Multi-Factor Authentication and Continuous Authentication to the Internet of Things
Rainer Falk and Steffen Fries
keywords: device authentication; Internet of Things, embedded security, cyber security