Home // CYBER
CYBER 2017, The Second International Conference on Cyber-Technologies and Cyber-Systems
Type: conference
Notes: IARIA Conference.
Editors:
Rainer Falk, Siemens AG, Corporate Technology, Deutschland
Steve Chan, MIT, USA
Juan-Carlos Bennett, SPAWAR Systems Center Pacific, USA
ISSN: 2519-8599
ISBN: 978-1-61208-605-7
Location: Barcelona, Spain
Dates: from November 12, 2017 to November 16, 2017
Articles: there are 15 articles
Secure and User-friendly De-Registration of a Vehicle as Off The Road Using Mobile Authentication with German eID Card and a NFC-enabled Smartphone
Michael Massoth
keywords: mobile authentication; identity management; strong two-factor authentication; high trust level
Torrent Forensics: Are your Files Being Shared in the BitTorrent Network?
Ali Alhazmi, Gabriel Maciá-Fernández, José Camacho, and Saeed Salah
keywords: BitTorrent; P2P; Torrent Forensics
Citizen Sensing for Environmental Risk Communication
Yang Ishigaki, Kenji Tanaka, Yoshinori Matsumoto, Yasuko Yamada Maruo, and Harrizki Arie Pradana
keywords: participatory sensing; AQI (Air Quality Index)
Global information Privacy Infringement index (GPI)
Hyunmin Suh and Myungchul Kim
keywords: information privacy; information privacy infringement; index.
An Investigation on Forensic Opportunities to Recover Evidential Data from Mobile Phones and Personal Computers
Philip Naughton and M A Hannan Bin Azhar
keywords: Digital forensics; data acquisition; messaging applications; mobile phones and PCs
Detecting Safety- and Security-Relevant Programming Defects by Sound Static Analysis
Daniel Kästner, Laurent Mauborgne, and Christian Ferdinand
keywords: static analysis; abstract interpretation; runtime errors; security vulnerabilities; functional safety; cybersecurity
Evaluations of Maximum Distance Achieved Using the Three Stage Multiphoton Protocol at 1550 nm, 1310 nm, and 850 nm
Majed Khodr
keywords: quantum communication; fiber channel; three stage protocol; multi-photon
Enhancing Integrity Protection for Industrial Cyber Physical Systems
Rainer Falk and Steffen Fries
keywords: system integrity, device integrity; cyber physical systems; Internet of Things, embedded security; cyber security
Vaccine: A Block Cipher Method for Masking and Unmasking of Ciphertexts’ Features
Ray R. Hashemi, Amar Rasheed, Jeffrey Young, and Azita A. Bahrami
keywords: Cyber Security; Masking and Unmasking Ciphertext; Variable-Block Cipher Vaccination; Masking Strength
A Study on Introducing Cyber Security Incident Reporting Regulations for Nuclear Facilities
ChaeChang Lee
keywords: Cyber Security; Incident Response; Nuclear Facilities; Reporting Regulation
Improving the Effectiveness of CSIRTs
Maria Bada, Sadie Creese, Michael Goldsmith, and Chris J. Mitchell
keywords: Cybersecurity; CSIRT; Metrics; Effectiveness
On the Alignment of Safety and Security for Autonomous Vehicles
Jin Cui and Giedre Sabaliauskaite
keywords: Autonomous vehicle; Safety; Security; FACT graph; SAE J3016; SAE J3061; ISO 26262
Trends in Building Hardware and Software for Smart Things in Internet of Things
Xing Liu
keywords: Internet of Things; IoT; smart things; smartness; implementation; hardware; software
RF Fingerprinting for 802.15.4 Devices: Combining Convolutional Neural Networks and RF-DNA
Bernard Lebel, Louis N. Bélanger, Mohammad Amin Haji Bagheri Fard, and Jean-Yves Chouinard
keywords: RF-DNA; Wireless Security; Physical Layer; Neural Networks; Machine Learning
Integrating Autonomous Vehicle Safety and Security
Giedre Sabaliauskaite and Jin Cui
keywords: autonomous vehicle; safety; security; ISO 26262; SAE J3016; SAE J3061; Six-Step Model; attack tree; fault tree