Home // CYBER

CYBER 2020, The Fifth International Conference on Cyber-Technologies and Cyber-Systems

Type: conference

Notes: IARIA Conference.

Editors:
Steve Chan, Decision Engineering Analysis Laboratory, USA
Manuela Popescu, IARIA, EU/USA
Khurram Bhatti, Information Technology University (ITU), Lahore, Pakistan
Maria Mushtaq, LIRMM –CNRS, University of Montpellier, France
Xing Liu, Kwantlen Polytechnic University, Surrey, B.C., Canada

ISSN: 2519-8599

ISBN: 978-1-61208-818-1

Location: Nice, France

Dates: from October 25, 2020 to October 29, 2020

Articles: there are 15 articles

PCache: Permutation-based Cache to Counter Eviction-based Cache-based Side-Channel Attacks
Muhammad Asim Mukhtar, Muhammad Khurram Bhatti, and Guy Gogniat
keywords: Cache-based side-channel attacks, Randomization, Prime+Probe attack

Efficient AES Implementation for Better Resource Usage and Performance of IoTs
Umer Farooq, Maria Mushtaq, and Muhammad Khurram Bhatti
keywords: Cryptography, Embedded Security, AES

Challenges of Using Performance Counters in Security Against Side-Channel Leakage
Maria Mushtaq, Pascal Benoit, and Umer Farooq
keywords: Counters; Side-Channel Attacks(SCAs); Cryptography; Detection; Mitigation; Machine Learning;Security; Privacy.

Side Channel Attacks on RISC-V Processors: Current Progress, Challenges, and Opportunities
Mahya Morid Ahmadi, Faiq Khalid, and Muhammad Shafique
keywords: RISC-V, Side-channel, secure ISA, microprocessors, cache, hardware security

Exploiting Vulnerabilities in Deep Neural Networks: Adversarial and Fault-Injection Attacks
Faiq Khalid, Muhammad Abdullah Hanif, and Muhammad Shafique
keywords: Deep Neural Networks, Adversarial Attacks, Machine Learning Security, Fault-injection Attacks

Cyber and Emergent Technologies: Current and Future Ramifications
Joshua Sipper
keywords: quantum, nanotechnology, meta-reality, microbiome, artificial, machine

The Cyber Microbiome and the Cyber Meta-reality
Joshua Sipper
keywords: cyber, microbiome, meta-reality, archive, code, malware

Dismissing Poisoned Digital Evidence from Blockchain of Custody
David Billard
keywords: Digital Evidence; Blockchain; Chain of custody; Privacy

A Privacy-Preserving Architecture for the Protection of Adolescents in Online Social Networks
Markos Charalambous, Petros Papagiannis, Antonis Papasavva, Pantelitsa Leonidou, Rafael Constaninou, Lia Terzidou, Theodoros Christophides, Pantelis Nicolaou, Orfeas Theofanis, George Kalatzantonakis, and Michael Sirivianos
keywords: online social networks; online threats; cybersecurity risks; privacy; minors

Resilient Communications Availability Inverting the Confidentiality, Integrity, and Availability Paradigm
Steve Chan
keywords: Communications networks; Cyber electromagnetic spectrum; Radio frequency cellular coverage; Internet Protocol-based coverage; Signal boosters; Oscillation detection; Oscillation prevention; Spectrum analyzer; Smart auto switching; Non-bonded single channe

Mitigation Factors for Multi-domain Resilient Networked Distributed Tessellation Communications
Steve Chan
keywords: Transceiver polygons; Signal processing; Beamforming; Non-permissive cyber electromagnetic environment; 5G networks; Smart grids; Covariance matrix; Spatial filtering algorithms; Convex optimization problems; Semidefinite programming solvers; Space-Time A

Virtual Private Blockchains: Security Overlays for Permissioned Blockchains.
Samuel Onalo, Deepak Gc, and Eckhard Pfluegel
keywords: Public Blockchain; Private Blockchain; Permissioned Blockchain; Blockchain Confidentiality; Security Overlays; Virtual Private Networks; Secret Sharing.

Security Requirement Modeling for a Secure Local Energy Trading Platform
Yasamin Mahmoodi, Christoph Groß, Sebastian Reiter, Alexander Viehl, and Oliver Bringmann
keywords: Security analysis, IoT, Security requirement, Security-by-design.

Analyzing Power Grid, ICT, and Market Without Domain Knowledge Using Distributed Artificial Intelligence
Eric Veith, Stephan Balduin, Nils Wenninghoff, Martin Tröschel, Lars Fischer, Astrid Nieße, Thomas Wolgast, Richard Sethmann, Bastian Fraune, and Torben Woltjen
keywords: Cyber-Physical Systems Analysis; Distributed Artificial Intelligence; Reinforcement Learning; ICT Security; Market Design.

Fast Electronic Identification at Trust Substantial Level using the Personal Online Bank Account
Michael Massoth and Sam Louis Ahier
keywords: authentication; identity management; tokenization; substantial trust level; Payment Service Directive 2