Home // CYBER
CYBER 2021, The Sixth International Conference on Cyber-Technologies and Cyber-Systems
Type: conference
Notes: IARIA Conference.
Editors:
Steve Chan, Decision Engineering Analysis Laboratory, USA
Joshua A. Sipper, Cyber Warfare Studies, Air Force Cyber College, USA
ISSN: 2519-8599
ISBN: 978-1-61208-893-8
Location: Barcelona, Spain
Dates: from October 3, 2021 to October 7, 2021
Articles: there are 17 articles
Enhancing Attack Resilience in the Presence of Manipulated IoT Devices within a Cyber Physical System
Rainer Falk and Steffen Fries
keywords: cyber security; cyber resilience; system integrity; cyber physical systems; industrial automation and control system; Internet of Things
The Risk of a Cyber Disaster
Vaughn Standley and Roxanne Everetts
keywords: catastrophe theory; military; power law; risk analysis
Evaluations of Information Security Maturity Models: Measuring the NIST Cybersecurity Framework Implementation Status
Majeed Alsaleh and Mahmood Niazi
keywords: security; information security; maturity model; measurement metrics.
Internet of Things in Healthcare: Case Study in Care Homes
Tochukwu Emma-Duru and Violeta Holmes
keywords: Internet of Things, IoT Security, Edge devices, Esp8266, Embedded Systems, Bedsores, IoT Healthcare.
What Influences People’s View of Cyber Security Culture in Higher Education Institutions? An Empirical Study
Tai Durojaiye, Konstantinos Mersinas, and Dawn Watling
keywords: Cyber security culture; Higher Education Institutions (HEIs); security behaviour; communication; phishing; training.
A Potentially Specious Cyber Security Offering for 5G/B5G/6G: Software Supply Chain Vulnerabilities within Certain Fuzzing Modules
Steve Chan
keywords: cyber security; fuzzing; wireless networks; 5G; autonomous vehicles; grey-box concolic fuzzer.
The Life of Data in Compliance Management
Nick Scope, Alexander Rasin, Karen Heart, Ben Lenard, and James Wagner
keywords: Compliance Management; Privacy Regulations
Sharing FANCI Features: A Privacy Analysis of Feature Extraction for DGA Detection
Benedikt Holmes, Arthur Drichel, and Ulrike Meyer
keywords: Data privacy; Intrusion detection; Machine learning.
The Same, but Different: The Pentesting Study
Jan Roring, Dominik Sauer, and Michael Massoth
keywords: penetration test; comparison; standards; human; soft skills.
Performance Evaluation of Reconfigurable Lightweight Block Ciphers
Mostafa Hashempour Koshki, Reza Abdolee, and Behzad Mozaffari Tazekand
keywords: Security performance, Cybersecurity, Reconfigurable lightweight block ciphers, Round order randomization, Internet of Things (IoT).
Relevance of GRC in Expanding the Enterprise Risk Management Capabilities
Alina Andronache, Abraham Althonayan, and Seyedeh Mandana Matin
keywords: Enterprise Risk Management, GRC, align, risk compliance, maturity.
A High-Performance Solution for Data Security and Traceability in Civil Production and Value Networks through Blockchain
Erik Neumann, Kilian Armin Nölscher, Gordon Lemme, and Adrian Singer
keywords: Private Blockchain, Data Security, Traceability, Value Chain
An Automated Reverse Engineering Cyber Module for 5G/B5G/6G: ML-Facilitated Pre-“ret” Discernment Module for Industrial Process Programmable Logic Controllers
Steve Chan
keywords: cybersecurity; industrial control system; programmable logic controller; Industry 4.0; Industrial Internet of Things; smart manufacturing; smart grid; 5G; machine learning; artificial intelligence; automated reverse engineering.
Interference Testing on Radio Frequency Polarization Fingerprinting
Page Heller
keywords: authentication; wireless intrusion detection; radio frequency fingerprinting; interference
Explainable AI
Anne Coull
keywords: Artificial intelligence; machine learning, explainability, stakeholder; acceptance; transparent; model; post-hoc; human-centred explanation; measure.
Application Services in Space Information Networks
Anders Fongen
keywords: LEO satellites; space information networks; AaaS in space.
Optimal Scheduling with a Reliable Data Transfer Framework for Drone Inspections of Infrastructures
Golizheh Mehrooz and Peter Schneider-Kamp
keywords: UAV, Cloud server, ROS, Scheduling, Rosbridge