Home // CYBER

CYBER 2022, The Seventh International Conference on Cyber-Technologies and Cyber-Systems

Type: conference

Notes: IARIA Conference.

Editors:
Steve Chan, Decision Engineering Analysis Laboratory, USA
Kevin D. Jones, University of Plymouth, UK

ISSN: 2519-8599

ISBN: 978-1-61208-996-6

Location: Valencia, Spain

Dates: from November 13, 2022 to November 17, 2022

Articles: there are 15 articles

Security Analysis of Embedded Systems Using Virtual Prototyping
Yasamin Mahmoodi, Sebastian Reiter, Alexsander Viehl, and Oliver Bringmann
keywords: Security analysis; IoT; Security requirement; Virtual prototyping; Security-by-design

Mitigating Against a Succession of Hidden Failure Accelerants Involved in an Insider Threat Sequential Topology Attack on a Smart Grid
Steve Chan
keywords: Cyber; supply chain vulnerability; insider threat; zero-day type vulnerabilities; hidden defects/failures; protection system hidden failure; sequential topology attack; cascading failure; blackout; resiliency; control signal energy cost; artificial intell

Dynamic Trust Evaluation of Evolving Cyber Physical Systems
Rainer Falk and Steffen Fries
keywords: system integrity; trustworthiness; device integrity; attestation; lifecycle; resilience; cyber physical systems; Internet of Things; cyber security

How Good is Openly Available Code Snippets Containing Software Vulnerabilities to Train Machine Learning Algorithms?
Kaan Oguzhan, Tiago Espinha Gasiba, and Akram Louati
keywords: machine learning; deep learning; industry; software; vulnerabilities

Towards Secure Content Sharing in Social Networks
Clara Bertolissi, Alba Martinez Anton, Romain Testud, and Nicola Zannone
keywords: Security; Privacy; Access control

Attack Path Generation Based on Attack and Penetration Testing Knowledge
Florian Sommer and Reiner Kriesten
keywords: security testing; automation; tester experience.

Security Information Quality Provided by News Sites and Twitter
Ryu Saeki and Kazumasa Oida
keywords: Emotet, Security NEXT

A Survey on Artificial Intelligence Techniques in Cybersecurity Management
Mercy Ejura Dapel, Mary Asante, Chijioke Dike Uba, and Michael Opoku Agyeman
keywords: Artificial Intelligence, Cybercrime, Cyber-attacks, Cybersecurity, Security Threats.

Sterilized Persistence Vectors (SPVs): Defense Through Deception on Windows Systems
Nicholas Phillips and Aisha Ali-Gombe
keywords: Malware, Computer Security, Reverse Engineering, Persistence, Rootkit

Efficiency of an Artificial Intelligence-based Chatbot Support for an IT-Awareness and Cybersecurity Learning Platform
Dominik Fanta, Farhan Sajid, Michael Massoth, and Lennart Kruck
keywords: Artificial intelligence; chatbot; it-awareness; learning platform; chat flow; ecosystem security.

Black Swan or Just an Ugly Duckling?
Anne Coull
keywords: Black Swan; Emotet; WannaCry; Early Warning Indicator; Critical Vulnerability; Situational Awareness; Response.

Investigating the Security and Accessibility of Voyage Data Recorder Data Using a USB Attack
Avanthika Vineetha Harish, Kimberly Tam, and Kevin Jones
keywords: Maritime; Ransomware; USB Rubber Ducky; Voyage Data Recorder

A Ship Honeynet Project to Collect Data on Cyber Threats to the Maritime Sector
Stephen J McCombie and Jeroen Pijpker
keywords: Cybersecurity; Maritime Security; Cyber- Physical Security; Vessel; Honeynet; Honeypot; Cyber Deception.

Timely Maritime Cyber Threat Resolution in a Multi-Stakeholder Environment
Allan Nganga, Joel Scanlan, Margareta Lützhöft, and Steven Mallam
keywords: maritime cybersecurity; situational awareness; information sharing; stakeholders; security operations center

Reducing the Cyber-Attack Surface in the Maritime Sector via Individual Behaviour Change
Konstantinos Mersinas and Chupkemi Divine Chana
keywords: maritime security, cyber security, behaviour change, security training