Home // CYBER
CYBER 2024, The Ninth International Conference on Cyber-Technologies and Cyber-Systems
Type: conference
Notes: IARIA Conference.
Editors:
Tiago Gasiba, Siemens AG, Munich, Bavaria, Germany
Joshua Sipper, Air University, Air Command and Staff College, USA
ISSN: 2519-8599
ISBN: 978-1-68558-186-2
Location: Venice, Italy
Dates: from September 29, 2024 to October 3, 2024
Articles: there are 8 articles
Artificial Intelligence and Semiotics: Using Semiotic Learning to Bolster AI
Joshua Sipper
keywords: cyber; artificial intelligence; semiotics; accommodation; assimilation; heuristics.
Graceful Degradation under Attack: Adapting Control Device Operation Depending on the Current Threat Exposure
Rainer Falk, Christian Feist, and Steffen Fries
keywords: cyber resilience; cyber physical system; industrial security; cybersecurity.
Analysing Cyber Challenges: Towards Enhancing Autonomous Vehicle Cybersecurity Resilience
Tanisha Soldini, Elena Sitnikova, and Karl Sammut
keywords: autonomous vehicles; critical infrastructure; cyber security; cyber resilience; taxonomy.
Poisoning Attack Data Detection with Internal Coefficient Displacement for Machine Learning Based NIDS
Hajime Shimada, Takuya Kuwayama, Hirokazu Hasegawa, and Yukiko Yamaguchi
keywords: poisoning attack detection; machine learning based NIDS.
Towards Automated Checking of GDPR Compliance
Pauline Di Salvo-Cilia, Alba Martinez Anton, and Clara Bertolissi
keywords: Privacy; Data protection; GDPR compliance.
CAN Message Collision Avoidance Filter for In-Vehicle Networks
Uma Kulkarni and Sibylle Froeschle
keywords: Controller Area Network (CAN); In-Vehicle Networks; Message Collisions; Filter.
Prepare for the Worst, Rather Than Hope for the Best: Preparing to Recover From Major Cyber Security Incidents
Anne Coull
keywords: cyber resilience; recovery; major cyber security incident; playbook.
GenAttackTracker: Real-Time SCADA-based Cyber Threat Detection Through Scoring and Bayesian Model Integration
Fatemeh Movafagh and Uwe Glässer
keywords: Cyber Resilience; Critical Infrastructure Security; Cyber-Physical Systems; Supervisory Control and Data Acquisition (SCADA); Online Threat Detection; Bayesian Inference, Anomaly Detection; Suspicious Activity Markers (SAMs); Machine Learning.