Home // CYBER
CYBER 2025, The Tenth International Conference on Cyber-Technologies and Cyber-Systems
Type: conference
Notes: IARIA Conference.
Editors:
Steve Chan, Decision Engineering Analysis Laboratory, USA
Hirokazu Hasegawa, National Institute of Informatics, Japan
ISSN: 2519-8599
ISBN: 978-1-68558-295-1
Location: Lisbon, Portugal
Dates: from September 28, 2025 to October 2, 2025
Articles: there are 10 articles
The Domain Name Life Cycle as an Attack Surface: Systematic Threat Mapping and Defense Recommendations
Thomas Fritzler and Michael Massoth
keywords: Domain Life Cycle; Domain Security; Domain Management; Expired Domains; Cybersecurity Best Practices.
Attesting the Trustworthiness of a Credential Issuer
Rainer Falk and Steffen Fries
keywords: cybersecurity; attestation; credential; digital certificate; device authentication, industrial security.
Selecting Cybersecurity Requirements: Effects of LLM Use and Professional Software Development Experience
Damjan Fujs, Damjan Vavpotič, Tomaž Hovelja, and Marko Poženel
keywords: security requirements engineering; experiment; prioritization; estimation
From Stakeholder Needs to Secure Digital Twin Services: Critical Infrastructure Use Cases within the INTACT Framework
Ilinca-Laura Burdulea, Sonika Gogineni, Stamatios Kostopoulos, Evangelos K. Markakis, Kyriakos N. Manganaris, and Fotis I. Lazarakis
keywords: Digital Twin; Cybersecurity; Critical Infrastructure; Functional Requirements; NIS2 Directive.
Proposal and Implementation of a Security Enhancement Method using Route Hopping MTD for Mesh Networks
Yuto Ikeda and Hiroshi Koide
keywords: IoT; Mesh Network; Moving Target Defense; AODV.
Integrating Cybersecurity and Digital Marketing Effectiveness: Developing a cohesive framework for SME resilience
Kathy-Ann Fletcher and Nicole Carle
keywords: SMEs; cybersecurity; digital marketing; data protection; readiness.
Temporary Identification Management System Using UNIX Time for IoT Device Privacy Protection
Koki Mizoguchi, Somchart Fugkeaw, Masahito Kumazaki, Hirokazu Hasewaga, and Hiroki Takakura
keywords: Device Identifier; Privacy; ID anonymization; UNIX time.
A File Access Permission Management System to Realize Task Transfer during Cyber Attacks
Hidetoshi Kawai, Masahito Kumazaki, Hirokazu Hasegawa, Hiroki Takakura, and Masahiko Kato
keywords: Cyber Attacks; File access permissions; Reliability; Expertise; Business Continuity.
A Privacy-preserving Video Processing Pipeline
Gábor György Gulyás and Gergely Erdődi
keywords: cctv; video processing; face recognition; architecture.
Contributions to Methodologies to Improve Sensor Data Quality of Cyber Physical Production Systems Through Digitalisation: A Use Case Approach
Martin Zinner, Hajo Wiemer, Kim Feldhoff, Peter Meschke, and Steffen Ihlenfeldt
keywords: Failure analysis; Sensor data quality; Sensor data error detection.