The Third International Conference on Cyber-Technologies and Cyber-Systems

CYBER 2018

November 18, 2018 to November 22, 2018 - Athens, Greece

Deadlines

Submission

Aug 01, 2018

Notification

Sep 04, 2018

Registration

Sep 17, 2018

Camera ready

Sep 25, 2018

Publication

Published by IARIA XPS Press

Archived in the free access ThinkMind Digital Library

Prints available at Curran Associates, Inc.

Authors of selected papers will be invited to submit extended versions to a IARIA Journal

Indexing Procedure

Affiliated Journals

CYBER 2018 - The Third International Conference on Cyber-Technologies and Cyber-Systems

November 18, 2018 - November 22, 2018

CYBER 2018: Awards

The papers listed below have been selected as "Best Papers" based on the reviews of the original submission, the camera-ready version, and the presentation during the conference. For the awarded papers, a digital award will be issued in the name of the authors. The authors of these papers are also receiving invitations to submit an extended article version to one of the IARIA Journals.

Awarded Papers

Cyber Security Using Bayesian Attack Path Analysis
Remish Leonard Minz, Sanjana Pai Nagarmat, Ramesh Rakesh, Yoshiaki Isobe

Prototype Orchestration Framework as a High Exposure Dimension Cyber Defense Accelerant Amidst Ever-Increasing Cycles of Adaptation by Attackers
Steve Chan

Threat Analysis using Vulnerability Databases - Matching Attack Cases to Vulnerability Database by Topic Model Analysis -
Umezawa Katsuyuki, Mishina Yusuke, Wohlgemuth Sven, Takaragi Kazuo

A Methodology For Synthesizing Formal Specification Models From Requirements for Refinement-Based Object Code Verification
Eman Al-Qtiemat, Sudarshan K. Srinivasan, Mohana Asha Latha Dubasi, Sana Shuja

 

The following papers have been selected on the basis of their contents, specificaly for lending themselves to an interesting extended work. The authors of these papers are receiving invitations to submit an extended article version to one of the IARIA Journals.

Papers Invited for IARIA Journals

A Comparative Evaluation of Automated Vulnerability Scans Versus Manual Penetration Tests on False-negative Errors
Saed Alavi, Niklas Bessler, Michael Massoth

A Taxonomy of Attacks via the Speech Interface
Mary K. Bispham, Ioannis Agrafiotis, Michael Goldsmith

Countering an Anti-Natural Language Processing Mechanism in the Computer-Mediated Communication of “Trusted” Cyberspace Operations
Steve Chan

Harnessing Machine Learning, Data Analytics, and Computer-Aided Testing for Cyber Security Applications
Thomas Klemas, Steve Chan

Prototype Open-Source Software Stack for the Reduction of False Positives and Negatives in the Detection of Cyber Indicators of Compromise and Attack
Steve Chan

Prediction of Underground Fire Behavior in South Sumatra: Using Support Vector Machine With Adversarial Neural Network Support
Ika Oktavianti Najib

Reviewing National Cybersecurity Awareness in Africa: An Empirical Study
Maria Bada, Basie Von Solms, Ioannis Agrafiotis

IoT-Based Secure Embedded Scheme for Insulin Pump Data Acquisition and Monitoring
Zeyad A. Al-Odat, Sudarshan K. Srinivasan, Eman Al-Qtiemat, Mohana Asha Latha Dubasi, Sana Shuja

A Methodology For Synthesizing Formal Specification Models From Requirements for Refinement-Based Object Code Verification
Eman Al-Qtiemat, Sudarshan K. Srinivasan, Mohana Asha Latha Dubasi, Sana Shuja