The Twelfth International Conference on Emerging Security Information, Systems and Technologies

SECURWARE 2018

September 16, 2018 to September 20, 2018 - Venice, Italy

Deadlines

Submission

Jun 03, 2018

Notification

Jul 03, 2018

Registration

Jul 16, 2018

Camera ready

Jul 22, 2018

Publication

Published by IARIA XPS Press

Archived in the free access ThinkMind Digital Library

Prints available at Curran Associates, Inc.

Authors of selected papers will be invited to submit extended versions to a IARIA Journal

Affiliated Journals

SECURWARE 2018 - The Twelfth International Conference on Emerging Security Information, Systems and Technologies

September 16, 2018 - September 20, 2018

SECURWARE 2018: Awards

The papers listed below have been selected as "Best Papers" based on the reviews of the original submission, the camera-ready version, and the presentation during the conference. For the awarded papers, a digital award will be issued in the name of the authors. The authors of these papers are also receiving invitations to submit an extended article version to one of the IARIA Journals.

Awarded Papers

Implementation of Eavesdropping Protection Method over MPTCP Using Data Scrambling and Path Dispersion
Toshihiko Kato, Shihan Cheng, Ryo Yamamoto, Satoshi Ohzahata, Nobuo Suzuki

Exploiting User Privacy in IoT Devices Using Deep Learning and its Mitigation
Rana AlAmeedee, Wonjun Lee

Secure Collaborative Development of Cloud Application Deployment Models
Vladimir Yussupov, Michael Falkenthal, Oliver Kopp, Frank Leymann, Michael Zimmermann

Practical Risk Analysis in Interdependent Critical Infrastructures - a How-To
Sandra König, Thomas Grafenauer, Stefan Rass, Stefan Schauer

 

The following papers have been selected on the basis of their contents, specificaly for lending themselves to an interesting extended work. The authors of these papers are receiving invitations to submit an extended article version to one of the IARIA Journals.

Papers Invited for IARIA Journals

Analysing Trends and Success Factors of International Cybersecurity Capacity-Building Initiatives
Faisal Hameed, Ioannis Agrafiotis, Carolin Weisser, Michael Goldsmith, Sadie Creese

Towards a Quantitative Approach for Security Assurance Metrics
Goitom Weldehawaryat, Basel Katt

Towards a Protection Profile for User-Centric and Self-Determined Privacy Management in Biometrics
Salatiel Ezennaya Gomez, Jana Dittmann, Claus Vielhauer

New Covert Channels in Internet of Things
Aleksandra Mileva, Aleksandar Velinov, Done Stojanov

A Logic-Based Network Security Zone Modelling Methodology
Sravani Teja Bulusu, Romain Laborde, Ahmad Samer Wazan, Francois Barrère, Abdelmalek Benzekri

Towards a Blockchain-based Identity Provider
Andreas Grüner, Alexander Mühle, Tatiana Gayvoronskaya, Christoph Meinel

Metrics for Continuous Active Defence
George O. M. Yee

Secure Cooperation of Untrusted Components
Roland Wismüller, Damian Ludwig

Cyber Security Threats Targeting CPS Systems: A Novel Approach Using Honeypot
Sameera Almulla, Elias Bou-Harb, Claude Fachkha

Deployment Enforcement Rules for TOSCA-based Applications
Michael Zimmermann, Uwe Breitenbücher, Christoph Krieger, Frank Leymann

Enhanced Software Implementation of a Chaos-Based Stream Cipher
Guillaume Gautier, Safwan El Assad, Olivier Deforges, Sylvain Guilley, Adrien Facon, Wassim Hamidouche

Sensitive Data Anonymization Using Genetic Algorithms for SOM-based Clustering
Fatemeh Amiri, Gerald Quirchmayr, Peter Kieseberg