The Fourth International Conference on Cyber-Technologies and Cyber-Systems

CYBER 2019

September 22, 2019 to September 26, 2019 - Porto, Portugal

Deadlines

Submission

Jun 13, 2019

Notification

Jul 14, 2019

Registration

Jul 27, 2019

Camera ready

Aug 07, 2019

Publication

Published by IARIA XPS Press

Archived in the free access ThinkMind Digital Library

Prints available at Curran Associates, Inc.

Authors of selected papers will be invited to submit extended versions to a IARIA Journal

Indexing Procedure

Affiliated Journals

CYBER 2019 - The Fourth International Conference on Cyber-Technologies and Cyber-Systems

September 22, 2019 - September 26, 2019

CYBER 2019: Awards

The papers listed below have been selected as "Best Papers" based on the reviews of the original submission, the camera-ready version, and the presentation during the conference. For the awarded papers, a digital award will be issued in the name of the authors. The authors of these papers are also receiving invitations to submit an extended article version to one of the IARIA Journals.

Awarded Papers

Enhancing Attack Resilience by Protecting the Physical-World Interface of Cyber-Physical Systems
Rainer Falk, Steffen Fries

Fast Training of Support Vector Machine for Forest Fire Prediction
Steve Chan, Ika Oktavianti Najib, Verlly Puspita

A Fraud Detection Framework using Machine Learning Approach
Aderonke Thompson, Oghenerukvwe Oyinloye, Leon Aborisade, Esther Odeniyi

Annealed Cyber Resiliency: Cyber Discernment for the Launch Providers of Space Systems
Steve Chan, Bob Griffin

Recovery of Forensic Artefacts from a Smart Home IoT Ecosystem
M A Hannan Bin Azhar, Samuel Benjamin Louis Bate

How Much Cyber Security is Enough?
Anne Coull

 

The following papers have been selected on the basis of their contents, specificaly for lending themselves to an interesting extended work. The authors of these papers are receiving invitations to submit an extended article version to one of the IARIA Journals.

Papers Invited for IARIA Journals

Detecting Spectre Vulnerabilities by Sound Static Analysis
Daniel Kästner, Laurent Mauborgne, Christian Ferdinand, Henrik Theiling

Hardware Implementation of Lightweight Chaos-Based Stream Cipher
Guillaume Gautier, Maguy Le Glatin, Safwan El Assad, Wassim Hamidouche, Olivier Deforges, Sylvain Guilley, Adrien Facon

Comparisons of Forensic Tools to Recover Ephemeral Data from iOS Apps Used for Cyberbullying
Aimee Chamberlain, M A Hannan Bin Azhar

Surveying and Enhancing Grid Resilience Sensor Communications: An Amalgam of Narrowband, Broadband, and Hybridizing Spread Spectrum
Steve Chan, Ika Oktavianti Najib, Verlly Puspita

Context-Referenced Telemetry Data for Distribution Utilities: Quality Assurance/Quality Control by Lateral Sensors
Steve Chan, Ika Oktavianti Najib, Verlly Puspita

Threat Based Cyber Security Investment Strategies [PRESENTATION]
Anita Bhat

Refinement Checker for Embedded Object Code Verification
Mohana Asha Latha Dubasi, Sudarshan K. Srinivasan, Sana Shuja, Zeyad A. Al-Odat