Submission | Jul 05, 2021 |
Notification | Aug 14, 2021 |
Registration | Aug 28, 2021 |
Camera ready | Sep 04, 2021 |
Submission | Jul 05, 2021 |
Notification | Aug 14, 2021 |
Registration | Aug 28, 2021 |
Camera ready | Sep 04, 2021 |
Published by IARIA XPS Press | |
Archived in the free access ThinkMind Digital Library | |
Prints available at Curran Associates, Inc. | |
Authors of selected papers will be invited to submit extended versions to a IARIA Journal | |
CYBER 2021 - The Sixth International Conference on Cyber-Technologies and Cyber-Systems
October 03, 2021 - October 07, 2021
ISSN: 2519-8599
ISBN: 978-1-61208-893-8
CYBER 2021 is colocated with the following events as part of NexTech 2021 Congress:
CYBER 2021 General Chair
![]() |
Steve Chan |
|
CYBER 2021 Steering Committee
![]() |
Carla Merkle Westphall |
![]() |
Barbara Re |
||
![]() |
Rainer Falk |
![]() |
Soultana Ellinidou |
||
![]() |
Anne Coull |
![]() |
Patrik Österberg |
||
![]() |
Daniel Kästner |
![]() |
Steffen Fries |
CYBER 2021 conference tracks:
Trends in Cybersecurity
Blockchain and machine learning for cybersecurity; Behavioral biometrics authentication; Privacy by design; Anonymity of blockchain and cryptocurrencies; Threat categorization and threat detection; Threats on critical national infrastructures; Gift card hacking techniques; Medical IoT Device-to-Device communication; Blockchain in supporting critical infrastructures; Vulnerability on social media spaces; Internet of Medical Things (IOMT); Cybersecurity for digital vehicles; Potential radicalization on social media; Blockchain and healthcare systems; Risk-based human behavior profiling; Forensic recovery of cloud evidence; Hacking pacemakers; Prediction of cyber attacks; Ransomware cyberweapon; Liability attribution in smart workplaces; Cybersecurity, laws and regulations; Information from browsers by online advertising platforms; Predicting social engineering victims; Cybercrime awareness
Cyber Resilience
Cyber security assessment; Data analytics for Cyber resilience; Organizational security (government, commercial); Resilient smart cities; Resilient Internet of Things (RIOT); Cyber-cities and Cyber-environments; Critical infrastructure security; Back up and recovery for systems of systems; Disaster planning and management from Cyber perspective; Integrated and smarter sensors
Resiliency and risks
Resiliency in smart cities; Reliability and resiliency in wireless networks; Detecting anomalous activity; Resources constrained systems/devices; Disruption-tolerant systems; Resiliency and access in restricted areas; Monitoring maritime critical disasters; Critical supply networks; Risk assessment
Technologies for resiliency
Self-organized disaster management systems; Technological catastrophes and crises management; Deep-learning & Big Data and disaster recovery; Disaster management in 5G uRLLC-based systems; 5G and IoT in disaster management; Aerial Systems for Disaster Management; IoT sensing platforms for public safety
Cyber Security
Security management [overall information security management in the sense of 27000 series applied to cyber systems]; Compliance management [verify/check compliance with defined policies, provide corresponding management reports]; Security administration of cyber systems [technical security management of security services]; Security and privacy regulations and laws; Securely interconnected cyber systems [firewalls, cross-domain security solutions]; Self-securing and self-defending cyber systems; Trust management, trust-based information processing [using possibly untrustworthy data sources in a controlled way]; Security technologies for protecting cyber systems and devices; Identity and access management in cyber systems; Anti-counterfeiting; Secure production and supply chain; Cloud computing security; Big-data security; Advanced persistent threats; Network traffic analysis and trace-back; Cyberspace operations; Incident response, investigation, and evidence handling; Intrusion detection and prevention; Cyberspace protection and anti-malware; Cooperation and sharing for Cyber-defense
Cyber Infrastructure
Cyber-Cities and Cyber-environments; Information technology infrastructure; Telecommunications and networks; Cyber-space and data centers; Cyber-enabled control systems; Cyber-enabled critical infrastructure systems; Cyber-physical systems and Internet of Things; Special application domains (smart grid, traffic management systems, autonomous driving, etc.); Embedded processors and controllers; Mobility in Cyber-space; Virtualization in Cyber-space
Cyber Forensics
Computer and networks forensics; Social networking forensics; Digital forensics tools and applications; Applications of information hiding; Identification, authentication, and collection of digital evidence; Anti-forensic techniques and methods; Watermarking and intellectual property theft; Privacy issues in network forensics; Tools, applications, case studies, best practices
Cyber Crime
Cyber-crimes: Challenges in detection/prevention; Anomalies detection; Advanced Persistent Threats and Cyber-resilience; BotNets and MobiNets; Cyber crime-related investigations; Challenges and detection of Cyber-crimes; Network traffic analysis, traceback; Security information and event management (SIEM); Stealthiness improving techniques: information hiding, steganography/steganalysis, etc.
Nature-inspired and Bio-inspired Cyber-defense
Bio-inspired anomaly & intrusion detection; Autonomic and Adaptive Cyber-Defense; Adaptive and Evolvable Systems; Cooperative defense systems; Network artificial immune systems; Adaptation algorithms for cyber security; Biometrics related to cyber defense; Bio-inspired security and networking algorithms and technologies; Biomimetics related to cyber security; Bio-inspired cyber threat intelligence methods and systems; Bio-inspired algorithms for dependable networks; Correlations in moving-target techniques; Neural networks, evolutionary algorithms, and genetic algorithms for cyber security Prediction techniques for cyber defense; Information hiding solutions (steganography, watermarking) and detection
Social-inspired opportunistic mobile Cyber-systems
Design of cyber-physical applications for opportunistic mobile systems based on behavioral models; Social metrics for networks and systems operations; Application of mixed physical and online social network sensing; Social-aware modeling, design and development of routing algorithms in cyber-physical; Incentive mechanisms, reputation systems and key management algorithms in cyber-physical opportunistic mobile systems; Participatory mobile sensing for mining integration in cyber-physical opportunistic mobile systems; Experiments with cyber-physical opportunistic mobile systems
Deadlines:
Submission | Jul 05, 2021 |
Notification | Aug 14, 2021 |
Registration | Aug 28, 2021 |
Camera ready | Sep 04, 2021 |
Copyright (c) 2006-2021, IARIA