CYBER 2022 - The Seventh International Conference on Cyber-Technologies and Cyber-Systems
	November 13, 2022 - November 17, 2022
 CYBER 2022: Awards
Onsite and Online Options: In order to accommodate a large number of situations, we are offering the option for either physical presence or virtual participation (pdf slides or pre-recorded videos).
The papers listed below have been selected as "Best Papers" based on the reviews of the original submission, the camera-ready version, and the presentation during the conference. For the awarded papers, a digital award will be issued in the name of the authors. The authors of these papers are also receiving invitations to submit an extended article version to one of the IARIA Journals.
 
Awarded Papers (also Invited for IARIA Journals)
Black  Swan or Just an Ugly Duckling?
Anne  Coull
Mitigating  Against a Succession of Hidden Failure Accelerants Involved in an Insider  Threat Sequential Topology Attack on a Smart Grid
Steve  Chan
Dynamic  Trust Evaluation of Evolving Cyber Physical Systems
Rainer  Falk, Steffen Fries
Attack  Path Generation Based on Attack and Penetration Testing Knowledge
Florian  Sommer, Reiner Kriesten
A  Ship Honeynet Project to Collect Data on Cyber Threats to the Maritime Sector
  Stephen  J McCombie, Jeroen Pijpker
 
The following papers have been selected on the basis of their contents, specificaly for lending themselves to an interesting extended work. The authors of these papers are receiving invitations to submit an extended article version to one of the IARIA Journals.
     Papers Invited for IARIA Journals
Security  Analysis of Embedded Systems Using Virtual Prototyping
Yasamin  Mahmoodi, Sebastian Reiter, Alexsander Viehl, Oliver Bringmann
How  Good is Openly Available Code Snippets Containing Software Vulnerabilities to  Train Machine Learning Algorithms?
  Kaan  Oguzhan, Tiago Espinha Gasiba, Akram Louati
Security  Information Quality Provided by News Sites and Twitter
  Ryu  Saeki, Kazumasa Oida
Sterilized  Persistence Vectors (SPVs): Defense Through Deception on Windows Systems
  Nicholas  Phillips, Aisha Ali-Gombe
Efficiency  of an Artificial Intelligence-based Chatbot Support for an IT-Awareness and  Cybersecurity Learning Platform
  Dominik  Fanta, Farhan Sajid, Michael Massoth, Lennart Kruck
Investigating  the Security and Accessibility of Voyage Data Recorder Data Using a USB Attack
  Avanthika  Vineetha Harish, Kimberly Tam, Kevin Jones
Timely  Maritime Cyber Threat Resolution in a Multi-Stakeholder Environment
Allan  Nganga, Joel Scanlan, Margareta Lützhöft, Steven Mallam