CYBER 2025 - The Tenth International Conference on Cyber-Technologies and Cyber-Systems
September 28, 2025 - October 02, 2025
CYBER 2025: Awards
Onsite and Online Options: In order to accommodate various situations, we are offering the option for either physical presence or virtual participation (pdf slides or pre-recorded videos).
The papers listed below have been selected as "Best Papers" based on the reviews of the original submission, the camera-ready version, and the presentation during the conference. For the awarded papers, a digital award will be issued in the name of the authors. The authors of these papers are also receiving invitations to submit an extended article version to one of the IARIA Journals.
Awarded Papers (also Invited for IARIA Journals)
A Privacy-preserving Video Processing Pipeline
Gábor György Gulyás, Gergely Erdődi
The Domain Name Life Cycle as an Attack Surface: Systematic Threat Mapping and Defense Recommendations
Thomas Fritzler, Michael Massoth
Temporary Identification Management System Using UNIX Time for IoT Device Privacy Protection
Koki Mizoguchi, Somchart Fugkeaw, Masahito Kumazaki, Hirokazu Hasewaga, Hiroki Takakura
A File Access Permission Management System to Realize Task Transfer during Cyber Attacks
Hidetoshi Kawai, Masahito Kumazaki, Hirokazu Hasegawa, Hiroki Takakura, Masahiko Kato
Attesting the Trustworthiness of a Credential Issuer
Rainer Falk, Steffen Fries
Proposal and Implementation of a Security Enhancement Method using Route Hopping MTD for Mesh Networks
Yuto Ikeda, Hiroshi Koide
The following papers have been selected on the basis of their contents, specificaly for lending themselves to an interesting extended work. The authors of these papers are receiving invitations to submit an extended article version to one of the IARIA Journals.
Papers Invited for IARIA Journals
Selecting Cybersecurity Requirements: Effects of LLM Use and Professional Software Development Experience
Damjan Fujs, Damjan Vavpotič, Tomaž Hovelja, Marko Poženel
From Stakeholder Needs to Secure Digital Twin Services: Critical Infrastructure Use Cases within the INTACT Framework
Ilinca-Laura Burdulea, Sonika Gogineni, Stamatios Kostopoulos, Evangelos K. Markakis, Kyriakos N. Manganaris, Fotis I. Lazarakis
Integrating Cybersecurity and Digital Marketing Effectiveness: Developing a cohesive framework for SME resilience
Kathy-Ann Fletcher, Nicole Carle
Integrating the Technical Level into a Model-based Safety and Security Analysis: Why it is Necessary and How it Can be Done
Sibylle Fröschle
Contributions to Methodologies to Improve Sensor Data Quality of Cyber Physical Production Systems Through Digitalisation: A Use Case Approach
Martin Zinner, Hajo Wiemer, Kim Feldhoff, Peter Meschke, Steffen Ihlenfeldt