|
||||
The papers listed below have been selected as "Best Papers" based on the reviews of the original submission, the camera-ready version, and the presentation during the conference. For the awarded papers, a digital award will be issued in the name of the authors. The authors of these papers are also receiving invitations to submit an extended article version to one of the IARIA Journals. Awarded Papers Detecting Obfuscated JavaScripts Using Machine Learning Enhancing Network Security Environment by Empowering Modeling and Simulation Strategy (Cyber Protect Simulation Lesson Learned)
The following papers have been selected on the basis of their contents, specificaly for lending themselves to an interesting extended work. The authors of these papers are receiving invitations to submit an extended article version to one of the IARIA Journals. Papers Invited for IARIA Journals Performance Study of a Software Defined Network Emulator A Study on How to Characterize TCP Congestion Control Algorithms from Unidirectional Packet Traces Intrusion Detection Using Indicators of Compromise Based on Best Practices and Windows Event Logs |
||||
Copyright (c) 2006-2016, IARIA