SECURWARE 2018 - The Twelfth International Conference on Emerging Security Information, Systems and Technologies
September 16, 2018 - September 20, 2018
SECURWARE 2018: Awards
The papers listed below have been selected as "Best Papers" based on the reviews of the original submission, the camera-ready version, and the presentation during the conference. For the awarded papers, a digital award will be issued in the name of the authors. The authors of these papers are also receiving invitations to submit an extended article version to one of the IARIA Journals.
Awarded Papers
Implementation of Eavesdropping Protection Method over MPTCP Using Data Scrambling and Path Dispersion
Toshihiko Kato, Shihan Cheng, Ryo Yamamoto, Satoshi Ohzahata, Nobuo Suzuki
Exploiting User Privacy in IoT Devices Using Deep Learning and its Mitigation
Rana AlAmeedee, Wonjun Lee
Secure Collaborative Development of Cloud Application Deployment Models
Vladimir Yussupov, Michael Falkenthal, Oliver Kopp, Frank Leymann, Michael Zimmermann
Practical Risk Analysis in Interdependent Critical Infrastructures - a How-To
Sandra König, Thomas Grafenauer, Stefan Rass, Stefan Schauer
The following papers have been selected on the basis of their contents, specificaly for lending themselves to an interesting extended work. The authors of these papers are receiving invitations to submit an extended article version to one of the IARIA Journals.
Papers Invited for IARIA Journals
Analysing Trends and Success Factors of International Cybersecurity Capacity-Building Initiatives
Faisal Hameed, Ioannis Agrafiotis, Carolin Weisser, Michael Goldsmith, Sadie Creese
Towards a Quantitative Approach for Security Assurance Metrics
Goitom Weldehawaryat, Basel Katt
Towards a Protection Profile for User-Centric and Self-Determined Privacy Management in Biometrics
Salatiel Ezennaya Gomez, Jana Dittmann, Claus Vielhauer
New Covert Channels in Internet of Things
Aleksandra Mileva, Aleksandar Velinov, Done Stojanov
A Logic-Based Network Security Zone Modelling Methodology
Sravani Teja Bulusu, Romain Laborde, Ahmad Samer Wazan, Francois Barrère, Abdelmalek Benzekri
Towards a Blockchain-based Identity Provider
Andreas Grüner, Alexander Mühle, Tatiana Gayvoronskaya, Christoph Meinel
Metrics for Continuous Active Defence
George O. M. Yee
Secure Cooperation of Untrusted Components
Roland Wismüller, Damian Ludwig
Cyber Security Threats Targeting CPS Systems: A Novel Approach Using Honeypot
Sameera Almulla, Elias Bou-Harb, Claude Fachkha
Deployment Enforcement Rules for TOSCA-based Applications
Michael Zimmermann, Uwe Breitenbücher, Christoph Krieger, Frank Leymann
Enhanced Software Implementation of a Chaos-Based Stream Cipher
Guillaume Gautier, Safwan El Assad, Olivier Deforges, Sylvain Guilley, Adrien Facon, Wassim Hamidouche
Sensitive Data Anonymization Using Genetic Algorithms for SOM-based Clustering
Fatemeh Amiri, Gerald Quirchmayr, Peter Kieseberg