CYBER 2022 - The Seventh International Conference on Cyber-Technologies and Cyber-Systems
November 13, 2022 - November 17, 2022
CYBER 2022: Awards
Onsite and Online Options: In order to accommodate a large number of situations, we are offering the option for either physical presence or virtual participation (pdf slides or pre-recorded videos).
The papers listed below have been selected as "Best Papers" based on the reviews of the original submission, the camera-ready version, and the presentation during the conference. For the awarded papers, a digital award will be issued in the name of the authors. The authors of these papers are also receiving invitations to submit an extended article version to one of the IARIA Journals.
Awarded Papers (also Invited for IARIA Journals)
Black Swan or Just an Ugly Duckling?
Anne Coull
Mitigating Against a Succession of Hidden Failure Accelerants Involved in an Insider Threat Sequential Topology Attack on a Smart Grid
Steve Chan
Dynamic Trust Evaluation of Evolving Cyber Physical Systems
Rainer Falk, Steffen Fries
Attack Path Generation Based on Attack and Penetration Testing Knowledge
Florian Sommer, Reiner Kriesten
A Ship Honeynet Project to Collect Data on Cyber Threats to the Maritime Sector
Stephen J McCombie, Jeroen Pijpker
The following papers have been selected on the basis of their contents, specificaly for lending themselves to an interesting extended work. The authors of these papers are receiving invitations to submit an extended article version to one of the IARIA Journals.
Papers Invited for IARIA Journals
Security Analysis of Embedded Systems Using Virtual Prototyping
Yasamin Mahmoodi, Sebastian Reiter, Alexsander Viehl, Oliver Bringmann
How Good is Openly Available Code Snippets Containing Software Vulnerabilities to Train Machine Learning Algorithms?
Kaan Oguzhan, Tiago Espinha Gasiba, Akram Louati
Security Information Quality Provided by News Sites and Twitter
Ryu Saeki, Kazumasa Oida
Sterilized Persistence Vectors (SPVs): Defense Through Deception on Windows Systems
Nicholas Phillips, Aisha Ali-Gombe
Efficiency of an Artificial Intelligence-based Chatbot Support for an IT-Awareness and Cybersecurity Learning Platform
Dominik Fanta, Farhan Sajid, Michael Massoth, Lennart Kruck
Investigating the Security and Accessibility of Voyage Data Recorder Data Using a USB Attack
Avanthika Vineetha Harish, Kimberly Tam, Kevin Jones
Timely Maritime Cyber Threat Resolution in a Multi-Stakeholder Environment
Allan Nganga, Joel Scanlan, Margareta Lützhöft, Steven Mallam