|
||||
The papers listed below have been selected as "Best Papers" based on the reviews of the original submission, the camera-ready version, and the presentation during the conference. For the awarded papers, a digital award will be issued in the name of the authors. The authors of these papers are also receiving invitations to submit an extended article version to one of the IARIA Journals. Awarded Papers Beyond the Dolev-Yao Model: Realistic Application-Specific Attacker Models for Applications Using Vehicular Communication
Embedded Security Testing with Peripheral Device Caching and Runtime Program State Approximation
Analysis of Direct Punch in Professional Defence Using Multiple Methods
The Mathematical Modeling of Road Transport in Context of Critical Infrastructure Protection
Using Ethical Hacking to Analyze BYOD Safety in Corporations
Critical Infrastructure Protection – Modeling of Domino and Synergy Effects
Seven Steps to a Quantum-Resistant Cipher
Reflecting on the Use of Sonification for Network Monitoring
Information Security Maturity as an Integral Part of ISMS based Risk Management Tools
Security Update and Incident Handling for IoT-devices; A Privacy-Aware Approach
The following papers have been selected on the basis of their contents, specificaly for lending themselves to an interesting extended work. The authors of these papers are receiving invitations to submit an extended article version to one of the IARIA Journals. Papers Invited for IARIA Journals Cost-Effective Biometric Authentication using Leap Motion and IoT Devices
Severity Assessment of Security Incidents
Object Oriented Role-Based Access Control
An Empirical Survey on how Much Security and Privacy Customers Want in Instant Messengers
Insight into Contemporary Dissemination Techniques of Mobile Botnet Clients (Bots)
Towards Extensible Signature Policies in Brazil: A Case Study
Strengthening Software Diversity Through Targeted Diversification
Resistance of Passive Security Elements as A Quantitative Parameter Influencing The Overall Resistance and Resilience of A Critical Infrastructure Element
Authentication of Czech Banknotes using Raman Microscopy
A Study on User Perceptions of ICT Security
Visualization of Privacy Risks in Software Systems
Attacker-Parametrised Attack Graphs
The following papers have been found better fitting the topic range of the Journal of The International Frequency Sensor Association (IFSA). The authors of these papers are receiving invitations to submit an extended article version to the IFSA Sensors & Transducers Journal. Papers Invited to the IFSA Journal The Configuration of Alarm Systems during the Measurement of Electromagnetic Interference, The Analysis of the Requirements of Legislation and Technical Standards
Electromagnetic Weapons as Means of Stopping Vehicles: A Proposal of a Stationary Electromagnetic Device for Stopping Vehicles
Measurement of Electromagnetic Interference of Electronic Devices
Security of Seniors - The Detection and Prevention of Falls
Scanning Probe Microscopy Used for 3D Topography Image Acquisition of Marks on Cartidge Cases in Forensic Ballistics Methodology of Determination of Uncertainties by Using Biometric Device iCAM 7000 Hana Talandova, Lukas Kralik, Milan Adamek
The Principle of 3D Sensors
Node Compromise Detection Based on Parameter Grouping in Wireless Sensor Networks |
||||
Copyright (c) 2006-2016, IARIA