|
||||
The papers listed below have been selected as "Best Papers" based on the reviews of the original submission, the camera-ready version, and the presentation during the conference. For the awarded papers, a digital award will be issued in the name of the authors. The authors of these papers are also receiving invitations to submit an extended article version to one of the IARIA Journals. Awarded Papers A Context-Aware Malware Detection Based on Low-Level Hardware Indicators as a Last Line of Defense An Empirical Study of Root-Cause Analysis in Information Security Management Assessing Security Protection for Sensitive Data RMDM – A Conceptual ICT Risk-Meta-Data-Model - Applied to COBIT for Risk as underlying Risk Model Extending Vehicle Attack Surface Through Smart Devices Policy-Aware Provisioning Plan Generation for TOSCA-based Applications Large-Scale Analysis of Domain Blacklists A System to Save the Internet from the Malicious Internet of Things at Home Frictionless Authentication Systems: Emerging Trends, Research Challenges and Opportunities
The following papers have been selected on the basis of their contents, specificaly for lending themselves to an interesting extended work. The authors of these papers are receiving invitations to submit an extended article version to one of the IARIA Journals. Papers Invited for IARIA Journals Secure Software Development – Models, Tools, Architectures and Algorithms Identifying and Managing Risks in Interconnected Utility Networks Protecting Eavesdropping over Multipath TCP Communication Based on Not-Every-Not-Any Protection Visual Risk Specification and Aggregation Addressing Complex Problem Situations in Critical Infrastructures using Soft Systems Analysis: The CS-AWARE Approach Stochastic Dependencies Between Critical Infrastructures Recommendations for Risk Analysis in Higher Education Institutions An Analysis of Automotive Security Based on a Reference Model for Automotive Cyber Systems Hugin: A Scalable Hybrid Android Malware Detection System Frictionless Authentication System: Security & Privacy Analysis and Potential Solutions |
||||
Copyright (c) 2006-2017, IARIA