CYBER 2018 - The Third International Conference on Cyber-Technologies and Cyber-Systems
November 18, 2018 - November 22, 2018
CYBER 2018: Awards
The papers listed below have been selected as "Best Papers" based on the reviews of the original submission, the camera-ready version, and the presentation during the conference. For the awarded papers, a digital award will be issued in the name of the authors. The authors of these papers are also receiving invitations to submit an extended article version to one of the IARIA Journals.
Awarded Papers
Cyber Security Using Bayesian Attack Path Analysis
Remish Leonard Minz, Sanjana Pai Nagarmat, Ramesh Rakesh, Yoshiaki Isobe
Prototype Orchestration Framework as a High Exposure Dimension Cyber Defense Accelerant Amidst Ever-Increasing Cycles of Adaptation by Attackers
Steve Chan
Threat Analysis using Vulnerability Databases - Matching Attack Cases to Vulnerability Database by Topic Model Analysis -
Umezawa Katsuyuki, Mishina Yusuke, Wohlgemuth Sven, Takaragi Kazuo
A Methodology For Synthesizing Formal Specification Models From Requirements for Refinement-Based Object Code Verification
Eman Al-Qtiemat, Sudarshan K. Srinivasan, Mohana Asha Latha Dubasi, Sana Shuja
The following papers have been selected on the basis of their contents, specificaly for lending themselves to an interesting extended work. The authors of these papers are receiving invitations to submit an extended article version to one of the IARIA Journals.
Papers Invited for IARIA Journals
A Comparative Evaluation of Automated Vulnerability Scans Versus Manual Penetration Tests on False-negative Errors
Saed Alavi, Niklas Bessler, Michael Massoth
A Taxonomy of Attacks via the Speech Interface
Mary K. Bispham, Ioannis Agrafiotis, Michael Goldsmith
Countering an Anti-Natural Language Processing Mechanism in the Computer-Mediated Communication of “Trusted” Cyberspace Operations
Steve Chan
Harnessing Machine Learning, Data Analytics, and Computer-Aided Testing for Cyber Security Applications
Thomas Klemas, Steve Chan
Prototype Open-Source Software Stack for the Reduction of False Positives and Negatives in the Detection of Cyber Indicators of Compromise and Attack
Steve Chan
Prediction of Underground Fire Behavior in South Sumatra: Using Support Vector Machine With Adversarial Neural Network Support
Ika Oktavianti Najib
Reviewing National Cybersecurity Awareness in Africa: An Empirical Study
Maria Bada, Basie Von Solms, Ioannis Agrafiotis
IoT-Based Secure Embedded Scheme for Insulin Pump Data Acquisition and Monitoring
Zeyad A. Al-Odat, Sudarshan K. Srinivasan, Eman Al-Qtiemat, Mohana Asha Latha Dubasi, Sana Shuja
A Methodology For Synthesizing Formal Specification Models From Requirements for Refinement-Based Object Code Verification
Eman Al-Qtiemat, Sudarshan K. Srinivasan, Mohana Asha Latha Dubasi, Sana Shuja