CYBER 2019 - The Fourth International Conference on Cyber-Technologies and Cyber-Systems
September 22, 2019 - September 26, 2019
CYBER 2019: Awards
The papers listed below have been selected as "Best Papers" based on the reviews of the original submission, the camera-ready version, and the presentation during the conference. For the awarded papers, a digital award will be issued in the name of the authors. The authors of these papers are also receiving invitations to submit an extended article version to one of the IARIA Journals.
Awarded Papers
Enhancing Attack Resilience by Protecting the Physical-World Interface of Cyber-Physical Systems
Rainer Falk, Steffen Fries
Fast Training of Support Vector Machine for Forest Fire Prediction
Steve Chan, Ika Oktavianti Najib, Verlly Puspita
A Fraud Detection Framework using Machine Learning Approach
Aderonke Thompson, Oghenerukvwe Oyinloye, Leon Aborisade, Esther Odeniyi
Annealed Cyber Resiliency: Cyber Discernment for the Launch Providers of Space Systems
Steve Chan, Bob Griffin
Recovery of Forensic Artefacts from a Smart Home IoT Ecosystem
M A Hannan Bin Azhar, Samuel Benjamin Louis Bate
How Much Cyber Security is Enough?
Anne Coull
The following papers have been selected on the basis of their contents, specificaly for lending themselves to an interesting extended work. The authors of these papers are receiving invitations to submit an extended article version to one of the IARIA Journals.
Papers Invited for IARIA Journals
Detecting Spectre Vulnerabilities by Sound Static Analysis
Daniel Kästner, Laurent Mauborgne, Christian Ferdinand, Henrik Theiling
Hardware Implementation of Lightweight Chaos-Based Stream Cipher
Guillaume Gautier, Maguy Le Glatin, Safwan El Assad, Wassim Hamidouche, Olivier Deforges, Sylvain Guilley, Adrien Facon
Comparisons of Forensic Tools to Recover Ephemeral Data from iOS Apps Used for Cyberbullying
Aimee Chamberlain, M A Hannan Bin Azhar
Surveying and Enhancing Grid Resilience Sensor Communications: An Amalgam of Narrowband, Broadband, and Hybridizing Spread Spectrum
Steve Chan, Ika Oktavianti Najib, Verlly Puspita
Context-Referenced Telemetry Data for Distribution Utilities: Quality Assurance/Quality Control by Lateral Sensors
Steve Chan, Ika Oktavianti Najib, Verlly Puspita
Threat Based Cyber Security Investment Strategies [PRESENTATION]
Anita Bhat
Refinement Checker for Embedded Object Code Verification
Mohana Asha Latha Dubasi, Sudarshan K. Srinivasan, Sana Shuja, Zeyad A. Al-Odat