ICCWS 2020 15th International Conference on Cyber Warfare and Security

Front Cover
Prof. Brian K. Payne , Prof. Hongyi Wu
Academic Conferences and publishing limited, Mar 12, 2020 - History
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

MiniDrones Swarms and Their Potential in Conflict Martti Lehto and Bill Hutchinson
326
ii
334
The Advantages of Artificial Intelligence for Channel Estimation Christoph Lipps Sachinkumar Bavikatti Mallikarjun Mathias Strufe and Hans Dieter
335
Case of Lesotho Mamoqenelo Priscilla Morolong Fungai Bhunu Shava and Attlee M Gamundani
346
Complex Network Analysis for Evaluating Effects of Asymmetry Established by Closed National Networks JuhaPekka Nikkarila and Vesa Kuikka
355
Situations
356
Impact of Security and Trust as Factors that influence the Adoption and Use of Digital Technologies that Generate Collect and Transmit User Data Fo...
363
An Exploration through the Lens of Biocybersecurity XavierLewis Palmer and Saltuk Karahan
373

Electronic Healthcare Record and Cyber Security Sarah Bouazzaoui and Charles Daniels
67
A Warfare Domain Approach to the Disinformation Mustafa Canan and Anthony Akil
82
Reverse Mustafa Canan and Daphne Canan
92
Paradigm
98
Fingerprinting Vehicles With CAN Bus Data Samples David R Crow Scott R Graham and Brett J Borghetti
110
Mathematically Modelling CyberAttacks Utilizing Chuck Easttom
119
Applying Systems Engineering Principles to Chuck Easttom and William Butler
127
From Simple Scoring Towards a Meaningful Margus Ernits Kaie Maennel Sten Mäses
135
Interpretation of Learning in Cybersecurity Exercises Toomas Lepik and Olaf Maennel
144
Leveraging Serious Games in Air Force MultiDomain Nathaniel Flack Christopher Voltz Richard
155
A Pilot Study Dill Alan Lin and Mark Reith
165
Connected Vehicle Security Guillermo A Francia III
173
Cyberwar as a New Type of War? Petr Frantis
182
An Analysis of Connected Cars Technology and Ahmad Ghafarian and Saman Sardari
195
A Virginia A Greiman
204
Information Policy Security Compliance in Dutch Vincent Homburg and Jeroen Kokje
211
Notre Dame Fire Conspiracism as Reflective of Michael Bennett Hotchkiss
219
The Critical Need for Tool Validation before Using Nicolas Hughes and Cihan Varol
228
Avoiding the Pitfalls of an Artificial Reality Is A I Real John S Hurley and Dorothy O Potter
236
Toward an Ambidextrous Framework for Offensive Gazmend Huskaj and Ion A Iftimie
243
Anticipatory Ethics for Vulnerability Disclosure Gazmend Huskaj and Richard L Wilson
254
The Use of Signals Intelligence in Offensive Ion A Iftimie and Richard L Wilson
262
Customers Perception of Cybersecurity Threats Abdul Bashiru Jibril Michael Adu Kwarteng
270
A Fast Alert Correlation Method with Bayesian Minchul Kim Youngwoo Park Insung Han
277
Feature Constraints and Sungyoung
286
Digital Forensic Readiness Framework for Software Maxime Lagrasse Avinash Singh Howard
296
Representing Strategic Cyber and Information Hyong Lee and James DeMuth
306
The New Game Changer in the Martti Lehto and Gerhard Henselmann
316
Systemic Methodology for Cyber Offense and Defense C Ariel Pinto and Matthew Zurasky
380
Distributed Authority as a Guiding set of Principles for Transnational Cyber Security Governance Karine Pontbriand
391
The New Role of the Next Generation CFO Dorothy O Potter and John S Hurley
398
Leveraging the Benefits of Big Data with Fast Data for Effective and Efficient Cybersecurity Analytics Paresh Rathod and Timo Hämäläinen
411
International Information Power and Foreign Malign Influence in Cyberspace Joseph H Schafer
423
Bottomup Initiatives as Forms of Cyber Arms Control? Jantje A M Silomon
431
Trust but Verify in Complex Systems Theresa Sobb Char Sample Cragin Shelton and Benjamin Turnbull
439
NetFlow Based Framework for Identifying Anomalous End User Nodes Risto Vaarandi and Mauno Pihelgas
448
IoT based Adversarial Attacks Effect on Cloud Data Platform Services in a Smart Building Context Petri Vähäkainu Martti Lehto and Antti Kariluoto
457
The Effectiveness of Malware in a Heterogeneous Software Environment Brandon Webster Matthew Stenger Alix Valcin Joel Coffman and Carlos Sa...
466
A Method for Teaching Open Source Intelligence OSINT Using Personalised Cloudbased Exercises Saber Yari Sten Mäses and Olaf Maennel
480
Examining the Known Truths in Cyber Threat Intelligence The Case of STIX Siri Bromander Lilly Pijnenburg Muller Martin Eian and Audun Jøsang
493
Bootcamp Emin Caliskan and Risto Vaarandi
503
An Anticipatory Ethical Analysis of Offensive Cyberspace Operations Gazmend Huskaj and Richard L Wilson
512
Rising to the Challenge of Insider Threats for Middle Powers Jessemyn Modini Mark Van Zomeren Stuart Fowler Keith Joiner and Tim Lynar
521
Psychometric Modelling of Cybersecurity Roles Paul Wyatt Poteete
530
iii
537
National Cyber Threat Prevention Mechanism as a part of the EEWS Jussi Simola and Martti J Lehto
539
The Rise of Australian Cyber Warfare Capability Andrew Williams
549
Masters Research Papers
557
A Review of Security System Assessment Tools Suitable for eHealth in Namibia Naemi Gerson and Fungai Bhunu Shava
569
An Analysis of Social Networking Threats Jennyphar Kahimise and Fungai Bhunu Shava
576
A Case for a Dynamic Approach to Digital Forensic Readiness in an SDN Platform Howard Munkhondya Adeyemi R Ikuesan and Hein S Venter
584
Non Academic Paper
595
Work In Progress Paper
607
A Defined Digital Forensic Criteria for Cybercrime Reporting Stacey Omeleze Baror Richard Adeyemi Ikuesan and Hein S Venter
617
Digital Forensic Readiness Framework for Smart Sebastien Philomin Avinash Singh Adeyemi
627
Copyright

Common terms and phrases

Bibliographic information