NexTech 2021 Congress
October 03, 2021 to October 07, 2021 - Barcelona, Spain

  • UBICOMM 2021, The Fifteenth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
  • ADVCOMP 2021, The Fifteenth International Conference on Advanced Engineering Computing and Applications in Sciences
  • SEMAPRO 2021, The Fifteenth International Conference on Advances in Semantic Processing
  • AMBIENT 2021, The Eleventh International Conference on Ambient Computing, Applications, Services and Technologies
  • EMERGING 2021, The Thirteenth International Conference on Emerging Networks and Systems Intelligence
  • DATA ANALYTICS 2021, The Tenth International Conference on Data Analytics
  • GLOBAL HEALTH 2021, The Tenth International Conference on Global Health Challenges
  • CYBER 2021, The Sixth International Conference on Cyber-Technologies and Cyber-Systems

SoftNet 2021 Congress
October 03, 2021 to October 07, 2021 - Barcelona, Spain

  • ICSEA 2021, The Sixteenth International Conference on Software Engineering Advances
  • ICSNC 2021, The Sixteenth International Conference on Systems and Networks Communications
  • CENTRIC 2021, The Fourteenth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services
  • VALID 2021, The Thirteenth International Conference on Advances in System Testing and Validation Lifecycle
  • SIMUL 2021, The Thirteenth International Conference on Advances in System Simulation
  • SOTICS 2021, The Eleventh International Conference on Social Media Technologies, Communication, and Informatics
  • INNOV 2021, The Tenth International Conference on Communications, Computation, Networks and Technologies
  • HEALTHINFO 2021, The Sixth International Conference on Informatics and Assistive Technologies for Health-Care, Medical Support and Wellbeing

NetWare 2021 Congress
November 14, 2021 to November 18, 2021 - Athens, Greece

  • SENSORCOMM 2021, The Fifteenth International Conference on Sensor Technologies and Applications
  • SENSORDEVICES 2021, The Twelfth International Conference on Sensor Device Technologies and Applications
  • SECURWARE 2021, The Fifteenth International Conference on Emerging Security Information, Systems and Technologies
  • AFIN 2021, The Thirteenth International Conference on Advances in Future Internet
  • CENICS 2021, The Fourteenth International Conference on Advances in Circuits, Electronics and Micro-electronics
  • ICQNM 2021, The Fifteenth International Conference on Quantum, Nano/Bio, and Micro Technologies
  • FASSI 2021, The Seventh International Conference on Fundamentals and Advances in Software Systems Integration
  • GREEN 2021, The Sixth International Conference on Green Communications, Computing and Technologies

TrendNews 2021 Congress
November 14, 2021 to November 18, 2021 - Athens, Greece

  • CORETA 2021, Advances on Core Technologies and Applications
  • DIGITAL 2021, Advances on Societal Digital Transformation

 


ThinkMind // CYBER 2020, The Fifth International Conference on Cyber-Technologies and Cyber-Systems

Type: conference

Download: CYBER 2020 cover page

Download: CYBER 2020 foreword page

Download: CYBER 2020 committee page

Download: CYBER 2020 table of contents

Download: CYBER 2020 full proceedings

Notes: IARIA Conference.

Editors:
Steve Chan, Decision Engineering Analysis Laboratory, USA
Manuela Popescu, IARIA, EU/USA
Khurram Bhatti, Information Technology University (ITU), Lahore, Pakistan
Maria Mushtaq, LIRMM –CNRS, University of Montpellier, France
Xing Liu, Kwantlen Polytechnic University, Surrey, B.C., Canada

Event editions: - there are 6 editions.

ISSN: 2519-8599

ISBN: 978-1-61208-818-1

Location: Nice, France

Dates: from October 25, 2020 to October 29, 2020

Articles: there are 15 articles

PCache: Permutation-based Cache to Counter Eviction-based Cache-based Side-Channel Attacks
Muhammad Asim Mukhtar, Muhammad Khurram Bhatti, and Guy Gogniat
keywords: Cache-based side-channel attacks, Randomization, Prime+Probe attack

Efficient AES Implementation for Better Resource Usage and Performance of IoTs
Umer Farooq, Maria Mushtaq, and Muhammad Khurram Bhatti
keywords: Cryptography, Embedded Security, AES

Challenges of Using Performance Counters in Security Against Side-Channel Leakage
Maria Mushtaq, Pascal Benoit, and Umer Farooq
keywords: Counters; Side-Channel Attacks(SCAs); Cryptography; Detection; Mitigation; Machine Learning;Security; Privacy.

Side Channel Attacks on RISC-V Processors: Current Progress, Challenges, and Opportunities
Mahya Morid Ahmadi, Faiq Khalid, and Muhammad Shafique
keywords: RISC-V, Side-channel, secure ISA, microprocessors, cache, hardware security

Exploiting Vulnerabilities in Deep Neural Networks: Adversarial and Fault-Injection Attacks
Faiq Khalid, Muhammad Abdullah Hanif, and Muhammad Shafique
keywords: Deep Neural Networks, Adversarial Attacks, Machine Learning Security, Fault-injection Attacks

Cyber and Emergent Technologies: Current and Future Ramifications
Joshua Sipper
keywords: quantum, nanotechnology, meta-reality, microbiome, artificial, machine

The Cyber Microbiome and the Cyber Meta-reality
Joshua Sipper
keywords: cyber, microbiome, meta-reality, archive, code, malware

Dismissing Poisoned Digital Evidence from Blockchain of Custody
David Billard
keywords: Digital Evidence; Blockchain; Chain of custody; Privacy

A Privacy-Preserving Architecture for the Protection of Adolescents in Online Social Networks
Markos Charalambous, Petros Papagiannis, Antonis Papasavva, Pantelitsa Leonidou, Rafael Constaninou, Lia Terzidou, Theodoros Christophides, Pantelis Nicolaou, Orfeas Theofanis, George Kalatzantonakis, and Michael Sirivianos
keywords: online social networks; online threats; cybersecurity risks; privacy; minors

Resilient Communications Availability Inverting the Confidentiality, Integrity, and Availability Paradigm
Steve Chan
keywords: Communications networks; Cyber electromagnetic spectrum; Radio frequency cellular coverage; Internet Protocol-based coverage; Signal boosters; Oscillation detection; Oscillation prevention; Spectrum analyzer; Smart auto switching; Non-bonded single channe

Mitigation Factors for Multi-domain Resilient Networked Distributed Tessellation Communications
Steve Chan
keywords: Transceiver polygons; Signal processing; Beamforming; Non-permissive cyber electromagnetic environment; 5G networks; Smart grids; Covariance matrix; Spatial filtering algorithms; Convex optimization problems; Semidefinite programming solvers; Space-Time A

Virtual Private Blockchains: Security Overlays for Permissioned Blockchains.
Samuel Onalo, Deepak Gc, and Eckhard Pfluegel
keywords: Public Blockchain; Private Blockchain; Permissioned Blockchain; Blockchain Confidentiality; Security Overlays; Virtual Private Networks; Secret Sharing.

Security Requirement Modeling for a Secure Local Energy Trading Platform
Yasamin Mahmoodi, Christoph Groß, Sebastian Reiter, Alexander Viehl, and Oliver Bringmann
keywords: Security analysis, IoT, Security requirement, Security-by-design.

Analyzing Power Grid, ICT, and Market Without Domain Knowledge Using Distributed Artificial Intelligence
Eric Veith, Stephan Balduin, Nils Wenninghoff, Martin Tröschel, Lars Fischer, Astrid Nieße, Thomas Wolgast, Richard Sethmann, Bastian Fraune, and Torben Woltjen
keywords: Cyber-Physical Systems Analysis; Distributed Artificial Intelligence; Reinforcement Learning; ICT Security; Market Design.

Fast Electronic Identification at Trust Substantial Level using the Personal Online Bank Account
Michael Massoth and Sam Louis Ahier
keywords: authentication; identity management; tokenization; substantial trust level; Payment Service Directive 2

SERVICES CONTACT
2010 - 2017 © ThinkMind. All rights reserved.
Read Terms of Service and Privacy Policy.