ThinkMind // CYBER 2020, The Fifth International Conference on Cyber-Technologies and Cyber-Systems
Download: CYBER 2020 cover page
Download: CYBER 2020 foreword page
Download: CYBER 2020 committee page
Download: CYBER 2020 table of contents
Download: CYBER 2020 full proceedings
Notes: IARIA Conference.
Steve Chan, Decision Engineering Analysis Laboratory, USA
Manuela Popescu, IARIA, EU/USA
Khurram Bhatti, Information Technology University (ITU), Lahore, Pakistan
Maria Mushtaq, LIRMM –CNRS, University of Montpellier, France
Xing Liu, Kwantlen Polytechnic University, Surrey, B.C., Canada
Event editions: - there are 6 editions.
Location: Nice, France
Dates: from October 25, 2020 to October 29, 2020
Articles: there are 15 articles
PCache: Permutation-based Cache to Counter Eviction-based Cache-based Side-Channel Attacks
Muhammad Asim Mukhtar, Muhammad Khurram Bhatti, and Guy Gogniat
keywords: Cache-based side-channel attacks, Randomization, Prime+Probe attack
Efficient AES Implementation for Better Resource Usage and Performance of IoTs
Umer Farooq, Maria Mushtaq, and Muhammad Khurram Bhatti
keywords: Cryptography, Embedded Security, AES
Challenges of Using Performance Counters in Security Against Side-Channel Leakage
Maria Mushtaq, Pascal Benoit, and Umer Farooq
keywords: Counters; Side-Channel Attacks(SCAs); Cryptography; Detection; Mitigation; Machine Learning;Security; Privacy.
Side Channel Attacks on RISC-V Processors: Current Progress, Challenges, and Opportunities
Mahya Morid Ahmadi, Faiq Khalid, and Muhammad Shafique
keywords: RISC-V, Side-channel, secure ISA, microprocessors, cache, hardware security
Exploiting Vulnerabilities in Deep Neural Networks: Adversarial and Fault-Injection Attacks
Faiq Khalid, Muhammad Abdullah Hanif, and Muhammad Shafique
keywords: Deep Neural Networks, Adversarial Attacks, Machine Learning Security, Fault-injection Attacks
Cyber and Emergent Technologies: Current and Future Ramifications
keywords: quantum, nanotechnology, meta-reality, microbiome, artificial, machine
The Cyber Microbiome and the Cyber Meta-reality
keywords: cyber, microbiome, meta-reality, archive, code, malware
Dismissing Poisoned Digital Evidence from Blockchain of Custody
keywords: Digital Evidence; Blockchain; Chain of custody; Privacy
A Privacy-Preserving Architecture for the Protection of Adolescents in Online Social Networks
Markos Charalambous, Petros Papagiannis, Antonis Papasavva, Pantelitsa Leonidou, Rafael Constaninou, Lia Terzidou, Theodoros Christophides, Pantelis Nicolaou, Orfeas Theofanis, George Kalatzantonakis, and Michael Sirivianos
keywords: online social networks; online threats; cybersecurity risks; privacy; minors
Resilient Communications Availability Inverting the Confidentiality, Integrity, and Availability Paradigm
keywords: Communications networks; Cyber electromagnetic spectrum; Radio frequency cellular coverage; Internet Protocol-based coverage; Signal boosters; Oscillation detection; Oscillation prevention; Spectrum analyzer; Smart auto switching; Non-bonded single channe
Mitigation Factors for Multi-domain Resilient Networked Distributed Tessellation Communications
keywords: Transceiver polygons; Signal processing; Beamforming; Non-permissive cyber electromagnetic environment; 5G networks; Smart grids; Covariance matrix; Spatial filtering algorithms; Convex optimization problems; Semidefinite programming solvers; Space-Time A
Virtual Private Blockchains: Security Overlays for Permissioned Blockchains.
Samuel Onalo, Deepak Gc, and Eckhard Pfluegel
keywords: Public Blockchain; Private Blockchain; Permissioned Blockchain; Blockchain Confidentiality; Security Overlays; Virtual Private Networks; Secret Sharing.
Security Requirement Modeling for a Secure Local Energy Trading Platform
Yasamin Mahmoodi, Christoph Groß, Sebastian Reiter, Alexander Viehl, and Oliver Bringmann
keywords: Security analysis, IoT, Security requirement, Security-by-design.
Analyzing Power Grid, ICT, and Market Without Domain Knowledge Using Distributed Artificial Intelligence
Eric Veith, Stephan Balduin, Nils Wenninghoff, Martin Tröschel, Lars Fischer, Astrid Nieße, Thomas Wolgast, Richard Sethmann, Bastian Fraune, and Torben Woltjen
keywords: Cyber-Physical Systems Analysis; Distributed Artificial Intelligence; Reinforcement Learning; ICT Security; Market Design.
Fast Electronic Identification at Trust Substantial Level using the Personal Online Bank Account
Michael Massoth and Sam Louis Ahier
keywords: authentication; identity management; tokenization; substantial trust level; Payment Service Directive 2