ECCWS 2017 16th European Conference on Cyber Warfare and SecurityAcademic Conferences and publishing limited, 2017 |
Inhoudsopgave
1 | |
8 | |
17 | |
24 | |
34 | |
44 | |
53 | |
2015 2016 Johnny Botha Marthie Grobler and Mariki Eloff | 63 |
The use of Information Weapons in the 2016 US Presidential Election Emily Darraj Char Sample and Jennifer Cowley | 92 |
Strong Authentication for Internet Application Libor Dostálek | 102 |
Theory That Really Matters Petrus Duvenage Thenjiwe Sithole and Sebastian von Solms | 109 |
Towards Basic Design Principles for High and MediumInteraction Honeypots Daniel Fraunholz Frederic Pohl and Hans Dieter Schotten | 120 |
Practical Considerations on the Provisioning of Protection Strategies in Process Control Systems Bela Genge Flavius Graur Bogdan Crainicu and Piros... | 127 |
Threats Countermeasures and Perspectives CarlHeinz Genzel Olav Hoffmann and Richard Sethmann | 138 |
Cyberwarfare and the Winds of Change in World Politics Virginia Greiman | 146 |
Artificial Intelligence Within the Military Domain and Bil Hallaq Tiia Somer AnnaMaria | 153 |
Development of an Educational Platform for Cyber Defence Training Agnė Brilingaitė Linas Bukauskas and Eduardas Kutka | 73 |
Treating Personal Data Like Digital Pollution Ivan Burke and Renier Pelser van Heerden | 82 |
iii | 541 |
Veelvoorkomende woorden en zinsdelen
activities algorithm analysis application approach assessment Available botnet browser capability CCOPs communication created critical infrastructure cyber attacks cyber threat cybercrime cybersecurity cyberspace cyberwar data breaches database dataset defined devices digital forensic distribution domain encryption endianness entities environment Estonia evaluation exfiltration fake Figure framework function global grid identified IEEE implementation information security Information Warfare integrity intelligence interaction International Internet intrusion detection investigation Katakri layer machine machine learning malicious node malware measures metrics military monitoring national cybersecurity network traffic operations organisations organizations paper participants password phishing potential proposed protection protocol Ransomware requirements response RuNet Russian scenario Section security awareness server simulation situational awareness smart smart grid smartphone social media South Korea specific strategy structure target techniques University VANETs virus vulnerability