ECCWS 2018 17th European Conference on Cyber Warfare and Security V2Audun Jøsang |
Contents
Continuous Identity Verification in Cloud Storage Services Using Behavioural Profiling Burhan AlBayati Nathan Clarke Paul Dowland and Fudong Li | 11 |
A MultiAlgorithmic Approach for Gait Recognition Hind AlObaidi Fudong Li Nathan Clarke Bogdan Ghita and Salam | 20 |
Preventing Cybercrime Susceptibility Using Browser Specific Warning Badges Frans Blauw | 29 |
Security Threats and Measures on Multifunctional Devices Johnny Botha and Sune Von Solms | 38 |
Can Football Teach Students to Become Better Cybersecurity Professionals? Matthew Bovee and Huw Read | 49 |
TimeLine Alignment of Cyber Incidents in Heterogeneous Environments Agn Brilingait Linas Bukauskas and Eduardas Kutka | 57 |
Modeling a Decision Makers Processes Viacheslav Burlov Georgievich | 66 |
Are we There yet? Jami Carroll | 77 |
Building Automatic and Intelligent Cyber AttackDefense Platform ChungKuan Chen and Shiuhpyng Winston Shieh | 96 |
Does Conventional Deterrence Work in the Cyber Domain? Jim Chen | 106 |
ReEstablishing Trust Within and Among Partner Organizations Following a Cyber Incident Mitch Cochran | 112 |
Social Media Advocacy in the MustFall Campaigns in South Africa Zama Dlamini Linda Malinga Thulani Masiane and Maduvha | 120 |
Digital Rights Management to Protect Private Data on the Internet Jaco du Toit | 128 |
A Selective Literature Review on Cyber Counterintelligence Petrus Duvenage Victor Jaquire and Sebastian von Solms | 137 |
Comparative Analysis of Ruben Elamiryan and Radomir | 146 |
iii | 536 |
A Teaching Perspective Lorena Carthy Elisabeth Øvensen Rachael Little Iain Sutherland Huw | 87 |
Common terms and phrases
activities actors algorithm analysis application approach apps attack Available behaviour capabilities challenges classified communication concept criteria critical infrastructure CSTO Cyber Operations cyber security Cyber Warfare cyber weapons cyber-attacks cyberspace Cyberwar database dataset Defense deterrence devices digital forensics domain encryption environment evaluation example exploit Facebook fake Figure files Finnish Border Guard framework functions identify IEEE impact implementation information security Information Warfare intelligence Internet investigation machine learning malware messages metadata military monitoring North Korea nuclear ontology organisation organizations OSINT paper password patriotic hackers performance phishing port scans protection protocol requirements resilience response Retrieved risk Russian scenario sector SecuSeal server situational awareness smartphone social media SPARQL specific strategy target technical traffic trust University University of Johannesburg vulnerabilities