Iccws 2019 Proceedings

These proceedings represent the work of contributors to the 14th International Conference on Cyber Warfare and Security (ICCWS 2019), jointly hosted by Stellenbosch University and the Council of Scientific & Industrial Research (CSIR), ...


Author: Noelle Van Der Waag-Cowling


ISBN: 1912764113


Page: 698

View: 406

These proceedings represent the work of contributors to the 14th International Conference on Cyber Warfare and Security (ICCWS 2019), jointly hosted by Stellenbosch University and the Council of Scientific & Industrial Research (CSIR), South Africa on 28 February - 1 March 2019. The Conference Chair is Noëlle van der Waag-Cowling from Stellenbosch University and the Programme Chair is Prof. Louise Leenen, from the University of the Western Cape. ICCWS is a well-established event on the academic research calendar and in its 14th year the key aim remains the opportunity for participants to share ideas and meet the people who hold them. The scope of papers will ensure an interesting two days. The subjects covered illustrate the wide range of topics that fall into this important and ever-growing area of research. We would like to thank the support of the South African chapter of the Information Systems Audit and Control Association (ISACA). This year at ICCWS there will be four keynote addresses by a number of prominent academics in the field as well as insights from practice. Sascha Bachmann from Bournemouth University, UK will speak on the topic of Hybrid Conflict as 21st Century Conflict. We will have an address by Dr. Edward L. Mienie from the University of North Georgia, Dahlonega, USA who will talk about The Role of Cyber in National and Global Human Security. A talk from Dr John Hurley will focus on The Evolving Demands of a Data-Driven Society: The New Cyber Challenge. A keynote will be given by Theodorus Brigadier (Piet) Pieterse from the South African Police Service giving insights into Cybercrime Investigation. With an initial submission of 163 abstracts, after the double blind, peer review process there are 58 Academic research papers, 6 PhD research papers, 9 Masters Research papers, 1 non-academic paper and 2 work-in-progress papers published in these Conference Proceedings. These papers represent research from Austria, China, Estonia, Ethiopia, Finland, Germany, Mozambique, Namibia, Netherlands, Nigeria, Russia, South Africa, Sweden, Taiwan, United Kingdom and the United States of America.

ICCWS 2019 14th International Conference on Cyber Warfare and Security

ICCWS 2019 Noëlle van der Waag-Cowling, Louise Leenen ... the handling procedures tend to be more stringent the higher the sensitivity level.


Author: Noëlle van der Waag-Cowling

Publisher: Academic Conferences and publishing limited

ISBN: 9781912764129

Category: Language Arts & Disciplines


View: 772

Jihadism Revisited

Stellenbosch: ICCWS 2019 Proceedings. Haberl, F. (2016). The Art Of Darkness. Ideological Foundations And Present Implications Of Jihadi Counterintelligence ...


Author: Rüdiger Lohlker

Publisher: Logos Verlag Berlin GmbH

ISBN: 9783832550097

Category: Political Science

Page: 193

View: 146

Studying Jihadism is an endeavor facing several problems. For many researchers and the reading public it is difficult to accept that Jihadists do have a theology of their own and not some kind of ideology. Understanding that a phenomenon of communication that is done to a large extent in Arabic is not to be understood if research is done communication translated into or written in English. Saying it is al out there in the Internet without understanding Internet communication will help to understand terrorist phenomena like Jihadism. Ignoring that there is Jihadism IS and al-Qa'ida will guarantee that research will not be able to see the broad range of Jihadism. Last but not least, research not interested in the technologies, practices, etc., Jihadists use to commit terrorist attacks, cannot claim to study Jihadism. The contributions in this book provide knowledge in all these fields: based on Arabic language sources, theological aspects, Internet communication, groups usually ignored, the role of infographics, technical aspects, and covert and intelligence actions.

ECCWS 2020 20th European Conference on Cyber Warfare and Security

ICCWS 2019 Proceedings. Hegghammer, T. (2017). Jihadi Culture. Cambridge: Cambridge University Press. Heinze, M.-C. (2014).


Author: Dr Thaddeus Eze

Publisher: Academic Conferences and publishing limited

ISBN: 9781912764624

Category: Computers


View: 614

These proceedings represent the work of contributors to the 19th European Conference on Cyber Warfare and Security (ECCWS 2020), supported by University of Chester, UK on 25-26 June 2020. The Conference Co-chairs are Dr Thaddeus Eze and Dr Lee Speakman, both from University of Chester and the Programme Chair is Dr Cyril Onwubiko from IEEE and Director, Cyber Security Intelligence at Research Series Limited. ECCWS is a well-established event on the academic research calendar and now in its 19th year the key aim remains the opportunity for participants to share ideas and meet. The conference was due to be held at University of Chester, UK, but due to the global Covid-19 pandemic it was moved online to be held as a virtual event. The scope of papers will ensure an interesting conference. The subjects covered illustrate the wide range of topics that fall into this important and ever-growing area of research.

Artificial Intelligence Paradigms for Smart Cyber Physical Systems

In Proceedings Workshop on Languages for Automation Symbiotic and Intelligent ... In ICCWS 2019 14th International Conference on Cyber Warfare and Security ...


Author: Ashish Kumar Luhach

Publisher: IGI Global

ISBN: 9781799851028

Category: Computers

Page: 392

View: 113

Cyber-physical systems (CPS) have emerged as a unifying name for systems where cyber parts (i.e., the computing and communication parts) and physical parts are tightly integrated, both in design and during operation. Such systems use computations and communication deeply embedded in and interacting with human physical processes as well as augmenting existing and adding new capabilities. As such, CPS is an integration of computation, networking, and physical processes. Embedded computers and networks monitor and control the physical processes, with feedback loops where physical processes affect computations and vice versa. The economic and societal potential of such systems is vastly greater than what has been realized, and major investments are being made worldwide to develop the technology.

Artificial Intelligence Paradigms for Smart Cyber-Physical Systems focuses on the recent advances in Artificial intelligence-based approaches towards affecting secure cyber-physical systems. This book presents investigations on state-of-the-art research issues, applications, and achievements in the field of computational intelligence paradigms for CPS. Covering topics that include autonomous systems, access control, machine learning, and intrusion detection and prevention systems, this book is ideally designed for engineers, industry professionals, practitioners, scientists, managers, students, academicians, and researchers seeking current research on artificial intelligence and cyber-physical systems.

11th International Conference on Cyber Warfare and Security

In Proceedings of Western European Workshop on Research in Cryptography, Leuven, ... -report-with2019-cloud-computing-pricing-and-revenue-forecasts, Dallas.


Author: Dr Tanya Zlateva and Professor Virginia Greiman

Publisher: Academic Conferences and publishing limited

ISBN: 9781910810828

Category: Reference

Page: 516

View: 397

The 11thInternational Conference on Cyber Warfare and Security (ICCWS 2016) is being held at Boston University, Boston, USA on the 17-18th March 2016. The Conference Chair is Dr Tanya Zlateva and the Programme Chair is Professor Virginia Greiman, both from Boston University. ICCWS is a recognised Cyber Security event on the International research conferences calendar and provides a valuable platform for individuals to present their research findings, display their work in progress and discuss conceptual and empirical advances in the area of Cyber Warfare and Cyber Security. It provides an important opportunity for researchers and managers to come together with peers to share their experiences of using the varied and expanding range of Cyberwar and Cyber Security research available to them. The keynote speakers for the conference are Daryl Haegley from the Department of Defense (DoD), who will address the topic Control Systems Networks...What's in Your Building? and Neal Ziring from the National Security Agency who will be providing some insight to the issue of Is Security Achievable? A Practical Perspective. ICCWS received 125 abstract submissions this year. After the double blind, peer review process there are 43 Academic Research Papers 8 PhD papers Research papers, 7 Masters and 1 work-in-progress papers published in these Conference Proceedings. These papers represent work from around the world, including: Australia, Canada, China, Czech Republic, District of Columbia, Finland, France, Israel, Japan, Lebanon, Netherlands, Pakistan, Russian Federation, Saudi Arabia, South Africa, Turkey, United Arab Emirates, UK, USA.

Dynamics of Disasters

In Proceedings of the 2nd International Conference on Information Systems Security and ... In ICCWS 2019 14th International Conference on Cyber Warfare and ...


Author: Ilias S. Kotsireas

Publisher: Springer Nature

ISBN: 9783030649739



View: 135

ECCWS 2021 20th European Conference on Cyber Warfare and Security

Proceedings of the ISSA Conference; 2012Aug. ... In ICCWS 2019 14th International Conference on Cyber Warfare and Security: ICCWS (Vol. 268). ONF (2013).


Author: Dr Thaddeus Eze

Publisher: Academic Conferences Inter Ltd

ISBN: 9781912764433

Category: History


View: 719

Conferences Proceedings of 20th European Conference on Cyber Warfare and Security

Cyberwarfare An Introduction to Information Age Conflict

... presented at the ICCWS 2019 14th International Conference on Cyber ... E., A Survey of Challenges in Attribution, presented at the Proceedings of a ...


Author: Isaac R. Porche, III

Publisher: Artech House

ISBN: 9781630815783

Category: Computers

Page: 380

View: 162

Conflict in cyberspace is becoming more prevalent in all public and private sectors and is of concern on many levels. As a result, knowledge of the topic is becoming essential across most disciplines. This book reviews and explains the technologies that underlie offensive and defensive cyber operations, which are practiced by a range of cyber actors including state actors, criminal enterprises, activists, and individuals. It explains the processes and technologies that enable the full spectrum of cyber operations. Readers will learn how to use basic tools for cyber security and pen-testing, and also be able to quantitatively assess cyber risk to systems and environments and discern and categorize malicious activity. The book provides key concepts of information age conflict technical basics/fundamentals needed to understand more specific remedies and activities associated with all aspects of cyber operations. It explains techniques associated with offensive cyber operations, with careful distinctions made between cyber ISR, cyber exploitation, and cyber attack. It explores defensive cyber operations and includes case studies that provide practical information, making this book useful for both novice and advanced information warfare practitioners.

Information Security Education for Cyber Resilience

In: Proceedings of the 2008 New Security Paradigms Workshop, pp. ... In: 14th International Conference on Cyber Warfare and Security, ICCWS 2019, p.


Author: Lynette Drevin

Publisher: Springer Nature

ISBN: 9783030808655



View: 898

Proceedings of Topical Issues in International Political Geography

12(4), 477–499 (2019). https://doi.org/10. ... In: Proceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018, pp.


Author: Radomir Bolgov

Publisher: Springer Nature

ISBN: 9783030582630

Category: Political Science

Page: 410

View: 422

This proceedings book addresses the main issues of contemporary political geography and international relations, providing a platform for discussion and collaboration of experts in the fields of Political Geography, Geopolitics, International Relations, and International Law. Participants from all over the world consider the controversies and challenges posed by globalization, focusing, in particular, on the ideologies of globalization and regionalism, migration crises, prevention of ethnic conflicts, and measures to counteract racism, xenophobia, and extremism

Trends and Applications in Software Engineering

Proceedings of the 8th International Conference on Software Process Improvement (CIMPS 2019) Jezreel Mejia, Mirna Muñoz, Álvaro Rocha, Jose A. Calvo-Manzano.


Author: Jezreel Mejia

Publisher: Springer Nature

ISBN: 9783030335472

Category: Technology & Engineering

Page: 290

View: 287

This book contains a selection of papers from The 2019 International Conference on Software Process Improvement (CIMPS’19), held between the 23th and 25th of October in León, Guanajuato, México. The CIMPS’19 is a global forum for researchers and practitioners that present and discuss the most recent innovations, trends, results, experiences and concerns in the several perspectives of Software Engineering with clear relationship but not limited to software processes, Security in Information and Communication Technology and Data Analysis Field. The main topics covered are: Organizational Models, Standards and Methodologies, Software Process Improvement, Knowledge Management, Software Systems, Applications and Tools, Information and Communication Technologies and Processes in non-software domains (Mining, automotive, aerospace, business, health care, manufacturing, etc.) with a demonstrated relationship to Software Engineering Challenges.

Cyber Security of Industrial Control Systems in the Future Internet Environment

In Proceedings of the 10th International Conference on Cyber Warfare and Security (ICCWS 2015). Kruger National Park, South Africa: ACPI Press.


Author: Stojanovi?, Mirjana D.

Publisher: IGI Global

ISBN: 9781799829126

Category: Computers

Page: 374

View: 546

In today’s modernized market, many fields are utilizing internet technologies in their everyday methods of operation. The industrial sector is no different as these technological solutions have provided several benefits including reduction of costs, scalability, and efficiency improvements. Despite this, cyber security remains a crucial risk factor in industrial control systems. The same public and corporate solutions do not apply to this specific district because these security issues are more complex and intensive. Research is needed that explores new risk assessment methods and security mechanisms that professionals can apply to their modern technological procedures. Cyber Security of Industrial Control Systems in the Future Internet Environment is a pivotal reference source that provides vital research on current security risks in critical infrastructure schemes with the implementation of information and communication technologies. While highlighting topics such as intrusion detection systems, forensic challenges, and smart grids, this publication explores specific security solutions within industrial sectors that have begun applying internet technologies to their current methods of operation. This book is ideally designed for researchers, system engineers, managers, networkers, IT professionals, analysts, academicians, and students seeking a better understanding of the key issues within securing industrial control systems that utilize internet technologies.

Strategic Communication in EU Russia Relations

In: Hurley JS, Chen JQ (eds) ICCWS 2018: Proceedings of the 13th ... Foxall A (2019) From Evropa to Gayropa: A critical geopolitics of the European Union as ...


Author: Evgeny Pashentsev

Publisher: Springer Nature

ISBN: 9783030272531

Category: Political Science

Page: 375

View: 469

“This book is a timely reminder of the ties that join Russia and the European Union and the opportunities that still exist to improve a troubled relationship. The book does not shy away from the difficulties that the relationship currently faces, but seeks to find opportunities in these obstacles that could lead to improvements. With the voice of Russian scholars fully audible in this excellent collection of essays, this book provides an excellent opportunities for English-speaking audiences to learn more about this complex relationship.”Victor Bulmer-Thomas, Chatham House, UK “The thinking of Evgeny Pashentsev in this volume presents an enlightening analysis and synthesis of the integration of the political, social, cultural and technological advances around the globe with respect to their impact on EU-Russia relations. His chapters are a must read for both scholars and strategic consultants who seek to understand the future of the paradigm shift taking place in these countries.”Bruce I. Newman, DePaul University, USA, and Founding Editor-in-Chief, Journal of Political Marketing In this book the international team of EU, Russian and US researchers focus on the dangerous challenges of the current unstable international equilibrium and opportunities of the breakthrough for a better future. Eight chapters engage with a variety of issues, ranging from general tendencies and controversies in EU–Russia strategic communication and its political and economic aspects to reputation management of Russian companies in the EU and the psychological aspect of US sanctions in EU-Russia relations. Analyzing the security dimension, the authors focus on the geopolitical threats, opportunities and risks of advanced technologies such as artificial intelligence, robotics, cyborgization and human genetics.

Restoring Trust in Sport

Corruption Cases and Solutions Catherine Ordway ... In Iccws 2015-The Proceedings of the 10th International Conference on Cyber Warfare and Security: ...


Author: Catherine Ordway

Publisher: Routledge

ISBN: 9781000375572

Category: Sports & Recreation

Page: 252

View: 952

In this solutions-focused collection of sport corruption case studies, leading researchers consider how to re-establish trust both within sports organisations and in the wider sporting public. Inspired by the idea of ‘moral repair’, the book examines significant corruption cases and the measures taken to reduce further harm or risk of recurrence. The book has an international scope, including case study material from Europe, Asia, Africa, Australia and New Zealand, and covers important contemporary issues including whistleblowing, bribery, match-fixing, gambling, bidding for major events, and good governance. It examines the loss of trust at both national and international levels. Drawing on cutting-edge research, the book includes both on-field and off-field examples, from Olympic, non-Olympic, professional and amateur sports, as well as diverse academic and practitioner perspectives. Offering an important contribution to current debates and a source of reflection on best professional practice, Restoring Trust in Sport helps us to better understand why corruption happens in sport and how it can and should be addressed. This is invaluable reading for all advanced students, researchers, managers and policy makers with an interest in integrity in sport, sport ethics, sport management, sport governance, sports law, and a useful reference for anybody working in criminology, business and management, law, sociology or political science.

Security and Organization within IoT and Smart Cities

2019. Blockchain for modern digital forensics: The chain-of-custody as a distributed ledger. In Blockchain and Clinical Trial: Securing Patient Data, ...


Author: Kayhan Zrar Ghafoor

Publisher: CRC Press

ISBN: 9781000293173

Category: Computers

Page: 296

View: 959

This book aims to provide the latest research developments and results in the domain of AI techniques for smart cyber ecosystems. It presents a holistic insight into AI-enabled theoretic approaches and methodology in IoT networking, security analytics using AI tools, and network automation, which ultimately enable intelligent cyber space. This book will be a valuable resource for students, researchers, engineers, policy makers working in various areas related to cybersecurity and privacy for Smart cities. This book includes chapters titled “An Overview of the Artificial Intelligence Evolution and its Fundamental Concepts, and their relationship with IoT Security”, “Smart City: Evolution and fundamental concepts”, “Advances in AI-Based Security for Internet of Things in Wireless Virtualization Environment”, “A conceptual model for optimal resource sharing of networked microgrids focusing uncertainty – paving path to eco-friendly smart cities”, “A Novel Framework for Cyber Secure Smart City", “Contemplate Security Challenges & Threats for Smart Cities”, “Self-Monitoring Obfuscated IoT Network”, “Introduction to Side Channel Attacks and Investigation of Power Analysis & Fault Injection Attack Techniques”, “Collaborative Digital Forensic Investigations Model for Law Enforcement: Oman as a Case Study”, “Internet of Things Security and Privacy in Smart Cities: Status and Challenges”, “5G Security and the Internet of Things”, “The Problem of Deepfake Videos and How to Counteract Them in Smart Cities”, “The Rise of Ransomware aided by Vulnerable IoT devices”, and “Security Issues in Self-Driving Cars within Smart Cities”, “PhishFree: A Honeybee Inspired System for Smart City Free of Phishing Attacks”, “Trust Aware Crowd Associated Network-based Approach for Optimal Waste Management in Smart Cities” This book provides state-of-the-art of research results and discusses current issues, challenges, solutions and recent trends related to security and organization within IoT and Smart Cities. We expect this book to be of significant importance not only to researchers and practitioners in academia, government agencies and industries, but also for policy makers and system managers. We anticipate this book to be a valuable resource for all those working in this new and exciting area, and a “must have” for all university libraries.

Information Security

In: Proceedings of the Northeast Decision Sciences Institute Annual Meeting, p. ... International Conference on Cyber Warfare and Security, ICCWS 2015, pp.


Author: Hein Venter

Publisher: Springer

ISBN: 9783030114077

Category: Computers

Page: 193

View: 443

This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISSA 2018, held in Pretoria, South Africa, in August 2018. The 13 revised full papers presented were carefully reviewed and selected from 40 submissions. The papers are dealing with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authorization; trust frameworks; security requirements; formal security models; malware and its mitigation; intrusion detection systems; social engineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; distributed systems security.