ECCWS 2018 17th European Conference on Cyber Warfare and Security V2Audun Jøsang |
Contents
Continuous Identity Verification in Cloud Storage Services Burhan AlBayati Nathan Clarke | 1 |
Using Behavioural Profiling Paul Dowland and Fudong Li | 11 |
A MultiAlgorithmic Approach for Gait Recognition Hind AlObaidi Fudong Li Nathan | 20 |
Preventing Cybercrime Susceptibility Using Browser Frans Blauw | 29 |
Security Threats and Measures on Multifunctional Devices Johnny Botha and Sune Von Solms | 38 |
Can Football Teach Students to Become Better Matthew Bovee and Huw Read | 49 |
TimeLine Alignment of Cyber Incidents in Heterogeneous Agnė Brilingaitė Linas Bukauskas | 57 |
Modeling a Decision Makers Processes Viacheslav Burlov Georgievich | 66 |
Effects in Cyber JuhaPekka Nikkarila Bernt Åkesson | 323 |
Defence Strategy for Protecting Norazman Mohamad Nor Azizi | 330 |
Concepts of Automating Forensic Case Management Glenn Nor lain Sutherland and | 338 |
An Experience Report Partha Pal Nathaniel Lageman and | 351 |
Risk Measurement Mookyu Park Junwoo Seo Jaehyeok | 360 |
Between Cyber Warfare and Nuclear Warfare Han Haengrok Oh and Kyungho | 370 |
Application of Cyber Resilience Review to an Electricity Jouni Pöyhönen Viivi Nuojua Martti | 380 |
Company Lehto and Jyri Rajamäki | 390 |
Are Jami Carroll | 77 |
A Teaching Perspective Lorena Carthy Elisabeth Øvensen | 87 |
Building Automatic and Intelligent Cyber AttackDefense ChungKuan Chen and Shiuhpyng | 96 |
Does Conventional Deterrence Work in the Cyber Domain? Jim Chen | 106 |
ReEstablishing Trust Within and Among Partner Organizations Mitch Cochran | 112 |
Social Media Advocacy in the MustFall Campaigns in South Zama Dlamini Linda Malinga | 120 |
Digital Rights Management to Protect Private Data on the Jaco du Toit | 128 |
A Selective Literature Review on Cyber Counterintelligence Petrus Duvenage Victor Jaquire and | 137 |
Comparative Analysis of Ruben Elamiryan and Radomir | 146 |
Long ShortTerm Memory Based Daniel Fraunholz Daniel Reti Simon | 156 |
Detection Classification and Mitigation of Hostile Network Duque Antón and Hans Dieter | 164 |
The Importance of Strategic Lars Gjesvik | 174 |
Tell me What app Nils Gruschka Luigi Lo lacono and | 181 |
you are and I Tell you What you are Allowed to do Jan Tolsdorf | 190 |
A Proposed Hierarchical Taxonomy for Assessing the Primary Charles Harry | 199 |
On the use of Ontology Data for Protecting Critical João Henriques Filipe Caldeira | 208 |
Infrastructures Tiago Cruz and Paulo Simões | 217 |
Application on Android Devices and Robert Bird | 224 |
Minhee Joo Junwoo Seo Mookyu | 233 |
Symbolic Meaning and Risk Measurement of Nuclear Park Haeng Rok Oh and Kyungho | 240 |
A Case Study of the Infrastructure of Juha Kukkola and Mari Ristolainen | 253 |
The Uses and Limits of Cyber Coercion Andrew Liaropoulos | 262 |
A South African Candice Louw and Basie Von Solms | 268 |
A Computational Ontology for Cyber Operations Clara Maathuis Wolter Pieters and | 278 |
Enhancing Digital Forensic Investigations Into Emails Through James Christopher McGuire and Wai | 288 |
Sentiment Analysis Sze Leung | 296 |
Digital Forensics and Fudong Li | 306 |
Secure IP Camera Video Streaming Through Kurento Media Kgothatso Ngako | 317 |
A Secure and User Friendly MultiPurpose Asymmetric Key Alexandre Pujol Christina Thorpe | 400 |
Derivation System MPKDS and Liam Murphy | 410 |
The Ethics of Open Source Intelligence Applied by Maritime Jyri Rajamäki Sari SarlioSiintola and | 424 |
A Cultural Exploration of the Social Media Manipulators Char Sample John McAlaney | 432 |
Why are States Muzaffer Satiroglu | 441 |
Patriotic Hackers are Civilians Sporadically Participating in Janine Schmoldt | 447 |
Wannacry About the Tragedy of the Commons? GameTheory Matthias Schulze and Thomas | 454 |
A Second Amendment for Cyber? Possession Prohibition and Keith Scott | 464 |
Factors Contributing to the Proliferation of Software as a Jantje Silomon | 471 |
Improving Cyber Situational Awareness in Maritime Jussi Simola and Jyri Rajamäki | 480 |
Australian Cyber Security Policy Through a European Lens Matthew Warren and Shona Leitch | 489 |
The Legal Position of Social Media Intermediaries in Murdoch Watney | 496 |
Security as a Context Generative Force and Policy Concern for Noran Shafik Fouad | 507 |
Jihadi Operational art in the Digital Realm its Ideological Ferdinand Haberl | 515 |
Cyber Threat Analysis in Smart City Environments Aarne Hummelholm | 523 |
The Protection of Russias Critical Information Infrastructure Martti Kari | 533 |
iii | 536 |
Improved Understanding and Benjamin Knox Ricardo Lugo Kirsi | 541 |
Current Problems of Protecting the Institution of State Nadezhda Kulibaba and Radomir | 551 |
Using Anomaly Detection Based Techniques to Detect HTTP Laxmikanta Mohanty and Debasish | 557 |
Scalable Distributed Traffic Monitoring for Enterprise Andrés Ocampo Tim Wauters | 563 |
Networks With Spark Streaming Bruno Volckaert and Filip De Turck | 571 |
Masters Research Papers | 579 |
Towards an Artificial Intelligence Framework to Actively Mmalerato Masombuka Marthie | 589 |
Defend Cyberspace Grobler and Bruce Watson | 597 |
Operational Energy Perspective Stefan Pickl | 604 |
Cyber Weapons and the U S Constitution Neal Kushwaha and Bruce Watson | 612 |
Common terms and phrases
academic achieved activities adversary algorithms analysis application approach apps Available behaviour browser buffer overflow Burlov certificate classification communication Computer Science critical infrastructure CSTO cyber attacks cyber counterintelligence cyber deterrence Cyber Operations Cyber Warfare cybersecurity cyberspace cyberspace operations Cyberwar data capsule Data Consumer Data Producer database dataset decision defense DEPRIM devices digital forensics DRM Controller encryption environment evaluate event experiment facial recognition facial recognition systems Figure files framework identify IEEE images implementation information security International Conference Internet intrusion detection investigation malware military mobile Neurotechnology operating system paper partner organizations password performance phishing port scans printer protection protocols scenario SecuSeal server smartphone social media SPARQL specific SQL injection strategies target Team Technology threat University of Johannesburg user’s vulnerabilities web application



