ECCWS 2018 17th European Conference on Cyber Warfare and Security V2

Front Cover
Audun Jøsang
Academic Conferences and publishing limited, Jun 21, 2018 - Computers
 

Contents

Continuous Identity Verification in Cloud Storage Services Burhan AlBayati Nathan Clarke
1
Using Behavioural Profiling Paul Dowland and Fudong Li
11
A MultiAlgorithmic Approach for Gait Recognition Hind AlObaidi Fudong Li Nathan
20
Preventing Cybercrime Susceptibility Using Browser Frans Blauw
29
Security Threats and Measures on Multifunctional Devices Johnny Botha and Sune Von Solms
38
Can Football Teach Students to Become Better Matthew Bovee and Huw Read
49
TimeLine Alignment of Cyber Incidents in Heterogeneous Agnė Brilingaitė Linas Bukauskas
57
Modeling a Decision Makers Processes Viacheslav Burlov Georgievich
66
Effects in Cyber JuhaPekka Nikkarila Bernt Åkesson
323
Defence Strategy for Protecting Norazman Mohamad Nor Azizi
330
Concepts of Automating Forensic Case Management Glenn Nor lain Sutherland and
338
An Experience Report Partha Pal Nathaniel Lageman and
351
Risk Measurement Mookyu Park Junwoo Seo Jaehyeok
360
Between Cyber Warfare and Nuclear Warfare Han Haengrok Oh and Kyungho
370
Application of Cyber Resilience Review to an Electricity Jouni Pöyhönen Viivi Nuojua Martti
380
Company Lehto and Jyri Rajamäki
390

Are Jami Carroll
77
A Teaching Perspective Lorena Carthy Elisabeth Øvensen
87
Building Automatic and Intelligent Cyber AttackDefense ChungKuan Chen and Shiuhpyng
96
Does Conventional Deterrence Work in the Cyber Domain? Jim Chen
106
ReEstablishing Trust Within and Among Partner Organizations Mitch Cochran
112
Social Media Advocacy in the MustFall Campaigns in South Zama Dlamini Linda Malinga
120
Digital Rights Management to Protect Private Data on the Jaco du Toit
128
A Selective Literature Review on Cyber Counterintelligence Petrus Duvenage Victor Jaquire and
137
Comparative Analysis of Ruben Elamiryan and Radomir
146
Long ShortTerm Memory Based Daniel Fraunholz Daniel Reti Simon
156
Detection Classification and Mitigation of Hostile Network Duque Antón and Hans Dieter
164
The Importance of Strategic Lars Gjesvik
174
Tell me What app Nils Gruschka Luigi Lo lacono and
181
you are and I Tell you What you are Allowed to do Jan Tolsdorf
190
A Proposed Hierarchical Taxonomy for Assessing the Primary Charles Harry
199
On the use of Ontology Data for Protecting Critical João Henriques Filipe Caldeira
208
Infrastructures Tiago Cruz and Paulo Simões
217
Application on Android Devices and Robert Bird
224
Minhee Joo Junwoo Seo Mookyu
233
Symbolic Meaning and Risk Measurement of Nuclear Park Haeng Rok Oh and Kyungho
240
A Case Study of the Infrastructure of Juha Kukkola and Mari Ristolainen
253
The Uses and Limits of Cyber Coercion Andrew Liaropoulos
262
A South African Candice Louw and Basie Von Solms
268
A Computational Ontology for Cyber Operations Clara Maathuis Wolter Pieters and
278
Enhancing Digital Forensic Investigations Into Emails Through James Christopher McGuire and Wai
288
Sentiment Analysis Sze Leung
296
Digital Forensics and Fudong Li
306
Secure IP Camera Video Streaming Through Kurento Media Kgothatso Ngako
317
A Secure and User Friendly MultiPurpose Asymmetric Key Alexandre Pujol Christina Thorpe
400
Derivation System MPKDS and Liam Murphy
410
The Ethics of Open Source Intelligence Applied by Maritime Jyri Rajamäki Sari SarlioSiintola and
424
A Cultural Exploration of the Social Media Manipulators Char Sample John McAlaney
432
Why are States Muzaffer Satiroglu
441
Patriotic Hackers are Civilians Sporadically Participating in Janine Schmoldt
447
Wannacry About the Tragedy of the Commons? GameTheory Matthias Schulze and Thomas
454
A Second Amendment for Cyber? Possession Prohibition and Keith Scott
464
Factors Contributing to the Proliferation of Software as a Jantje Silomon
471
Improving Cyber Situational Awareness in Maritime Jussi Simola and Jyri Rajamäki
480
Australian Cyber Security Policy Through a European Lens Matthew Warren and Shona Leitch
489
The Legal Position of Social Media Intermediaries in Murdoch Watney
496
Security as a Context Generative Force and Policy Concern for Noran Shafik Fouad
507
Jihadi Operational art in the Digital Realm its Ideological Ferdinand Haberl
515
Cyber Threat Analysis in Smart City Environments Aarne Hummelholm
523
The Protection of Russias Critical Information Infrastructure Martti Kari
533
iii
536
Improved Understanding and Benjamin Knox Ricardo Lugo Kirsi
541
Current Problems of Protecting the Institution of State Nadezhda Kulibaba and Radomir
551
Using Anomaly Detection Based Techniques to Detect HTTP Laxmikanta Mohanty and Debasish
557
Scalable Distributed Traffic Monitoring for Enterprise Andrés Ocampo Tim Wauters
563
Networks With Spark Streaming Bruno Volckaert and Filip De Turck
571
Masters Research Papers
579
Towards an Artificial Intelligence Framework to Actively Mmalerato Masombuka Marthie
589
Defend Cyberspace Grobler and Bruce Watson
597
Operational Energy Perspective Stefan Pickl
604
Cyber Weapons and the U S Constitution Neal Kushwaha and Bruce Watson
612
Copyright

Common terms and phrases

Bibliographic information