Next conference: Central European Cybersecurity Conference 2018
The Central European Cybersecurity Conference – CECC 2017 aims at establishing a venue for the exchange of information on cybersecurity and its many aspects in central Europe. CECC 2017 encourages the dialogue between researchers of technical and social aspects of cybersecurity, both crucial in attaining adequate levels of cybersecurity. Complementary contributions dealing with its economic aspects as well as any legal, investigation or other issues related to cybersecurity are welcome, too.
4 Februar 2018
8 December 2017
15 November 2017
8 November 2017
6 November 2017
19 October 2017
8 October 2017
30 August 2017
28 July 2017
25 July 2017
29 May 2017
23 May 2017
3 April 2017
3 April 2017
6 March 2017
Enforcing Software Integrity in the Internet of Things
Stefan Katzenbeisser obtained a Ph.D. from the Vienna University of Technology, Austria. After working as Senior Scientist at Philips Research, he joined TU Darmstadt as professor for Security Engineering in 2008. His current research interests include applied cryptography, privacy enhancing technologies, platform security and critical infrastructure security.
Network Steganography: Principles, Countermeasures, Applications
Jörg Keller obtained a Ph.D. from Saarland University, Saarbrücken, Germany. After a post doc year at CWI, Amsterdam, and a habilitation fellowship at Saarland University, he joined FernUniversität in Hagen, Germany as professor for Computer Engineering in 1996. His current research interests include IT security, parallel, fault-tolerant and energy-efficient computing, and virtual laboratories.
Cyber Response to the Wave of Terrorism
Daniel Cohen is the head of the Strategy Program at The Abba Eban Institute for International Diplomacy, IDC Herzliya. He is also a researcher at Blavatnik Interdisciplinary Cyber Research Center (ICRC) at Tel Aviv University where his fields include cyber security and terrorism, terrorist organizations' use of web and social media, and counter terrorism. He received his BA in Government from IDC, Herzliya and MA in Security Studies from Tel Aviv University. He lecturers in the private and public sectors both in Israel and abroad. Daniel serves as a consultant expert for the UN Security Council Counter-Terrorism Committee and the Organization for Security and Co-operation in Europe (OSCE).
Opening
Andrej Sotlar
Dean of the Faculty of Criminal Justice and Security, University of Maribor
Igor Bernik
University of Maribor, CECC 2017 Chair
The institutional logic of cybersecurity
Jorge Tiago Martins (University of Sheffield)
How to identify the current status of cybersecurity
Boštjan Delak (Faculty of Information Studies in Novo Mesto)
Explaining the employment of information security measures by individuals in organizations: The self-protection
model
Anže Mihelič and Simon Vrhovec
Why did I end up living in a cave? Risks of IoT at home
Nerea Sainz de La Maza Doñabeitia, Miguel Hernández Boza, Javier Jiménez del Peso and José Ignacio Escribano Pablos
Security of IoT Cloud Services - A User-Oriented Test Approach
Martin Böhm, Ina Schiering and Diederich Wermser
Information Technology Assessment: ISO and Pentest /
Preverjanje informacijskih tehnologij: ISO in pentest
Miha Ozimek (SIQ)
Sistematski pristop k reševanju informacijsko-varnostnih groženj
Primož Vogrinec (A1)
Cycle Structure and Reachability Analysis for Cipher Spritz with small N
Jörg Keller
Concept Drift Analysis for Improving Anomaly Detection Systems in Cybersecurity
Michał Choraś and Michał Woźniak
Children Privacy Protection in Video Surveillance Based on Automatic Age Estimation
Petra Grd, Igor Tomičić and Miroslav Bača
Zaposleni kot največje varnostno tveganje
Filip Božič (Zupo)
Securing web and cloud services / Zaščita spletnih in oblačnih storitev
Sebastjan Lajkovič (GenLan)
The Cipher, the Random and the Ransom: A Survey on Current and Future Ransomware
Ziya Alper Genç, Gabriele Lenzini and Peter Y.A. Ryan
Use of mobile devices in hospitals and perceived data breach consequences: An explorative study
Simon Vrhovec and Blaž Markelj
Preparation of response model to cyber-attacks at nuclear facilities
Samo Tomažič and Igor Bernik
Evolution of Computer Security Incidents
Gorazd Božič (SI-CERT)
Information security management practices: Expectations and reality
Kaja Prislan, Branko Lobnikar and Igor Bernik
Mobile security: Two generations of potential victims
Blaž Markelj and Sabina Zgaga
Combat Mobile Evasive Malware via Deep Learning
Irfan Bulut, A. Gokhan Yavuz and R. Can Aygun
The regular registration fee includes entrance to all conference sessions and the social events. The regular registration fee does not include the accommodation.
Cancellation fee is € 50. Substitution is welcome. No cancellation will be allowed after 30 October 2017.
Students have to show a valid student ID at the conference site. The student registration fee includes the entrance to all conference sessions but not the social events. The student registration fee does not include the accommodation.
Special accommodation proposals from Union Hotels are available from 15 to 17 November 2017 for conference attendants.
Registration fees must be paid in advance via bank transfer. Please make sure all bank fees are covered by the submitting account and that the payment is free of charge for the receiver account.
Account holder: UM FVV, Kotnikova 8, 1000 Ljubljana, Slovenia
IBAN: SI56 0110 0600 0006 231
SWIFT-CODE: BSLJSI2X
Reference number: SI00 6007-2017
Please mention your first and last name on the bank transfer.
Participants receive the original copy of the receipt on the first day of the conference.
The official Call for Papers is available at (EasyChair):
https://easychair.org/cfp/cecc2017
The conference is devoted to presenting and exploring scientific and technological advancements and original innovative applications in the field of cybersecurity. Topics for this conference include, but are not limited to:
All accepted and presented research papers will be available in Open Access conference proceedings published by the University of Maribor Press and submitted for indexing by DBLP, Elsevier SCOPUS and Thomson Reuters Web of Science™ Core Collection.
Research papers published by University of Maribor Press are available: http://press.um.si/index.php/ump/catalog/book/296
Selected accepted and presented research papers will be published, after further revision to ensure adequate quality for journal papers, in special issue “Technical and Social Aspects of Critical Infrastructure Security” of the Journal of Universal Computer Science (ISSN 0948-695x / 0948-6968).
The official language of the conference is English. Papers are limited to 4 - 6 pages.
All papers must be original and not simultaneously submitted to another journal or conference. The following paper categories are welcome:
The quality of the research papers will be assessed based on its originality, significance and clarity.
All submitted research papers will undergo a double-blind reviewing process. Please, make sure that submitted papers do not contain author names or obvious self-references.
Submission of a paper implies that at least one of the authors will register and present the paper at the conference if the paper is accepted.
Submit research papers using the CECC 2017 submission system (EasyChair):
Submit professional papers and presentations to cecc@fvv.uni-mb.si.