Next conference: Central European Cybersecurity conference 2019, 14-15 November 2019, Munich, Germany
The second Central European Cybersecurity Conference – CECC 2018 aims at establishing a venue for the exchange of information on cybersecurity and its many aspects in central Europe. CECC 2018 encourages the dialogue between researchers of technical and social aspects of cybersecurity, both crucial in attaining adequate levels of cybersecurity. Complementary contributions dealing with its economic aspects as well as any legal, investigation or other issues related to cybersecurity are welcome, too.
7 November 2018
24 September 2018
7 September 2018
6 September 2018
20 July 2018
11 June 2018
Engineering edge security for the protection of critical infrastructures
Béla Genge obtained his PhD in 2009 in network security from the Technical University of Cluj-Napoca, Romania. After a 3-year Post-Doctoral research experience at the Joint Research Centre of the European Commission (Ispra, Italy), he was appointed as an Associate Professor at the Petru Maior University of Tg. Mures, Romania. He is a member of the Editorial Boards of the International Journal of Critical Infrastructure Protection (Elsevier), and of the Security and Communication Networks (Hindawi). His research interests include security and resilience of Industrial Control Systems, Software-Defined industrial network control, and anomaly detection systems.
An introduction into car forensics with an example of a car2infrastructure application
Christian Hummert obtained his PhD in computer science from the Friedrich-Schiller University in Jena, Germany. He worked six years as a forensic expert for the Federal Police of Thuringia. In 2015 he was appointed as a Full Professor for IT-Security / Digital Forensics at the Mittweida University of Applied Science. In October 2018 he left university and became a director for digital forensics at the Central Office for Information Technology in the Security Sector (ZITiS) in Germany. He is a member of the Steering Committee of the Embedded World Conference. His research interests include digital forensics especially forensics of embedded systems and automotive forensics.
Opening
Andrej Sotlar
Dean of the Faculty of Criminal Justice and Security, University of Maribor
Andrej Tomšič
Deputy Information Commissioner of the Republic of Slovenia
Jörg Keller
CECC 2017 Co-Chair, FernUniversität Hagen
Artificial intelligence in cyber security
Primož Vogrinec (A1)
Security assessment in industrial control systems and IEC 62443 standards certification process
Miha Ozimek (SIQ)
One countermeasure, multiple patterns: Countermeasure variation for covert channels
Steffen Wendzel, Daniela Eller and Wojciech Mazurczyk
Virtual honeypots and detecion of telnet botnets
Tomáš Bajtoš, Pavol Sokol and Terézia
Mézešová
Hack my company: An empirical assessment of post-exploitation behavior and lateral movement in cloud
environments
Daniel
Fraunholz, Daniel Schneider, Janis Zemitis and Hans Dieter Schotten
Gorazd Božič (SI-CERT)
Security analysis of key acquiring strategies used by cryptographic ransomware
Ziya A. Genc, Gabriele Lenzini and P. Y. A. Ryan
Improving lawful interception in virtual datacenters
Daniel Spiekermann, Jörg Keller and Tobias Eggendorfer
Structural limitations of B+-tree forensics
Peter Kieseberg, Sebastian Schrittwieser and Edgar Weippl
Deja-Vu: Added value of keeping your data safe
Urh Srečnik (Abakus Plus)
Safety and security of cyberspace users – criminological, victimological and preventative aspects
Gorazd Meško, Kaja Prislan, Rok Hacin, Blaž Markelj, Simon Vrhovec, Igor Bernik
Coping with access control requirements in the context of mutual dependencies between business and IT
Roman Pilipchuk
Aligning business process access control policies with enterprise architecture
Roman Pilipchuk, Stephan Seifermann and Robert Heinrich
Privacy improvement model for biometric person recognition in ambient intelligence using perceptual hashing
Petra Grd, Igor Tomičić and Miroslav Bača
Engineering edge security for the protection of critical infrastructures
Béla Genge (University of Medicine, Pharmacy, Sciences and Technology of Tg. Mures)
OpenSPA - An open and extensible protocol for single packet authorization
Gregor Robert Krmelj, Matjaž Pančur, Miha Grohar and Mojca Ciglarič
A brief look at the security of DeviceNet communication in industrial control systems
Pal-Stefan Murvay and Bogdan Groza
A testbed for performing security experiments with software-defined industrial control systems
Zoltán Szántó, Hunor Sándor and Béla Genge
Cybersecurity operations, why and how
Metod Platiše (Telekom Slovenije)
Establishing SOC in energy sector - issues and obstacles
Ciril Kafol and Andrej Bregar (Informatika)
It’s all fun and games, and some legalese: Data protection implications for increasing cyber-skills of employees through games
Danaja Fabčič Povše
What drives the motivation to self-protect on social networks? The role of privacy concerns and perceived threats
Damjan Fujs, Simon Vrhovec and Anže Mihelič
Secure communication and real-time protection
Denis Justinek (Biokoda)
Application detection in anonymous communication networks
Mohammad Hajian Berenjestanaki and Mohammadali Akhaee
A framework for a forensically sound harvesting the dark web
Christian Valassi, Jesper Bergman and Oliver Popov
Do ut des: Disseminating online child sexual abuse material for investigative purposes?
Sabine Witting
"Bouquet" of several information security survey results
Boštjan Delak (Faculty of Information Studies in Novo mesto)
It is easy to be DPO with SmartDPO
Jana Češarek (SmartIS)
Towards unambiguous IT risk definition
Maksim Goman
An ontology capturing the interdependence of the General Data Protection Regulation (GDPR) and information security
Melisa Geko and Simon Tjoa
Igor Bernik
CECC 2018 Publication Chair, University of Maribor
Best paper award sponsored by Future Internet journal, MDPI
We reserve the right to change the conference program.
The regular registration fee includes entrance to all conference sessions and the social events. The regular registration fee does not include the accommodation.
Cancellation fee is € 50. Substitution is welcome. No cancellation will be allowed after 30 October 2018.
Early-bird registration fees must be paid before 30 September 2018.
Students have to show a valid student ID at the conference site. The student registration fee includes the entrance to all conference sessions but not the social events. The student registration fee does not include the accommodation.
Registration fees must be paid in advance via bank transfer. Please make sure all bank fees are covered by the submitting account and that the payment is free of charge for the receiver account.
Account holder: UM FVV, Kotnikova 8, 1000 Ljubljana, Slovenia
IBAN: SI56 0110 0600 0006 231
SWIFT-CODE: BSLJSI2X
Reference number: SI00 6007-2017
Please mention your first and last name on the bank transfer.
Participants receive the original copy of the receipt on the first day of the conference.
The symposium will offer a best paper award of 500 Swiss franc (CHF) sponsored by Future Internet journal, MDPI. The award which will be announced and bestowed at the symposium closing session. The award will be conferred to the author(s) of a paper presented at the conference, selected by the symposium chairs. The decision criterion will consider both the paper quality (assessed by the program committee), and the oral presentation quality (feedback given by session chairs at the conference venue).
Selected accepted and presented research papers will be published, after further revision to ensure adequate quality for journal papers, in Cyberattack Detection and Response special issue of the Journal of Universal Computer Science (ISSN 0948-695x / 0948-6968) or in a regular issue of Future Internet (ISSN 1999-5903).
CECC 2018 proceedings will be published by Association for Computer Machinery (ACM) in the ACM Digital Library within its International Conference Proceedings Series (ICPS).
The official Call for Papers is available at (EasyChair):
https://easychair.org/cfp/cecc2018
The conference is devoted to presenting and exploring scientific and technological advancements and original innovative applications in the field of cybersecurity. Topics for this conference include, but are not limited to:
The official language of the conference is English. Papers are limited to 6 pages.
All papers must be original and not simultaneously submitted to another journal or conference. The following paper categories are welcome:
Papers submitted to CECC 2018 have to use the ACM SigConf template. Please, read template instructions carefully before submitting the paper.
The quality of the research papers will be assessed based on its originality, significance and clarity.
All submitted research papers will undergo a double-blind reviewing process. Please, make sure that submitted papers do not contain author names or obvious self-references.
Submission of a paper implies that at least one of the authors will register and present the paper at the conference if the paper is accepted.
Submit research papers using the CECC 2018 submission system.
Previous conference: Central European Cybersecurity Conference 2017