Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Current
Archives
About
About the Proceedings
Privacy Statement
Submissions
Contact
Search
Register
Login
Home
/
Archives
/
Vol. 21 No. 1 (2022): Proceedings of the 21st European Conference on Cyber Warfare and Security
Vol. 21 No. 1 (2022): Proceedings of the 21st European Conference on Cyber Warfare and Security
E-Book ISBN: 978-1-914587-41-2
Published:
2022-06-08
Full Issue
PDF
Editorial, Biographies and Review Committee
Editorial, Biographies and Review Committee
Dr Thaddeus Eze
PDF
Academic Papers
Desired cybersecurity skills and skills acquisition methods in the organizations
Kirsi Aaltola, Harri Ruoslahti, Jarmo Heinonen
1-9
PDF
Identification of Violence in Twitter Using a Custom Lexicon and NLP
Jonathan Adkins
10-17
PDF
The U.S. Cyber Threat Landscape
Elie Alhajjar, Kevin Lee
18-24
PDF
Impact of Moral Disengagement on Counterproductive work behaviours in IT Sector, Pakistan
Qazi Muhammad Ali
25-36
PDF
Supporting Situational Awareness in VANET Attack Scenarios
Dimah Almani, Steven Furnell, Tim Muller
37-45
PDF
The Emergence of IIoT and its Cyber Security Issues in Critical Information Infrastructure
Humairaa Bhaiyat, Siphesihle Sithungu
46-51
PDF
Including Human Behaviors into IA Training Assessment: A Better Way Forward!
Henry Collier
52-59
PDF
Automatic Construction of Hardware Traffic Validators
Stephen Taylor, Jason, Ellie, Brandon
60-69
PDF
Developing Mandatory Reporting for Cyber-Attacks on U.S. Businesses
Baylor Franck, Dr. Reith
70-77
PDF
Obstacles on the Path to the Internet of Things: The Digital Divide
John Gray
78-85
PDF
Societal Impacts of Cyber Security in Academic Literature – Systematic Literature Review
Eveliina Hytönen, Amir Trent, Harri Ruoslahti
86-93
PDF
Planning the building a SOC - A Conceptual Process Model
Pierre Jacobs, Sebastiaan von Solms
94-104
PDF
Pedagogical and self-reflecting approach to improving the learning within a cyber exercise
Anni Karinsalo, Karo Saharinen, Jani Päijänen, Jarno Salonen
105-114
PDF
Strategies for Internet of Things data privacy and security using systematic review
Sithembiso Sithembiso, Ms Teballo, Ms Amanda
115-122
PDF
Public Authorities as a Target of Disinformation
Pekka Koistinen, Milla Alaraatikka, Teija Sederholm, Dominic Savolainen, Aki-Mauri Huhtinen, Miina Kaarkoski
123-129
PDF
An Ontological Model for a National Cyber-attack Response in South Africa
Aphile Kondlo, Louise Leenen, Joey Jansen van Vuuren
130-149
PDF
Combining System Integrity Verification with Identity and Access Management
Markku Kylänpää, Jarno Salonen
140-149
PDF
SIEM4GS: Security Information and Event Management for a Virtual Ground Station Testbed
Yee Wei Law, Professor Slay
150-159
PDF
Physical Layer Security: About Humans, Machines and the Transmission Channel
Christoph Lipps, Hans Dieter Schotten
160-169
PDF
On the Road to Designing Responsible AI Systems in Military Cyber Operations
Clara Maathuis
170-177
PDF
Responsible Digital Security Behaviour: Definition and Assessment Model
Clara Maathuis, Sabarathinam Chockalingam
PDF
A Model for State Cyber Power: Case Study of Russian Behaviour
JUHA KAI MATTILA
188-197
PDF
Building Software Applications Securely with DevSecOps: A Socio-Technical Perspective
Rennie Naidoo, Nicolaas Möller
198-205
PDF
Effective Cyber Threat Hunting: Where and how does it fit?
Nombeko Ntingi, Dr, Dr, Professor
206-213
PDF
Two novel use-cases for non-fungible tokens (NFTs).
Alexander Pfeiffer, Natalie Denk, Thomas Wernbacher, Stephen Bezzina, Vince Vella, Alexiei Dingli
214-221
PDF
Cybersecurity risk assessment subjects in information flows
Jouni Pöyhönen
222-230
PDF
Exploring care robots' cybersecurity threats from care robotics specialists’ point of view
Jyri Rajamäki, Marina Järvinen
231-238
PDF
Cyberterritory: An Exploration of the Concept
Jori-Pekka Rautava, Mari Ristolainen
239-246
PDF
Researching Graduated Cyber Security Students – Reflecting Employment and Job Responsibilities through NICE framework
Karo Saharinen, Jarmo Viinikanoja, Jouni Huotari
247-255
PDF
ZTA: Never Trust, Always Verify
char sample, Dr. Cragin Shelton, Professor Loo, Dr. Justice, Lynette Hornung, Ian Poynter
256-262
PDF
A Collaborative Design Method for Safety and Security Engineers
Taito Sasaki, Takashi Hamaguchi, Yoshihiro Hashimoto
263-270
PDF
Siamese Neural Network and Machine Learning for DGA Classification
Lander Segurola, Telmo Egüés, Francesco Zola, Raúl Orduna
271-279
PDF
Probability of Data Leakage and Its Impacts on Confidentiality
Paul Simon, Scott Graham
280-288
PDF
An Analysis of the Prevalence of Game Consoles in Criminal Investigations in the United Kingdom
Iain Sutherland, Huw Read, Konstantinos Xynos
289-295
PDF
How are Hybrid Terms Discussed in the Recent Scholarly Literature?
Ilkka Tikanmäki, Harri Ruoslahti
296-304
PDF
Application of Geospatial Data in Cyber security
Namosha Veerasamy, Yaseen, Zubeida
305-313
PDF
Layer 8 Tarpits:
Overwhelming malicious actors with distracting information
Toni Virtanen, Petteri Simola
314-318
PDF
Cybersecurity Threats to and Cyberattacks on Critical Infrastructure: a Legal Perspective
Murdoch Watney
319-327
PDF
Cyber Security Norms: Trust and Cooperation
Allison Wylde
328-335
PDF
A Managerial Review and Guidelines for Industry 4.0 Factories on Cybersecurity
Najam Ul Zia, Ladislav Burita, Aydan Huseynova, Victor Kwarteng Owusu
336-340
PDF
A Cyber-Diplomacy and Cybersecurity Awareness Framework (CDAF) for Developing Countries
Hendrik Zwarts, Dr Jaco Du Toit, Prof Basie Von Solms
341-349
PDF
PhD Papers
Assessing Information Security Continuous Monitoring in the Federal Government
Tina AlSadhan, Joon Park
351-359
PDF
Expectations And Mindsets Related To GDPR
Pauliina Hirvonen
360-367
PDF
A Cyber Counterintelligence Competence Framework
Thenjiwe Sithole, Dr Jaco Du Toit
368-377
PDF
The Cyber Era`s Character of War
Maija Turunen
378-384
PDF
Enhancing the STIX Representation of MITRE ATT&CK for Group Filtering and Technique Prioritization
Mateusz Zych, Vasileios Mavroeidis
385-391
PDF
Masters Papers
Cyber Concerns With Cloud Computing
Jacob Chan, Mark Reith
393-400
PDF
Impact of information security threats on small businesses during the Covid-19 pandemic
Tabisa Ncubukezi
401-410
PDF
Analysis of sexual abuse of children online and CAM investigations in Europe
Jyri Rajamäki, Johanna Parviainen
411-418
PDF
Forensic Trails Obfuscation and Preservation via Hard Drive Firmware
Paul Underhill, Toyosi Oyinloye, Lee Speakman, Thaddeus Eze
419-428
PDF
Work in Progress Papers
DRAM-based Physically Unclonable Functions and the Need for Proper Evaluation
Christoph Lipps, Pascal Ahr, Hans Dieter Schotten
430-433
PDF
ECHO Cyber-Skills Framework as a Cyber-Skills Education and Training Tool in Health and Medical Tourism
Jyri Rajamäki, Eleonora Beltempo, Jussi Karvonen
434-437
PDF
How to Utilize E-EWS as a Tool in Healthcare
Janne Lahdenperä, Joonas Muhonen, Jyri Rajamäki
438-441
PDF
Late Submissions
Reith, Russell, and the Robots: AI, Warfare, and Shaping the Debate
Keith Scott
443-449
PDF
Current Issue
Information
For Readers
For Authors
For Librarians