Proceedings of the International Conference on Cybersecurity and Cybercrime - 2022 Cover Image

Proceedings of the International Conference on Cybersecurity and Cybercrime - 2022
Proceedings of the International Conference on Cybersecurity and Cybercrime - 2022

Contributor(s): Ioan-Cosmin MIHAI (Editor), Costel CIUCHI (Editor), Gabriel PETRICĂ (Editor)
Subject(s): ICT Information and Communications Technologies
ISSN: 2393-0837
Published by: Asociatia Romana pentru Asigurarea Securitatii Informatiei
Keywords: AI; Cybersecurity; cybercrime;
Summary/Abstract: The International Conference on Cybersecurity and Cybercrime (IC3) is an annual scientific conference, with the purpose to encourage the exchange of ideas about the evolution of cyberspace, information security challenges, and new facets of the phenomenon of cybercrime. The event provides the appropriate framework for experts to present their research in this field. The International Conference on Cybersecurity and Cybercrime is part of the CyberCon Romania event, organized by the Romanian Association for Information Security Assurance. CyberCon Romania brings together experts from public institutions, private companies, and universities, for raising the level of awareness and embodies the cybersecurity culture.

  • Page Count: 119
  • Publication Year: 2022
  • Language: English
AI and IoT Mapping and the Transition to an Interconnected Cyber Defence and Intelligence Capabilities

AI and IoT Mapping and the Transition to an Interconnected Cyber Defence and Intelligence Capabilities
(AI and IoT Mapping and the Transition to an Interconnected Cyber Defence and Intelligence Capabilities)

On Digital Diplomacy. Key Issues

On Digital Diplomacy. Key Issues
(On Digital Diplomacy. Key Issues)

At the Intersection of Interests and Objectives in Cybersecurity

At the Intersection of Interests and Objectives in Cybersecurity
(At the Intersection of Interests and Objectives in Cybersecurity)

Security Enhancements for Cloud Applications

Security Enhancements for Cloud Applications
(Security Enhancements for Cloud Applications)

From the Borderless Digital Chambers to Prison’s Four Walls After Committing Personal Data Unlawful Acts

From the Borderless Digital Chambers to Prison’s Four Walls After Committing Personal Data Unlawful Acts
(From the Borderless Digital Chambers to Prison’s Four Walls After Committing Personal Data Unlawful Acts)

Healthcare Cybersecurity Vulnerabilities

Healthcare Cybersecurity Vulnerabilities
(Healthcare Cybersecurity Vulnerabilities)

Integrating and Shaping Military Cyber Defence in Operational and Intelligence Planning

Integrating and Shaping Military Cyber Defence in Operational and Intelligence Planning
(Integrating and Shaping Military Cyber Defence in Operational and Intelligence Planning)

Children and the Internet: Vulnerability or Opportunity?

Children and the Internet: Vulnerability or Opportunity?
(Children and the Internet: Vulnerability or Opportunity?)

Cybersecurity of WordPress Platforms. An Analysis Using Attack-Defense Trees Method

Cybersecurity of WordPress Platforms. An Analysis Using Attack-Defense Trees Method
(Cybersecurity of WordPress Platforms. An Analysis Using Attack-Defense Trees Method)

Cyber-Laundering

Cyber-Laundering
(Cyber-Laundering)

Cyber-Attacks Identification and Measures for Prevention

Cyber-Attacks Identification and Measures for Prevention
(Cyber-Attacks Identification and Measures for Prevention)

Analysis of Online Marketplace Scams

Analysis of Online Marketplace Scams
(Analysis of Online Marketplace Scams)

Zero Trust Security

Zero Trust Security
(Zero Trust Security)

Developing a Comprehensive Model for Digital Lifelong Learning Using Cyber Resilience Framework

Developing a Comprehensive Model for Digital Lifelong Learning Using Cyber Resilience Framework
(Developing a Comprehensive Model for Digital Lifelong Learning Using Cyber Resilience Framework)

Establishing Effective Cyber Diplomacy and Deterrence Capabilities Between International Partners

Establishing Effective Cyber Diplomacy and Deterrence Capabilities Between International Partners
(Establishing Effective Cyber Diplomacy and Deterrence Capabilities Between International Partners)

Toggle Accessibility Mode