Proceedings of the International Conference on Cybersecurity and Cybercrime - 2023 Cover Image

Proceedings of the International Conference on Cybersecurity and Cybercrime - 2023
Proceedings of the International Conference on Cybersecurity and Cybercrime - 2023

Contributor(s): Ioan-Cosmin MIHAI (Editor), Costel CIUCHI (Editor), Gabriel PETRICĂ (Editor)
Subject(s): Economy, ICT Information and Communications Technologies
ISSN: 2393-0837
Published by: Asociatia Romana pentru Asigurarea Securitatii Informatiei
Keywords: cybersecurity; cybercrime; Artificial Intelligence; vulnerability; cyber diplomacy; cyber attack;
Summary/Abstract: The International Conference on Cybersecurity and Cybercrime (IC3) is an annual scientific conference, with the purpose to encourage the exchange of ideas about the evolution of cyberspace, information security challenges, and new facets of the phenomenon of cybercrime. The event provides the appropriate framework for experts to present their research in this field. The International Conference on Cybersecurity and Cybercrime is part of the CyberCon Romania event, organized by the Romanian Association for Information Security Assurance. CyberCon Romania brings together experts from public institutions, private companies, and universities, for raising the level of awareness and embodies the cybersecurity culture.

  • Page Count: 268
  • Publication Year: 2023
  • Language: English
Exploring a Diplomatic System of Cooperation in the Cyber Space through a Proposed Cyber Diplomacy Cooperation Framework

Exploring a Diplomatic System of Cooperation in the Cyber Space through a Proposed Cyber Diplomacy Cooperation Framework
(Exploring a Diplomatic System of Cooperation in the Cyber Space through a Proposed Cyber Diplomacy Cooperation Framework)

Artificial Intelligence to Counter Cyber-Terrorism

Artificial Intelligence to Counter Cyber-Terrorism
(Artificial Intelligence to Counter Cyber-Terrorism)

Innovation in the Financial Sector (FinTech): Paradigms, Causes, Effects and Perspectives

Innovation in the Financial Sector (FinTech): Paradigms, Causes, Effects and Perspectives
(Innovation in the Financial Sector (FinTech): Paradigms, Causes, Effects and Perspectives)

An Overview of RPL Networks from the Viewpoint of Cybersecurity

An Overview of RPL Networks from the Viewpoint of Cybersecurity
(An Overview of RPL Networks from the Viewpoint of Cybersecurity)

Vulnerability Scanner: Web-based Security Testing

Vulnerability Scanner: Web-based Security Testing
(Vulnerability Scanner: Web-based Security Testing)

Ensuring the Security of a Communication Network through Resilience. Mathematical Modeling

Ensuring the Security of a Communication Network through Resilience. Mathematical Modeling
(Ensuring the Security of a Communication Network through Resilience. Mathematical Modeling)

Enhancing EU Cyber Defense Through Hardware Trojans Detection Capabilities

Enhancing EU Cyber Defense Through Hardware Trojans Detection Capabilities
(Enhancing EU Cyber Defense Through Hardware Trojans Detection Capabilities)

Carnival of Cybercrimes - Taking off the Mask of Synthetic Identity Theft

Carnival of Cybercrimes - Taking off the Mask of Synthetic Identity Theft
(Carnival of Cybercrimes - Taking off the Mask of Synthetic Identity Theft)

Countering Daesh Cognitive and Cyber Warfare with OSINT and Basic Data Mining Tools

Countering Daesh Cognitive and Cyber Warfare with OSINT and Basic Data Mining Tools
(Countering Daesh Cognitive and Cyber Warfare with OSINT and Basic Data Mining Tools)

ChatGPT - Information Security Overview

ChatGPT - Information Security Overview
(ChatGPT - Information Security Overview)

Cyber Diplomacy and Artificial Intelligence: Opportunities and Challenges

Cyber Diplomacy and Artificial Intelligence: Opportunities and Challenges
(Cyber Diplomacy and Artificial Intelligence: Opportunities and Challenges)

Artificial News Popularity Detection Based on Telegram Channels in Azerbaijan

Artificial News Popularity Detection Based on Telegram Channels in Azerbaijan
(Artificial News Popularity Detection Based on Telegram Channels in Azerbaijan)

Smart Email Security Assistant

Smart Email Security Assistant
(Smart Email Security Assistant)

A Computer Abusive Access Case Study Solved with Windows Registry Analysis

A Computer Abusive Access Case Study Solved with Windows Registry Analysis
(A Computer Abusive Access Case Study Solved with Windows Registry Analysis)

Easy to Remember, Hard to Guess: A Password Generation Tool for the Digital Age

Easy to Remember, Hard to Guess: A Password Generation Tool for the Digital Age
(Easy to Remember, Hard to Guess: A Password Generation Tool for the Digital Age)

Artificial Intelligence and its Impact on Cybercrime

Artificial Intelligence and its Impact on Cybercrime
(Artificial Intelligence and its Impact on Cybercrime)

Protecting Your E-Commerce Business. Analysis on Cyber Security Threats

Protecting Your E-Commerce Business. Analysis on Cyber Security Threats
(Protecting Your E-Commerce Business. Analysis on Cyber Security Threats)

Types of Attacks and Security Methods. Virtual Machines

Types of Attacks and Security Methods. Virtual Machines
(Types of Attacks and Security Methods. Virtual Machines)

A Signal Theory Model for Security Monitoring using CheckMK

A Signal Theory Model for Security Monitoring using CheckMK
(A Signal Theory Model for Security Monitoring using CheckMK)

Digitalization of Finance: Effect or Cause of Programmed Chaos?

Digitalization of Finance: Effect or Cause of Programmed Chaos?
(Digitalization of Finance: Effect or Cause of Programmed Chaos?)

A FMEA Analysis on Web Applications

A FMEA Analysis on Web Applications
(A FMEA Analysis on Web Applications)

The Implications and Effects of Data Leaks

The Implications and Effects of Data Leaks
(The Implications and Effects of Data Leaks)

Security by Design

Security by Design
(Security by Design)

Enhancing the Security of Cryptographic Systems by Pseudo-Random Number Generation Algorithms

Enhancing the Security of Cryptographic Systems by Pseudo-Random Number Generation Algorithms
(Enhancing the Security of Cryptographic Systems by Pseudo-Random Number Generation Algorithms)

Open-Source Intelligence - Useful Tools in Data Analysis

Open-Source Intelligence - Useful Tools in Data Analysis
(Open-Source Intelligence - Useful Tools in Data Analysis)

Unit Testing and Automate Security Testing

Unit Testing and Automate Security Testing
(Unit Testing and Automate Security Testing)

An Efficient Security System That Uses Artificial Intelligence to Detect and Identify Objects

An Efficient Security System That Uses Artificial Intelligence to Detect and Identify Objects
(An Efficient Security System That Uses Artificial Intelligence to Detect and Identify Objects)

Cybercrimes in the Metaverse: Challenges and Solutions

Cybercrimes in the Metaverse: Challenges and Solutions
(Cybercrimes in the Metaverse: Challenges and Solutions)

Financing Terrorism: Economy's Dark Side

Financing Terrorism: Economy's Dark Side
(Financing Terrorism: Economy's Dark Side)

Security Testing for E-Commerce Applications

Security Testing for E-Commerce Applications
(Security Testing for E-Commerce Applications)

Prevention of Widespread Ransomware Cyber-Attacks through the SEAP Platform

Prevention of Widespread Ransomware Cyber-Attacks through the SEAP Platform
(Prevention of Widespread Ransomware Cyber-Attacks through the SEAP Platform)

A Method of Warning About Unauthorized Access to a Room

A Method of Warning About Unauthorized Access to a Room
(A Method of Warning About Unauthorized Access to a Room)

Guarding the Nation: A Comprehensive Look at State Cybersecurity Measure

Guarding the Nation: A Comprehensive Look at State Cybersecurity Measure
(Guarding the Nation: A Comprehensive Look at State Cybersecurity Measure)

Methods for Detecting Malware Using Static, Dynamic and Hybrid Analysis

Methods for Detecting Malware Using Static, Dynamic and Hybrid Analysis
(Methods for Detecting Malware Using Static, Dynamic and Hybrid Analysis)

Toggle Accessibility Mode