Proceedings of the International Conference on Cybersecurity and Cybercrime - 2024 Cover Image

Proceedings of the International Conference on Cybersecurity and Cybercrime - 2024
Proceedings of the International Conference on Cybersecurity and Cybercrime - 2024

Contributor(s): Ioan-Cosmin MIHAI (Editor), Costel CIUCHI (Editor), Gabriel PETRICĂ (Editor)
Subject(s): Security and defense, Higher Education , ICT Information and Communications Technologies
ISSN: 2393-0837
Published by: Asociatia Romana pentru Asigurarea Securitatii Informatiei
Keywords: cybersecurity; cybercrime; Artificial Intelligence; vulnerability; cyber diplomacy; cyber attack
Summary/Abstract: The International Conference on Cybersecurity and Cybercrime (IC3) is an annual scientific conference, with the purpose to encourage the exchange of ideas about the evolution of cyberspace, information security challenges, and new facets of the phenomenon of cybercrime. The event provides the appropriate framework for experts to present their research in this field. The International Conference on Cybersecurity and Cybercrime is part of the CyberCon Romania event, organized by the Romanian Association for Information Security Assurance. CyberCon Romania brings together experts from public institutions, private companies, and universities, for raising the level of awareness and embodies the cybersecurity culture. Details on https://proceedings.cybercon.ro.

  • Page Count: 144
  • Publication Year: 2024
  • Language: English
Celebrating 100 Years of Modern Quality

Celebrating 100 Years of Modern Quality
(Celebrating 100 Years of Modern Quality)

The Effect of the KiberPajzs Initiative on Fraud Detected in Electronic Payments in Hungary

The Effect of the KiberPajzs Initiative on Fraud Detected in Electronic Payments in Hungary
(The Effect of the KiberPajzs Initiative on Fraud Detected in Electronic Payments in Hungary)

A National Security Perspective on Strengthening E.U. Civilian-Defence Cybersecurity Synergy: A Systemic Approach

A National Security Perspective on Strengthening E.U. Civilian-Defence Cybersecurity Synergy: A Systemic Approach
(A National Security Perspective on Strengthening E.U. Civilian-Defence Cybersecurity Synergy: A Systemic Approach)

Enhancing Cybersecurity for UAV Systems: Implementing NIS2 Provisions for Safe Drone Deployment in Albania

Enhancing Cybersecurity for UAV Systems: Implementing NIS2 Provisions for Safe Drone Deployment in Albania
(Enhancing Cybersecurity for UAV Systems: Implementing NIS2 Provisions for Safe Drone Deployment in Albania)

AR-in-a-Box: A Structured 8-Step Framework for Cybersecurity Awareness

AR-in-a-Box: A Structured 8-Step Framework for Cybersecurity Awareness
(AR-in-a-Box: A Structured 8-Step Framework for Cybersecurity Awareness)

Security of Digital Files: Audio Tampering Detection

Security of Digital Files: Audio Tampering Detection
(Security of Digital Files: Audio Tampering Detection)

Fake News

Fake News
(Fake News)

Operationalizing the Cyber Threat Landscape: Key Considerations and Challenges in Developing a Specific Organizational Program

Operationalizing the Cyber Threat Landscape: Key Considerations and Challenges in Developing a Specific Organizational Program
(Operationalizing the Cyber Threat Landscape: Key Considerations and Challenges in Developing a Specific Organizational Program)

Dynamic QR Codes: A Solution for Secure Mobile Payments

Dynamic QR Codes: A Solution for Secure Mobile Payments
(Dynamic QR Codes: A Solution for Secure Mobile Payments)

Artificial Intelligence - A Challenge of the 21st Century?

Artificial Intelligence - A Challenge of the 21st Century?
(Artificial Intelligence - A Challenge of the 21st Century?)

Cyber Threats and Exploring the Sources of Cyber Threat Intelligence

Cyber Threats and Exploring the Sources of Cyber Threat Intelligence
(Cyber Threats and Exploring the Sources of Cyber Threat Intelligence)

Profile of Persons Who Act in the Field of Computer Criminality

Profile of Persons Who Act in the Field of Computer Criminality
(Profile of Persons Who Act in the Field of Computer Criminality)

Enhancing Vulnerability Management with Artificial Intelligence Algorithms

Enhancing Vulnerability Management with Artificial Intelligence Algorithms
(Enhancing Vulnerability Management with Artificial Intelligence Algorithms)

Security of Romanian Electronic Passports: The Protection of Personal Data in the Digital Age

Security of Romanian Electronic Passports: The Protection of Personal Data in the Digital Age
(Security of Romanian Electronic Passports: The Protection of Personal Data in the Digital Age)

An Analysis on Security and Reliability of Storage Devices

An Analysis on Security and Reliability of Storage Devices
(An Analysis on Security and Reliability of Storage Devices)

Cybercrime: A New Challenge of Criminality in the Digital Age

Cybercrime: A New Challenge of Criminality in the Digital Age
(Cybercrime: A New Challenge of Criminality in the Digital Age)

Analysis of Cyber Threats at the Level of a Distributed Network

Analysis of Cyber Threats at the Level of a Distributed Network
(Analysis of Cyber Threats at the Level of a Distributed Network)

The Importance of Combating Fake News and its Impact in the Digital Age

The Importance of Combating Fake News and its Impact in the Digital Age
(The Importance of Combating Fake News and its Impact in the Digital Age)

Assessing Web Security in E-Learning Systems

Assessing Web Security in E-Learning Systems
(Assessing Web Security in E-Learning Systems)

Toggle Accessibility Mode