Selected Papers

The 3rd Worldwide Cybersecurity Summit provided an excellent opportunity for experts, stakeholders and decision-makers from industry, government and academia to review papers on the international policy-related aspects of cybersecurity.

Thirteen papers were presented and discussed on topics such as: the worldwide response to a cyber crises (e.g., international priority communications and trusted information sharing); global awareness and education (e.g., protecting youth, spam, and the private-public partnerships needed to secure the global economy); and worldwide governance, frameworks and protocols for day-to-day behavior in cyberspace, and responses to cyber conflict. All of the authors presented their papers at the Poster Session of the summit.

Best Practices Against Insider Threats in All Nations by Lori Flynn, Carly Huth, Randy Trzeciak and Palma Buttles, CERT Program, Software Engineering Institute of Carnegie Mellon University, Pittsburgh, USA.

Botnets Tracking and Global Threat Intelligence- Behavior Approaches to Identifying Distributed Botnets by Andrey Komarov, Director of International Project Department, Group-IB, Moscow, Russian Federation, and Alexey Nazarov, Professor, Moscow, Russian Federation.

The Case for NATO-EU Cooperation in the Protection of Cyberspace by Fabio Rugge, Counselor, Permanent Delegation of Italy to the North Atlantic Council, Brussels, Belgium.

Communication Between Two Parties Using MJ2-RSA Cryptosystem and Signature Scheme by E. Madhusudhana Reddy, Professor, Dept. of CSE, Madanapalle Institute of Technology and Science, Madanapalle, India.

Cyber Terrorism and the Collective Responsibility of States to Secure the Global Information Society by Orji Uchenna Jerome, African Centre for Cyber Law and Cybercrime Prevention (ACCP), United Nations, African Institute for the Prevention of Crime and the Treatment of Offenders, Kampala, Uganda.

The Defects of the Draft African Union Convention on the Establishment of a Credible Legal Framework for Cybersecurity by Orji Uchenna Jerome, African Centre for Cyber Law and Cybercrime Prevention (ACCP), United Nations, African Institute for the Prevention of Crime and the Treatment of Offenders, Kampala, Uganda.

Design Characteristics of Soft Handoff in Uplink Two-Tier CDMA System by Jafaar Fahad A. Rida, Electronic and Communication Engineering, Sam Higginbottom, Institute Agriculture Technology and Science, India.

The Digital Shrink Wrap Dilemma—When We Don’t Necessarily Agree with Agreements, But Agree to Them Anyway by Konrad M. Rauscher, Pennsylvania Cyber Charter School, Leigh Valley, Pennsylvania, USA.

Fresh Tracks for Cybersecurity Policy Laterals-Updating the Track 1-Track 2 Paradigm to Tracks κ, ε and φ by Karl Frederick Rauscher, Chief Technology Officer and Distinguished Fellow, EastWest Institute, New York City, USA.

India’s Cyber Posture: Emerging Towards Maturity—An Assessment of the Current Indian Management of Cybersecurity and Online Content by Submial Bhattacharjee, Country Head, General Dynamics Corp. India Private Ltd., New Delhi, India.

A Practical Solution to Improve Cyber Security on a Global Scale—A World First Technical Socio-Ethical Approach to Cybersecurity by Vinod Patel, Founder and Director, secur IT ism Limited, London, United Kingdom.

Primer on the Multi-National Aspects of Priority International Communications Policy and Deployment (Some Communications Are “More Equal Than Others”) by Stu Goldman, Bell Labs Fellow (ret), Arizona, USA.

Security in ICT Product Research and Development by Jia Ke, Liu Yongjing, and Lang Fenghua, Huawei Technologies Co. Ltd., Beijing, China.

Have a look at the London 2011 papers (also available on IEEE Xplore).


Website developed by makeyour-point