Proceedings of the International Conference on Cybersecurity and Cybercrime- 2025 Cover Image

Proceedings of the International Conference on Cybersecurity and Cybercrime- 2025
Proceedings of the International Conference on Cybersecurity and Cybercrime- 2025

Contributor(s): Ioan-Cosmin MIHAI (Editor), Costel CIUCHI (Editor), Gabriel PETRICĂ (Editor)
Subject(s): Politics / Political Sciences, Politics, Social Sciences, Economy, Education, Political Sciences, Security and defense, Higher Education , ICT Information and Communications Technologies
ISSN: 2393-0837
Published by: Asociatia Romana pentru Asigurarea Securitatii Informatiei
Keywords: cybersecurity; cybercrime; Artificial Intelligence; vulnerability; cyber diplomacy; cyber attack;
Summary/Abstract: The International Conference on Cybersecurity and Cybercrime (IC3) is an annual scientific conference, with the purpose to encourage the exchange of ideas about the evolution of cyberspace, information security challenges, and new facets of the phenomenon of cybercrime. The event provides the appropriate framework for experts to present their research in this field. The International Conference on Cybersecurity and Cybercrime is part of the CyberCon Romania event, organized by the Romanian Association for Information Security Assurance. CyberCon Romania brings together experts from public institutions, private companies, and universities, for raising the level of awareness and embodies the cybersecurity culture. Details on https://proceedings.cybercon.ro.

  • Page Count: 132
  • Publication Year: 2025
  • Language: English
The Fight Against Terrorism in the Digital Era: Policing Perspectives, Legislative References, and Cybercrime Dimensions

The Fight Against Terrorism in the Digital Era: Policing Perspectives, Legislative References, and Cybercrime Dimensions
(The Fight Against Terrorism in the Digital Era: Policing Perspectives, Legislative References, and Cybercrime Dimensions)

AI-Assisted Anomaly Detection for Cybersecurity in IMS Core Networks: A KPI-Driven Study Based on Real-World Telecom Data

AI-Assisted Anomaly Detection for Cybersecurity in IMS Core Networks: A KPI-Driven Study Based on Real-World Telecom Data
(AI-Assisted Anomaly Detection for Cybersecurity in IMS Core Networks: A KPI-Driven Study Based on Real-World Telecom Data)

Software System for Increasing Security in Telecommunications Networks

Software System for Increasing Security in Telecommunications Networks
(Software System for Increasing Security in Telecommunications Networks)

Trust Abuse in the Underbelly of Critical Infrastructure Operations

Trust Abuse in the Underbelly of Critical Infrastructure Operations
(Trust Abuse in the Underbelly of Critical Infrastructure Operations)

Enhancing the Security of High-Responsibility Information Systems Through Fault Tree Modeling

Enhancing the Security of High-Responsibility Information Systems Through Fault Tree Modeling
(Enhancing the Security of High-Responsibility Information Systems Through Fault Tree Modeling)

Securing the Future: Cybersecurity Challenges in Wearable Devices

Securing the Future: Cybersecurity Challenges in Wearable Devices
(Securing the Future: Cybersecurity Challenges in Wearable Devices)

Public Attribution in Cyberspace: Symbolic Gesture or Strategic Weapon?

Public Attribution in Cyberspace: Symbolic Gesture or Strategic Weapon?
(Public Attribution in Cyberspace: Symbolic Gesture or Strategic Weapon?)

The Web Ecosystem Between Vulnerability and Resilience: The Case of Polyfill.io

The Web Ecosystem Between Vulnerability and Resilience: The Case of Polyfill.io
(The Web Ecosystem Between Vulnerability and Resilience: The Case of Polyfill.io)

Enhancing 5G Infrastructure to Withstand Emerging Digital Threats

Enhancing 5G Infrastructure to Withstand Emerging Digital Threats
(Enhancing 5G Infrastructure to Withstand Emerging Digital Threats)

Law Enforcement Cooperation in the Prevention and Countering of Disinformation

Law Enforcement Cooperation in the Prevention and Countering of Disinformation
(Law Enforcement Cooperation in the Prevention and Countering of Disinformation)

Communication Security in Computer Networks: Encryption Methods and Performance Evaluation

Communication Security in Computer Networks: Encryption Methods and Performance Evaluation
(Communication Security in Computer Networks: Encryption Methods and Performance Evaluation)

Border Control Entry-Exit System - the New Way of Secure Travelling

Border Control Entry-Exit System - the New Way of Secure Travelling
(Border Control Entry-Exit System - the New Way of Secure Travelling)

Deliberative Loading of a Global Polyfill: Compromise Simulation and OSINT Analysis

Deliberative Loading of a Global Polyfill: Compromise Simulation and OSINT Analysis
(Deliberative Loading of a Global Polyfill: Compromise Simulation and OSINT Analysis)

Generative AI Applications in Cybersecurity and Cybercrime

Generative AI Applications in Cybersecurity and Cybercrime
(Generative AI Applications in Cybersecurity and Cybercrime)

Toggle Accessibility Mode