Next conference: Central European Cybersecurity Conference 2018

About the Conference

The Central European Cybersecurity Conference – CECC 2017 aims at establishing a venue for the exchange of information on cybersecurity and its many aspects in central Europe. CECC 2017 encourages the dialogue between researchers of technical and social aspects of cybersecurity, both crucial in attaining adequate levels of cybersecurity. Complementary contributions dealing with its economic aspects as well as any legal, investigation or other issues related to cybersecurity are welcome, too.


CECC 2017 research papers have been indexed in dblp.

4 Februar 2018

Check out the CECC 2017 photo album.

8 December 2017

Research papers have been published by University of Maribor Press.

15 November 2017

Our third invited speaker Daniel Cohen is going to speak about cybersecurity in the military.

8 November 2017

We are presenting our third invited speaker: Lior Tabansky.

6 November 2017

We have updated the conference program: Learn about the Human firewall from the Force Command of the Slovenian Armed Forces and meet the head of the Slovenian CERT (SI-CERT).

19 October 2017

The conference program has been published!

8 October 2017

Online registration is available.

30 August 2017

We have a new invited speaker: Jörg Keller

28 July 2017

Paper submission deadline extended to 26 July 2017!

25 July 2017

Abstract submission deadline extended to 19 June 2017!

29 May 2017

Selected papers will be published in a Special Issue of the Journal of Universal Computer Science

23 May 2017

Check out our first invited speaker: Stefan Katzenbeisser

3 April 2017

Updated submission guidelines.

3 April 2017

Conference website up and running.

6 March 2017

Invited speakers

Stefan Katzenbeisser

Enforcing Software Integrity in the Internet of Things

Stefan Katzenbeisser obtained a Ph.D. from the Vienna University of Technology, Austria. After working as Senior Scientist at Philips Research, he joined TU Darmstadt as professor for Security Engineering in 2008. His current research interests include applied cryptography, privacy enhancing technologies, platform security and critical infrastructure security.

Jörg Keller

Network Steganography: Principles, Countermeasures, Applications

Jörg Keller obtained a Ph.D. from Saarland University, Saarbrücken, Germany. After a post doc year at CWI, Amsterdam, and a habilitation fellowship at Saarland University, he joined FernUniversität in Hagen, Germany as professor for Computer Engineering in 1996. His current research interests include IT security, parallel, fault-tolerant and energy-efficient computing, and virtual laboratories.

Daniel Cohen

Cyber Response to the Wave of Terrorism

Daniel Cohen is the head of the Strategy Program at The Abba Eban Institute for International Diplomacy, IDC Herzliya. He is also a researcher at Blavatnik Interdisciplinary Cyber Research Center (ICRC) at Tel Aviv University where his fields include cyber security and terrorism, terrorist organizations' use of web and social media, and counter terrorism. He received his BA in Government from IDC, Herzliya and MA in Security Studies from Tel Aviv University. He lecturers in the private and public sectors both in Israel and abroad. Daniel serves as a consultant expert for the UN Security Council Counter-Terrorism Committee and the Organization for Security and Co-operation in Europe (OSCE).

Conference program

Thursday, 16 November 2017
9:00 - 17:30
10:00 - 10:30


Andrej Sotlar
Dean of the Faculty of Criminal Justice and Security, University of Maribor

Igor Bernik
University of Maribor, CECC 2017 Chair

10:30 - 11:00
Invited talk
Enforcing Software Integrity in the Internet of Things
Stefan Katzenbeisser (TU Darmstadt)
11:00 - 11:30
Coffee Break
11:30 - 12:00
Professional presentations

The institutional logic of cybersecurity
Jorge Tiago Martins (University of Sheffield)

How to identify the current status of cybersecurity
Boštjan Delak (Faculty of Information Studies in Novo Mesto)

12:00 - 13:00
Research papers

Explaining the employment of information security measures by individuals in organizations: The self-protection model
Anže Mihelič and Simon Vrhovec

Why did I end up living in a cave? Risks of IoT at home
Nerea Sainz de La Maza Doñabeitia, Miguel Hernández Boza, Javier Jiménez del Peso and José Ignacio Escribano Pablos

Security of IoT Cloud Services - A User-Oriented Test Approach
Martin Böhm, Ina Schiering and Diederich Wermser

13:00 - 15:00
Lunch break
15:00 - 15:30
Invited talk
Network Steganography: Principles, Countermeasures, Applications
Jörg Keller (FernUniversität Hagen)
15:30 - 16:00
Professional presentations

Information Technology Assessment: ISO and Pentest / Preverjanje informacijskih tehnologij: ISO in pentest
Miha Ozimek (SIQ)

Sistematski pristop k reševanju informacijsko-varnostnih groženj
Primož Vogrinec (A1)

16:00 - 16:30
Coffee Break
16:30 - 17:30
Research papers

Cycle Structure and Reachability Analysis for Cipher Spritz with small N
Jörg Keller

Concept Drift Analysis for Improving Anomaly Detection Systems in Cybersecurity
Michał Choraś and Michał Woźniak

Children Privacy Protection in Video Surveillance Based on Automatic Age Estimation
Petra Grd, Igor Tomičić and Miroslav Bača

19:00 - 21:30
Friday, 17 November 2017
9:00 - 16:00
10:00 - 10:30
Professional presentations

Zaposleni kot največje varnostno tveganje
Filip Božič (Zupo)

Securing web and cloud services / Zaščita spletnih in oblačnih storitev
Sebastjan Lajkovič (GenLan)

10:30 - 11:30
Research papers

The Cipher, the Random and the Ransom: A Survey on Current and Future Ransomware
Ziya Alper Genç, Gabriele Lenzini and Peter Y.A. Ryan

Use of mobile devices in hospitals and perceived data breach consequences: An explorative study
Simon Vrhovec and Blaž Markelj

Preparation of response model to cyber-attacks at nuclear facilities
Samo Tomažič and Igor Bernik

11:30 - 12:00
Coffee Break
12:00 - 12:30
Invited talk
Cyber Response to the Wave of Terrorism
Daniel Cohen (IPD Forum)
12:30 - 13:00
Professional presentations

Evolution of Computer Security Incidents
Gorazd Božič (SI-CERT)

13:00 - 15:00
Lunch break
15:00 - 15:30
Professional presentations
Security of contactless transactions
Mitja Vreča (PrintecGroup)
15:30 - 16:30
Research papers

Information security management practices: Expectations and reality
Kaja Prislan, Branko Lobnikar and Igor Bernik

Mobile security: Two generations of potential victims
Blaž Markelj and Sabina Zgaga

Combat Mobile Evasive Malware via Deep Learning
Irfan Bulut, A. Gokhan Yavuz and R. Can Aygun


Online registration is available.

Register Now!

Regular registration
€ 300
Early-bird registration
€ 200
Student registration
€ 50

The regular registration fee includes entrance to all conference sessions and the social events. The regular registration fee does not include the accommodation.

Cancellation fee is € 50. Substitution is welcome. No cancellation will be allowed after 30 October 2017.

Students have to show a valid student ID at the conference site. The student registration fee includes the entrance to all conference sessions but not the social events. The student registration fee does not include the accommodation.

Special accommodation proposals from Union Hotels are available from 15 to 17 November 2017 for conference attendants.

Registration fees must be paid in advance via bank transfer. Please make sure all bank fees are covered by the submitting account and that the payment is free of charge for the receiver account.

Account holder: UM FVV, Kotnikova 8, 1000 Ljubljana, Slovenia
IBAN: SI56 0110 0600 0006 231
Reference number: SI00 6007-2017

Please mention your first and last name on the bank transfer.

Participants receive the original copy of the receipt on the first day of the conference.

Call for Papers

The official Call for Papers is available at (EasyChair):


The conference is devoted to presenting and exploring scientific and technological advancements and original innovative applications in the field of cybersecurity. Topics for this conference include, but are not limited to:

  • Cybersecurity and cyber resilience
  • Cyber insurance
  • Digital privacy
  • Digital currency, blockchains and cybercrime
  • Law, investigation, internet jurisdiction and ethics
  • Child safety in the cyberspace
  • Cyber forensics
  • Surveillance, interception, blocking and sovereignty
  • Cyber warfare
  • Network security
  • Critical infrastructure security
  • Business continuity and disaster recovery
  • Information security governance
  • Security management
  • Cloud security
  • Internet of things security
  • Big data and cybersecurity
  • Healthcare information security
  • Software development security

Important dates

19 Jun 2017
Abstract submission deadline
26 Jul 2017
Full paper submission deadline
18 Sep 2017
Author notification
2 Oct 2017


All accepted and presented research papers will be available in Open Access conference proceedings published by the University of Maribor Press and submitted for indexing by DBLP, Elsevier SCOPUS and Thomson Reuters Web of Science™ Core Collection.

Research papers published by University of Maribor Press are available:

Selected accepted and presented research papers will be published, after further revision to ensure adequate quality for journal papers, in special issue “Technical and Social Aspects of Critical Infrastructure Security” of the Journal of Universal Computer Science (ISSN 0948-695x / 0948-6968).

Paper Submission

The official language of the conference is English. Papers are limited to 4 - 6 pages.

All papers must be original and not simultaneously submitted to another journal or conference. The following paper categories are welcome:

  • research papers (academic or industrial)
  • professional papers and presentations (both English and Slovene papers and presentations are welcome)

The quality of the research papers will be assessed based on its originality, significance and clarity.

All submitted research papers will undergo a double-blind reviewing process. Please, make sure that submitted papers do not contain author names or obvious self-references.

Submission of a paper implies that at least one of the authors will register and present the paper at the conference if the paper is accepted.

Submission system

Submit research papers using the CECC 2017 submission system (EasyChair):

Submit professional papers and presentations to

Program Committee

Conference chair

Igor Bernik, University of Maribor (Slovenia)

Program committee members

Miroslav Bača, University of Zagreb (Croatia)

Gorazd Božič, SI-CERT (Slovenia)

Luca Caviglione, ISSIA, CNR (Italy)

Jan Eloff, University of Pretoria (South Africa)

Petra Grd, University of Zagreb (Croatia)

Stefan Katzenbeisser, Technische Universität Darmstadt (Germany)

Joerg Keller, FernUniversitaet in Hagen (Germany)

Branko Lobnikar, University of Maribor (Slovenia)

Bradley A. Malin, Vanderbilt University (USA)

Blaž Markelj, University of Maribor (Slovenia)

Jorge T. Martins, University of Sheffield (United Kingdom)

Wojciech Mazurczyk, Warsaw University of Technology (Poland)

David Naccache, Centre National de la Recherche Scientifique (France)

Andrej Orel, Marand (Slovenia)

Fernando Pérez-González, Universidade de Vigo (Spain)

Gerardo I. Simari, Universidad Nacional del Sur in Bahía Blanca and CONICET (Argentina)

Andrej Sotlar, University of Maribor (Slovenia)

Mark Strembeck, WU Wien (Austria)

Simon Vrhovec, University of Maribor (Slovenia)

Edgar R. Weippl, SBA Research (Austria)

Steffen Wendzel, Worms University of Applied Sciences (Germany)

Aleš Završnik, Institute of Criminology at the Faculty of Law Ljubljana (Slovenia)

Dušan Zupančič, Chamber of Commerce and Industry of Slovenia, Association for IT and telecommunications (Slovenia)


Supporting Partners