Central European
Cybersecurity Conference

15–16 November 2018, Ljubljana, Slovenia
Hotel Lev, Vošnjakova ulica 1, 1000 Ljubljana

Next conference: Central European Cybersecurity conference 2019, 14-15 November 2019, Munich, Germany

About the Conference

The second Central European Cybersecurity Conference – CECC 2018 aims at establishing a venue for the exchange of information on cybersecurity and its many aspects in central Europe. CECC 2018 encourages the dialogue between researchers of technical and social aspects of cybersecurity, both crucial in attaining adequate levels of cybersecurity. Complementary contributions dealing with its economic aspects as well as any legal, investigation or other issues related to cybersecurity are welcome, too.


The Proceedings of the Central European Cybersecurity Conference 2018 have been published in the ACM DL.

7 November 2018

Our second invited speaker Christian Hummert, the future director for digital forensics at ZITiS, will give an introduction into car forensics with a car2infrastructure example.

24 September 2018

The conference program has been published.

7 September 2018

Our first invited speaker Béla Genge is going to talk about critical infrastructure protection.

6 September 2018

Online registration is available.

20 July 2018

Paper submission deadline extended to 9 July 2018.

11 June 2018

Invited speakers

Béla Genge

Engineering edge security for the protection of critical infrastructures

Béla Genge obtained his PhD in 2009 in network security from the Technical University of Cluj-Napoca, Romania. After a 3-year Post-Doctoral research experience at the Joint Research Centre of the European Commission (Ispra, Italy), he was appointed as an Associate Professor at the Petru Maior University of Tg. Mures, Romania. He is a member of the Editorial Boards of the International Journal of Critical Infrastructure Protection (Elsevier), and of the Security and Communication Networks (Hindawi). His research interests include security and resilience of Industrial Control Systems, Software-Defined industrial network control, and anomaly detection systems.

Christian Hummert

An introduction into car forensics with an example of a car2infrastructure application

Christian Hummert obtained his PhD in computer science from the Friedrich-Schiller University in Jena, Germany. He worked six years as a forensic expert for the Federal Police of Thuringia. In 2015 he was appointed as a Full Professor for IT-Security / Digital Forensics at the Mittweida University of Applied Science. In October 2018 he left university and became a director for digital forensics at the Central Office for Information Technology in the Security Sector (ZITiS) in Germany. He is a member of the Steering Committee of the Embedded World Conference. His research interests include digital forensics especially forensics of embedded systems and automotive forensics.

Conference program Download as PDF

Thursday, 15 November 2018
9:00 - 18:00
10:00 - 10:30


Andrej Sotlar
Dean of the Faculty of Criminal Justice and Security, University of Maribor

Andrej Tomšič
Deputy Information Commissioner of the Republic of Slovenia

Jörg Keller
CECC 2017 Co-Chair, FernUniversität Hagen

10:30 - 11:00
Invited talk
An introduction into car forensics with an example of a car2infrastructure application
Christian Hummert (Mittweida University of Applied Sciences)
11:00 - 11:30
Coffee Break
11:30 - 12:00
Professional presentations

Artificial intelligence in cyber security
Primož Vogrinec (A1)

Security assessment in industrial control systems and IEC 62443 standards certification process
Miha Ozimek (SIQ)

12:00 - 13:00
Research papers

One countermeasure, multiple patterns: Countermeasure variation for covert channels
Steffen Wendzel, Daniela Eller and Wojciech Mazurczyk

Virtual honeypots and detecion of telnet botnets
Tomáš Bajtoš, Pavol Sokol and Terézia Mézešová

Hack my company: An empirical assessment of post-exploitation behavior and lateral movement in cloud environments
Daniel Fraunholz, Daniel Schneider, Janis Zemitis and Hans Dieter Schotten

Best Paper Award
13:00 - 15:00
Lunch break & Career marketplace
15:00 - 15:30
Invited talk

Gorazd Božič (SI-CERT)

15:30 - 16:30
Research papers

Security analysis of key acquiring strategies used by cryptographic ransomware
Ziya A. Genc, Gabriele Lenzini and P. Y. A. Ryan

Improving lawful interception in virtual datacenters
Daniel Spiekermann, Jörg Keller and Tobias Eggendorfer

Structural limitations of B+-tree forensics
Peter Kieseberg, Sebastian Schrittwieser and Edgar Weippl

16:30 - 17:00
Coffee break
17:00 - 17:15
Professional presentations

Deja-Vu: Added value of keeping your data safe
Urh Srečnik (Abakus Plus)

17:15 - 17:30
Invited talk

Safety and security of cyberspace users – criminological, victimological and preventative aspects
Gorazd Meško, Kaja Prislan, Rok Hacin, Blaž Markelj, Simon Vrhovec, Igor Bernik

17:30 - 18:30
Research papers

Coping with access control requirements in the context of mutual dependencies between business and IT
Roman Pilipchuk

Aligning business process access control policies with enterprise architecture
Roman Pilipchuk, Stephan Seifermann and Robert Heinrich

Privacy improvement model for biometric person recognition in ambient intelligence using perceptual hashing
Petra Grd, Igor Tomičić and Miroslav Bača

19:00 - 21:30
Friday, 16 November 2018
9:00 - 18:00
10:00 - 10:30
Invited talk

Engineering edge security for the protection of critical infrastructures
Béla Genge (University of Medicine, Pharmacy, Sciences and Technology of Tg. Mures)

10:30 - 11:30
Research papers

OpenSPA - An open and extensible protocol for single packet authorization
Gregor Robert Krmelj, Matjaž Pančur, Miha Grohar and Mojca Ciglarič

A brief look at the security of DeviceNet communication in industrial control systems
Pal-Stefan Murvay and Bogdan Groza

A testbed for performing security experiments with software-defined industrial control systems
Zoltán Szántó, Hunor Sándor and Béla Genge

11:30 - 12:00
Coffee break
12:00 - 12:30
Professional presentations

Cybersecurity operations, why and how
Metod Platiše (Telekom Slovenije)

Establishing SOC in energy sector - issues and obstacles
Ciril Kafol and Andrej Bregar (Informatika)

12:30 – 13:10
Research papers

It’s all fun and games, and some legalese: Data protection implications for increasing cyber-skills of employees through games
Danaja Fabčič Povše

What drives the motivation to self-protect on social networks? The role of privacy concerns and perceived threats
Damjan Fujs, Simon Vrhovec and Anže Mihelič

13:10 – 15:00
Lunch break
15:00 – 15:15
Professional presentations

Secure communication and real-time protection
Denis Justinek (Biokoda)

15:15 – 16:15
Research papers

Application detection in anonymous communication networks
Mohammad Hajian Berenjestanaki and Mohammadali Akhaee

A framework for a forensically sound harvesting the dark web
Christian Valassi, Jesper Bergman and Oliver Popov

Do ut des: Disseminating online child sexual abuse material for investigative purposes?
Sabine Witting

16:15 – 16:45
Coffee break
16:45 – 17:15
Professional presentations

"Bouquet" of several information security survey results
Boštjan Delak (Faculty of Information Studies in Novo mesto)

It is easy to be DPO with SmartDPO
Jana Češarek (SmartIS)

17:15 – 17:55
Research papers

Towards unambiguous IT risk definition
Maksim Goman

An ontology capturing the interdependence of the General Data Protection Regulation (GDPR) and information security
Melisa Geko and Simon Tjoa

17:55 – 18:20

Igor Bernik
CECC 2018 Publication Chair, University of Maribor

Best paper award sponsored by Future Internet journal, MDPI

We reserve the right to change the conference program.


Online registration is available.

Register Now!

Regular registration

300 €

Early-bird registration

200 €

Student registration

50 €

The regular registration fee includes entrance to all conference sessions and the social events. The regular registration fee does not include the accommodation.

Cancellation fee is € 50. Substitution is welcome. No cancellation will be allowed after 30 October 2018.

Early-bird registration fees must be paid before 30 September 2018.

Students have to show a valid student ID at the conference site. The student registration fee includes the entrance to all conference sessions but not the social events. The student registration fee does not include the accommodation.

Registration fees must be paid in advance via bank transfer. Please make sure all bank fees are covered by the submitting account and that the payment is free of charge for the receiver account.

Account holder: UM FVV, Kotnikova 8, 1000 Ljubljana, Slovenia
IBAN: SI56 0110 0600 0006 231
Reference number: SI00 6007-2017

Please mention your first and last name on the bank transfer.

Participants receive the original copy of the receipt on the first day of the conference.

Best Paper Award

The symposium will offer a best paper award of 500 Swiss franc (CHF) sponsored by Future Internet journal, MDPI. The award which will be announced and bestowed at the symposium closing session. The award will be conferred to the author(s) of a paper presented at the conference, selected by the symposium chairs. The decision criterion will consider both the paper quality (assessed by the program committee), and the oral presentation quality (feedback given by session chairs at the conference venue).


Selected accepted and presented research papers will be published, after further revision to ensure adequate quality for journal papers, in Cyberattack Detection and Response special issue of the Journal of Universal Computer Science (ISSN 0948-695x / 0948-6968) or in a regular issue of Future Internet (ISSN 1999-5903).

CECC 2018 proceedings will be published by Association for Computer Machinery (ACM) in the ACM Digital Library within its International Conference Proceedings Series (ICPS).

Call for Papers

The official Call for Papers is available at (EasyChair):


The conference is devoted to presenting and exploring scientific and technological advancements and original innovative applications in the field of cybersecurity. Topics for this conference include, but are not limited to:

  • Cybersecurity and cyber resilience
  • Cyber insurance
  • Digital privacy
  • Digital currency, blockchains and cybercrime
  • Law, investigation, internet jurisdiction and ethics
  • Child safety in the cyberspace
  • Cyber forensics
  • Surveillance, interception, blocking and sovereignty
  • Cyber warfare
  • Network security
  • Critical infrastructure security
  • Business continuity and disaster recovery
  • Information security governance
  • Security management
  • Cloud security
  • Internet of things security
  • Big data and cybersecurity
  • Healthcare information security
  • Software development security

Important dates

9 Jul 2018
Submission deadline
12 Aug 2018
Author notification
17 Sep 2018

Submission Guidelines

The official language of the conference is English. Papers are limited to 6 pages.

All papers must be original and not simultaneously submitted to another journal or conference. The following paper categories are welcome:

  • Full papers reporting on original research findings (5-6 pages).
  • Short papers reporting on original research findings (2-4 pages).

Papers submitted to CECC 2018 have to use the ACM SigConf template. Please, read template instructions carefully before submitting the paper.

The quality of the research papers will be assessed based on its originality, significance and clarity.

All submitted research papers will undergo a double-blind reviewing process. Please, make sure that submitted papers do not contain author names or obvious self-references.

Submission of a paper implies that at least one of the authors will register and present the paper at the conference if the paper is accepted.

Submit research papers using the CECC 2018 submission system.


Conference co-chairs

Lothar Fritsch, Karlstad University (Sweden)
Bela Genge, University of Medicine, Pharmacy, Sciences and Technology of Tg. Mures (Romania)
Joerg Keller, FernUniversitaet in Hagen (Germany)
Wojciech Mazurczyk, Warsaw University of Technology (Poland)
Simon Vrhovec, University of Maribor (Slovenia)

Program committee

Igor Bernik, University of Maribor (Slovenia)
Krzysztof Cabaj, Warsaw University of Technology (Poland)
Luca Caviglione, IMATI - CNR (Italy)
Michal Choras, University of Science and Technology (Poland)
Boštjan Delak, Faculty of Information studies in Novo mesto (Slovenia)
Tobias Eggendorfer, University of Applied Sciences Ravensburg-Weingarten (Germany)
Jan Eloff, University of Pretoria (South Africa)
Mariki Eloff, University of South Africa (South Africa)
Petra Grd, University of Zagreb (Croatia)
Mordechai Guri, Ben-Gurion University of the Negev (Israel)
Piroska Haller, Petru Maior University of Tirgu Mures (Romania)
Georgios Karopoulos, Joint Research Centre (Italy)
Stefan Katzenbeisser, Technische Universität Darmstadt (Germany)
Jean-Francois Lalande, CentraleSupélec / Inria (France)
Olaf Maennel, Tallinn University of Technology (Estonia)
Bradley A. Malin, Vanderbilt University (USA)
Blaž Markelj, University of Maribor (Slovenia)
Jorge T. Martins, University of Sheffield (United Kingdom)
Anže Mihelič, University of Ljubljana (Slovenia)
Pal-Stefan Murvay, Politehnica University of Timisoara (Romania)
Kaja Prislan, University of Maribor (Slovenia)
Gerardo I. Simari, Universidad Nacional del Sur in Bahía Blanca and CONICET (Argentina)
Kai Simon, Kai Simon Consulting (Germany)
Daniel Spiekermann, FernUniversitaet in Hagen (Germany)
Damian Weber, University of Applied Sciences in Saarbrücken (Germany)
Edgar R. Weippl, SBA Research (Austria)
Steffen Wendzel, Worms University of Applied Sciences (Germany)
Dirk Westhoff, Offenburg University of Applied Sciences (Germany)
Christos Xenakis, University of Piraeus (Greece)
Aleš Završnik, Institute of Criminology at the Faculty of Law Ljubljana (Slovenia)
Sabina Zgaga, Constitutional Court of the Republic of Slovenia (Slovenia)

Organizing chair

Blaž Markelj, University of Maribor (Slovenia)

Organizing committee

Anita Bašelj, University of Maribor (Slovenia)
Igor Bernik, University of Maribor (Slovenia)
Anže Mihelič, University of Maribor (Slovenia)
Aleksander Podlogar, University of Maribor (Slovenia)
Simon Vrhovec, University of Maribor (Slovenia)

Publication chair

Igor Bernik, University of Maribor (Slovenia)


Telekom Slovenije

Supporting Partners

CSA Slovenia Chapter

Media Partners

Previous conference: Central European Cybersecurity Conference 2017