About the Conference
The International Conference on Cybersecurity and Cybercrime (IC3) is an annual scientific conference organized by the Romanian Association for Information Security Assurance that aims to encourage the exchange of ideas about the evolution of cyberspace, information security challenges, and new facets of cybercrime.
The conference began in 2014 as an initiative to provide a suitable platform for students to present their research in this field and has gained substantial support in recent years. Since 2022, the U.S. Embassy in Romania has partnered with the Romanian Association for Information Security Assurance to support the conference as part of the "Strengthen Cybersecurity Education and Research for Preventing Cybercrime" project, a partnership that obtained the Cyber Outstanding Security Performance Award (Cyber OSPA) 2022 in the Outstanding Cyber Security Partnership category.
The Proceedings of the International Conference on Cybersecurity and Cybercrime became Open Access in 2022 and indexed in international databases like EBSCOhost, Central and Eastern European Online Library (CEEOL), and Google Scholar. In addition, permanent links to the published papers will be maintained using the Digital Object Identifier (DOI) system by CrossRef.
The accepted papers from this scientific conference can be presented at CyberCon Romania, an international conference that brings experts from public institutions, private companies, universities, and NGOs, to raise awareness, embody the cybersecurity culture, and share best practices in fighting cybercrime.
Current Issue

Proceedings of the International Conference on Cybersecurity and Cybercrime (IC3)
Volume X, Year 2023
Online ISSN: 2393-0837
Print ISSN: 2393-0772
DOI: 10.19107/CYBERCON.2023
Full Issue
Articles
-
Artificial Intelligence to Counter Cyber-Terrorism
Abstract : 410PDF : 136 -
An Overview of RPL Networks from the Viewpoint of Cybersecurity
Abstract : 75PDF : 41 -
Vulnerability Scanner: Web-based Security Testing
Abstract : 76PDF : 27 -
A Computer Abusive Access Case Study Solved with Windows Registry Analysis
Abstract : 353PDF : 119 -
Artificial Intelligence and its Impact on Cybercrime
Abstract : 76PDF : 107 -
Types of Attacks and Security Methods. Virtual Machines
Abstract : 56PDF : 29 -
A Signal Theory Model for Security Monitoring using CheckMK
Abstract : 54PDF : 37 -
Digitalization of Finance: Effect or Cause of Programmed Chaos?
Abstract : 45PDF : 24 -
The Implications and Effects of Data Leaks
Abstract : 195PDF : 80 -
Open-Source Intelligence - Useful Tools in Data Analysis
Abstract : 61PDF : 41 -
Unit Testing and Automate Security Testing
Abstract : 29PDF : 21 -
Cybercrimes in the Metaverse: Challenges and Solutions
Abstract : 91PDF : 83 -
Financing Terrorism: Economy's Dark Side
Abstract : 141PDF : 51 -
Security Testing for E-Commerce Applications
Abstract : 48PDF : 31 -
A Method of Warning About Unauthorized Access to a Room
Abstract : 35PDF : 19