<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Cyber Resilience in the Business Environment: Insights from AI-based Solutions and Data Protection Standards</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Nemanja Zdravković</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Miguel Ángel Conde</string-name>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sonsoles López-Pernas</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ponnusamy Vijayakumar</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Faculty of Information Technology, Belgrade Metropolitan University</institution>
          ,
          <addr-line>Tadeuša Košćuška 63, Belgrade, 11000</addr-line>
          ,
          <country country="RS">Serbia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>SRM IST, ECE Department</institution>
          ,
          <addr-line>Kattankulathur, Chennai, 603203</addr-line>
          ,
          <country country="IN">India</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>University of Eastern Finland</institution>
          ,
          <addr-line>Yliopistokatu-2, Joensuu, 80100</addr-line>
          ,
          <country country="FI">Finland</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>University of León, Engineering School</institution>
          ,
          <addr-line>Campus de Vegazana S/N, León, 24071</addr-line>
          ,
          <country country="ES">Spain</country>
        </aff>
      </contrib-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>The main focus of the BISEC-2022 was cyber resilience. and communication systems, especially in the field of
Participants had the opportunity to hear the latest in- blockchain technologies and federated machine learning.
formation in the field of network infrastructure protec- It was pointed out that it is of great importance to have a
tion, protection standards in the business environment, solid cooperation between the economy, the public sector
blockchain technologies in the financial sector, but also and the academic community in the field of information
in the machine learning sectors, especially in distributed security and communication systems.
machine learning – federated learning. The participants The conference had two keynote talks. The first
got to know each other and exchanged experiences about keynote was delivered by Professor Ponnusamy
Vijayakuthe latest advanced techniques for protecting critical in- mar from SRM IST University in India, who delivered
frastructure, as well as about the use of artificial intel- the conference keynote on the topic "Federated Machine
ligence in protecting critical infrastructure. There was Learning and Blockchain." His insightful talk shed light
also talk about Data Protection Standards in the RS and on the challenges and opportunities of implementing
EU Laws related to data protection. The dean of the Fac- federated machine learning with added security with
ulty of Information Technology at Belgrade Metropolitan blockchain. The keynote paper is part of these
proceedUniversity, Prof. Dr. Miroslava Raspopović Milić, opened ings and it brings up important point on the merging of
the conference and pointed out that new technologies two novel distributed technologies.
and standards in data protection drive today’s and future The second keynote was delivered by Professor Slavko
business environment. Lecturers from public and private Gajin from the School of Electrical Engineering,
Univerinstitutions and Serbian politics and economy presented sity of Belgrade. In his paper, prof. Gajin presented a
their current solutions and works that are current or will comprehensive method for entropy-based network trafic
ifnd their application in the future. The conference pro- anomaly detection and classification that relies on flow
ceedings present a compilation of selected nine accepted data, both from a research and implementation aspects.
articles and short papers at the conference out of 15 paper Starting from the well-known entropy-based approach,
submissions received. the paper revealed the results of our methodic work in</p>
      <p>It was highlighted that the number of diferent ex- solving the main challenges in designing an eficient
ploitations over the Internet is growing year by year. anomaly detection solution empowered with the original
Cybersecurity can therefore no longer be viewed in iso- classification method.
lation from real-world security. Leading experts in the Julijana Mirčevski presented the paped entitled
"Seifeld of information security from the country and the curity of financial software to support cryptocurrency
region exchanged experiences related to the latest tech- trading", which focused on the use of diferent software
nologies and standards that are applied in practice when tools necessary for financial institutions handling
crypit comes to the protection and security of information tocurrency trading.</p>
      <p>Andreja Samčović presented the paper entitled
"Methods of Monitoring and Collection of User Data on the
Example of Facebook" giving a global overview on the
tools and processes that are used every day to collect data
on all platforms where the social networks are present.</p>
      <p>The paper focused on drawing the attention of users in
all the ways in which the owners of the social networks
monitor and record activities of the users.</p>
      <p>Sara Nikolić’s paper "A comparison on Hyperledger
BISEC’22: 13th International Conference on Business Information
Security, December 03, 2022, Belgrade, Serbia
$ nemanja.zdravkovic@metropolitan.ac.rs (N. Zdravković);
mcong@unileon.es (M. Á. Conde); sonsoles.lopez@uef.fi
(S. López-Pernas); vijayakp@srmist.edu.in (P. Vijayakumar)</p>
      <p>0000-0002-2631-6308 (N. Zdravković); 0000-0001-5881-7775
(M. Á. Conde); 0000-0002-9621-1392 (S. López-Pernas);
0000-0002-3929-8495 (P. Vijayakumar)</p>
      <p>© 2023 Copyright for this paper by its authors. Use permitted under Creative Commons License
CPWrEooUrckReshdoinpgs IhStpN:/c1e6u1r3-w-0s.o7r3g ACttEribUutRion W4.0oInrtekrnsahtioonpal (PCCroBYce4.0e).dings (CEUR-WS.org)</p>
      <p>Conclusion
consensus mechanism security and their applications"
analyzed the security properties of the most popular
Hyperledger DLTs’ consensus mechanisms, with an em- We extend our gratitude to all of the authors who
conphasis on security and computational complexity. The tributed with their research for these proceedings. We
focus of the papers was on the similarities and difer- would also like to thank all the participants, attendees,
ences between the DLTs, comparing them to Bitcoin’s and volunteers who made BISEC-2022 a successful and
proof-of-work and Ethereum’s proof-of-stake, with the productive event. We hope that discussions, open
diagoal to find the most and least secure. logues, and identified issues and potential research topics</p>
      <p>Zlatogor Minchev presented the paper "Proactive Iden- will contribute to the advancement of the field of
busitification of Future Cyber Threats", which outlined a ness data security, novel attack prevention and protection
methodology for joint exploration of cyber threats, using schemes, and cybersecurity overall.
both expert and machine intellect. A combined
assessment was performed on the accomplished results with a Acknowledgment
simulated futuristic environment, adding
human-in-theloop biometric response. The BISEC-2022 conference was cosponsored by the
Min</p>
      <p>Dušan Simjanović’s paper "Cyber Security Criteria: istry of Science, Technological Development, and
InnovaFuzzy AHP approach" presented two groups of criteria tions of the Republic of Serbia. The conference organizers
with a total of eight sub-criteria afecting cyber security, would like to acknowledge this support and partnership,
and their ranking using Fuzzy Analytical Hierarchy Pro- which helped out in making the BISEC-2022 successful
cess, in which data/password leaks, phishing detection conference. During the preparation of the conference, a
and DoS attack detection were recognized as the most total of 15 paper submissions were received, while 9
artiimportant sub-criteria. cles and short papers were selected for this publication.</p>
      <p>Nemanja Veselinović presented the paper "Countering
Cybersecurity Threats with AI", with an emphasis on the
role of artificial intelligence in cyber attacks. The paper
discussed the role of machine learning, as well as deep
learning methods, highlighting the most useful methods
in cybersecurity application.</p>
      <p>Finally, Miloš Milašinović’s paper "Data Protection
Standards in the Business Environment" presented
multiple security frameworks with an emphasis on legal and
technical aspects, necessary for a company’s compliance
process with the GDPR. With regards to the necessary
implementation of technological solutions, the paper
presented several suggestions for the development of
application support that could be applicable and in compliance
with the GDPR.</p>
    </sec>
  </body>
  <back>
    <ref-list />
  </back>
</article>