Time (UTC +2) | SA 1 Ground Floor | SA 2 Ground Floor | SA 3 First Floor | SA 4 First Floor | SA 7 First Floor | SA 9 First Floor | |
---|---|---|---|---|---|---|---|
08:30 - 18:00 | Organizers available Conference Office - Ground Floor | ||||||
09:00 - 09:15 | Opening of the Conference Auditorium - Ground Floor | ||||||
09:15 - 10:30 | VP of Research at Forescout Technologies Session Chair: Aaron Visaggio, University of Sannio, Italy Auditorium - Ground Floor ARES Keynote - Exploring the Cyber Threat Landscape: Analyzing the Past to Uncovering Future Trends | ||||||
10:30 - 11:00 | Coffee Break | ||||||
11:00 - 12:30 | Risks, Threats, Forensics and Honeynet in Industrial Control Systems (Part I) Session Chair: Sandeep Pirbhulal, Norwegian Computing Center, Norway Invited Talk - DocExploit´s Cybersecurity Suite or how to be aware of the security level of your code to build and maintain a more secure one?
PLC Logic-Based Cybersecurity Risks Identification for ICS A Framework for Purpose-based Design and Classification of ICS Honeypots | Anonymity and Privacy in cyberspace Session Chair: Aggeliki Panou, University of Piraeus, Greece | Privacy, Anonymity, Privacy-by-Design Session Chair: Marijke Coetzee, North-West University, South Africa & Günther Pernul, Universität Regensburg, Germany Cookiescanner: An Automated Tool for Detecting and Evaluating GDPR Consent Notices on Websites Effect of Group Based Synchronization on User Anonymity in Mix Networks TRUSTEE: Towards the creation of secure, trustworthy and privacy-preserving framework User Acceptance Criteria for Privacy Preserving Machine Learning Techniques Application of Secure Two-Party Computation in a Privacy-Preserving Android App | Session Chair: Kacper Gradoń, Warsaw University of Technology, Poland & University College London, United Kingdom Keynote - What's wrong with Wolfie? Generative Artificial Intelligence and its implications for (Cyber) Security Dr hab. Kacper Gradoń, Ph.D., D.Sc.
| Session Chair: Andrew Marrington, Zayed University, United Arab Emirates Keynote - Jumping Jams: Effective Jamming in Channel Hopping-Based IoT Networks Dr. Alessandro Brighente, Department of Mathematics, University of Padova, Padua, Italy
Security Analysis of the KNX Smart Building Protocol KNX Security
| Session Chair: Marco Antonio Sotelo Monge, INDRA SISTEMAS SA, Spain, and Salvador Llopis Sanchez, Universitat Politecnica de Valencia, Spain | |
12:30 - 13:30 | Lunch Break | ||||||
13:30 - 15:00 | Risks, Threats, Forensics and Honeynet in Industrial Control Systems (Part II) Session Chair: Sandeep Pirbhulal, Norwegian Computing Center, Norway | Cybersecurity risk application Session Chair: Christos Xenakis, University of Piraeus, Greece | Incident Detection, Society, Social Aspects Session Chair: Marijke Coetzee, North-West University, South Africa & Günther Pernul, Universität Regensburg, Germany | Session Chair: Kacper Gradoń, Warsaw University of Technology, Poland & University College London, United Kingdom | Session Chair: Andrew Marrington, Zayed University, United Arab Emirates | Session Chair: Mohamed-Lamine Messai, University of Lyon, France Leveraging Knowledge Graphs For Classifying Incident Situations in ICT Systems IoT Network Attack Detection: Leveraging Graph Learning for Enhanced Security Investigating Impact of Fake-Type Content Poisoning Attack on NDN Graph-Based Android Malware Detection and Categorization through BERT Transformer | |
15:00 - 15:30 | Coffee Break | ||||||
15:30 - 17:00 | Cybersecurity, Digital Twin and Obfuscation Session Chair: Halvor Holtskog, Norwegian University of Science and Technology, Norway | AI/ML-based real-time classification of Software Defined Networking traffic Exploring Federated Learning for Speech-based Parkinson's Disease Detection An inclusive Lifecycle Approach for IoT Devices Trust and Identity Management Multi-Attribute Decision Making-based Trust Score Calculation in Trust Management in IoT | Identities, Access Management Session Chair: Günther Pernul, Universität Regensburg, Germany New Identity-Based Identification and Signature Schemes in the Standard Model Implementing Data Sovereignty: Requirements & Challenges from Practice Mitigating Privilege Misuse in Access Control through Anomaly Detection Mitigating undesired interactions between liveness detection components in biometric authentication | Session Chair: Prof. Wojciech Mazurczyk, Warsaw University of Technology, Poland Keynote - Error Rates in Multimedia Forensics Prof. Martin Steinebach, Fraunhofer Institute, Germany
| Session Chair: Andrew Marrington, Zayed University, United Arab Emirates Keynote - Who You Gonna Call? Unmasking AI Investigations through AI Forensics Dr. Ibrahim (Abe) Baggili, Louisiana State University, Baton Rouge, LA, U.S.A.
| CyberSecurity and AI Session Chair: Francesco Buccafurri, University of Reggio Calabria, Italy | |
17:00 - 17:15 | Coffee Break | ||||||
17:15 - 18:45 | Supporting and Related Project: Introduction Session Chair: Halvor Holtskog, Norwegian University of Science and Technology, Norway Center for Research-based Innovation, Norwegian Center for Cybersecurity in Critical Sectors (NORCICS) Sokratis Katsikas, NORCICS Director
International Alliance for Strengthening Cybersecurity and Privacy in Healthcare (CybAlliance) Sandeep Pirbhulal, Project Manager
Reinforcing Competence in Cybersecurity of Critical Infrastructures: A Norway – US Partnership (RECYCIN). Saba Chockalingam, Project Manager | Adversarial Machine Learning Attacks on Multiclass Classification of IoT Network Traffic Parameterizing poisoning attacks in federated learning-based intrusion detection
Keynote - The 3GPP Common API framework (CAPIF) – open-source implementation and innovation potential | Session Chair: Prof. Angelo Consoli, Scuola universitaria professionale della Svizzera italiana (SUPSI), Switzerland | Session Chair: Andrew Marrington, Zayed University, United Arab Emirates |