Tuesday 23.08.2022 Detailed

Time (UTC +2)
HS 01
SR 03
SR 04
SR 05
SR 06
SR 07
SR 08
08:00 - 19:00
Organizers available
08:45 - 09:00
ARES Opening
Edgar Weippl, Mathias Fischer
HS 01

Edgar Weippl (SBA Research and University of Vienna, Austria), Mathias Fischer (Universität Hamburg, Germany)

09:00 - 09:05
EU Workshop Pitch Session
Session Chair:
Florian Skopik (AIT, Austria)
HS 01

Short Pitch of each EU Symposium Workshop

09:05 - 10:30
ARES Keynote
Steve Furnell
HS 01

The strange world of the password

Steve Furnell (University of Nottingham, United Kingdom)

Abstract: Despite years of evidence of poor practice, people continue to choose weak passwords and continue to be allowed to do so. Normally, if something is broken then the answer is to fix or replace it. However, with passwords the problem seems able to persist unchecked and we continue to use them extensively despite the flaws. Adding further evidence of the issue, this presentation reports on the fifth run of a study into the provision of password guidance and the enforcement of password rules by a series of leading websites. The investigation has been conducted every 3-4 years since 2007 and the latest findings continue to reveal areas of notable weakness. This includes many sites still offering little or no meaningful guidance, and still permitting users to choose passwords that ought to be blocked at source. It seems that while we remain ready to criticise users for making poor choices, we repeatedly fail to take steps that would help them to do better.

10:30 - 10:45
Short Coffee Break
10:45 - 12:45
ARES I
Best Paper
Session Chair:
Mathias Fischer (University of Hamburg, Germany)

VMIFresh: Efficient and Fresh Caches for Virtual Machine  Introspection

Thomas Dangl (University of Passau, Germany), Stewart Sentanoe (University of Passau, Germany) and Hans P. Reiser (Reykjavík University, Iceland)

Privacy-Preserving Polyglot Sharing and Analysis of Confidential Cyber Threat Intelligence

Davy Preuveneers and Wouter Joosen (imec-DistriNet, KU Leuven, Belgium)

Distance-based Techniques for Personal Microbiome Identification

Markus Hittmeir, Rudolf Mayer and Andreas Ekelhart (SBA Research, Austria)

SOAR4IoT: Securing IoT Assets with Digital Twins

Philip Empl, Daniel Schlette, Daniel Zupfer and Günther Pernul (University of Regensburg, Germany)

EPESec I
Session Chair:
Theodoros Rokkas (inCITES Consulting, Luxembourg)

Attacking Power Grid Substations: An Experiment Demonstrating How to Attack the SCADA Protocol IEC 60870-5-104

László Erdődi, Pallavi Kaliyar, Siv Hilde Houmb, Aida Akbarzadeh and Andre Jung Waltoft-Olsen (Department of Information Security and Communication Technology, Norwegian University of Science and Technology, Norway)

Substation-Aware. An intrusion detection system for the IEC 61850 protocol

Jose Antonio Lopez, Iñaki Angulo and Saturnino Martinez (TECNALIA, Basque Research and Technology Alliance (BRTA), Spain)

Cyber-security measures for protecting EPES systems in the 5G area

Alexios Lekidis (Public Power Corporation, Greece)

Handling Critical Infrastructures in Federation of Cyber Ranges: A Classification Model

Evangelos Chaskos, Jason Diakoumakos, Nicholas Kolokotronis and George Lepouras (University of the Peloponnese Department of Informatics and Telecommunications, Greece)

Fault-Tolerant SDN Solution for Cybersecurity Applications

Athanasios Liatifis (University of Western Macedonia, Macedonia), Christos Dalamagkas (Testing Research & Standards Center of Public Power Corporation SA, Greece), Panagiotis Radoglou-Grammatikis (University of Western Macedonia, Macedonia), Thomas Lagkas (International Hellenic University, Greece), Evangelos Markakis (Hellenic Mediterranean University, Greece), Valeri Mladenov (Technical University of Sofia, Bulgaria), Panagiotis Sarigiannidis (University of Western Macedonia, Macedonia)

Securing Communication and Identifying Threats in RTUs: A Vulnerability Analysis

Engla Rencelj Ling (Division of Network and Systems Engineering, KTH Royal Institute of Technology, Sweden), Jose Eduardo Urrea Cabus (Division of Network and Systems Engineering, KTH Royal Institute of Technology, Sweden), Ismail Butun (Division of Network and Systems Engineering, KTH Royal Institute of Technology, Sweden), Robert Lagerström (Division of Network and Systems Engineering, KTH Royal Institute of Technology, Sweden), Johannes Olegard (Department of Computer and Systems Sciences, Stockholm University, Sweden)

IWCSEC I
Fast-Paced And Secure Code Development And Deployment
Session Chair:
Péter Hegedűs (FrontEndART Szoftver Kft., Hungary)

Explainability-based Debugging of Machine Learning for Vulnerability Discovery

Angelo Sotgiu, Maura Pintor and Battista Biggio (Pluribus One, University of Cagliari, Italy)

Lightweight Parsing and Slicing for Bug Identification in C

Luca Mecenero (University of Trento, Italy), Ranindya Paramitha (University of Trento, Italy), Ivan Pashchenko (TomTom, The Netherlands), Fabio Massacci (University of Trento, Italy, Vrije Universiteit Amsterdam, The Netherlands)

On the feasibility of detecting injections in malicious npm packages

Simone Scalco (University of Trento, Italy), Ranindya Paramitha (University of Trento, Italy), Duc-Ly Vu (FPT University, Vietnam) and Fabio Massacci (University of Trento, Italy, Vrije Universiteit Amsterdam, The Netherlands)

Towards a Security Benchmark for the Architectural Design of Microservice Applications

Anusha Bambhore Tukaram (Hamburg University of Technology, Germany), Simon Schneider (Hamburg University of Technology, Germany), Nicolás E. Díaz Ferreyra (Hamburg University of Technology, Germany), Georg Simhandl (University of Vienna, Austria), Uwe Zdun (University of Vienna, Austria), Riccardo Scandariato (Hamburg University of Technology, Germany)

Learning State Machines to Monitor and Detect Anomalies on a Kubernetes Cluster

Clinton Cao (Delft University of Technology, The Netherlands), Agathe Blaise (Thales SIX GTS France, France), Sicco Verwer (Delft University of Technology, The Netherlands) and Filippo Rebecchi (Thales SIX GTS France, France)

Security Maturity Self-Assessment Framework for Software Development Lifecycle

Raluca Brasoveanu (TomTom, The Netherlands), Yusuf Karabulut (TomTom, Germany) and Ivan Pashchenko (TomTom, The Netherlands)

NG - SOC I

tba

SP2I I
Applied Cryptography, Security And Privacy
Session Chair:
Lukas Malina (Brno University of Technology, Czech Republic)

Security-by-Design in Intelligent Infrastructures: the HAII-T orchestrator

Gabriele CostaIMT School for Advanced Studies Lucca

Abstract: In the last years Security-by-Design has emerged as the main methodology for securing the life cycle of software and systems. Its effectiveness is the result of a strong integration with all the development phases, from the earliest conceptualization and design to the final disposal. Large scale, critical infrastructures can benefit the most from this approach. Nevertheless, they also carry an extreme degree of complexity that must be dealt with. In this talk we will consider the SPARTA perspective on the definition and implementation of a secure orchestrator for making intelligent infrastructures Secure-by-Design.

Implementation of Revocable Keyed-Verification Anonymous Credentials on Java Card

Raúl Casanova-Marqués (Brno University of Technology, Universitat Jaume I, Czech Republic), Petr Dzurenda (Brno University of Technology, Czech Republic), Jan Hajny (Brno University of Technology, Czech Republic)

Real-world Deployment of Privacy-Enhancing Authentication System using Attribute-based Credentials

Petr Dzurenda (Brno University of Technology, Czech Republic), Raúl Casanova-Marqués (Brno University of Technology, Universitat Jaume I, Czech Republic), Lukas Malina (Brno University of Technology, Czech Republic)

ETACS I
Cybersecurity Education, Training And Awareness
Session Chair:
Jan Hajny (SPARTA, Brno University of Technology, Czech Republic)

Cybersecurity Skills Gap: ENISA Analysis and Actions

Fabio Di Franco, ENISA

Abstract: Fabio will provide a holistic view on the nature and characteristics of the skills gap in Europe and the results of the joint effort done with other EU players (eg. the pilots of the EU Competence Network). He will report on the European Cybersecurity Skills Framework (ECSF) which aims to close the cybersecurity skills’ gap on the European labour market, building comprehensive bridges between European workplace context and learning environment through an EU skills framework.  He will also provide insights on the cybersecurity higher education database (CyberHEAD), an initiative to allow young talents to make informed decisions on the variety of possibilities offered by higher education in cybersecurity through an easy-to-use web portal.

Properties for Cybersecurity Awareness Posters’ Design and Quality Assessment

Sunil Chaudhary (Norwegian University of Science and Technology, Norway), Marko Kompara (University of Maribor, Slovenia), Sebastian Pape (Goethe University, Germany), Vasileios Gkioulos (Norwegian University of Science and Technology, Norway)

Security of Smart Grid Networks in the Cyber Ranges

Tomas Lieskovan, Jan Hajny (Brno University of Technology, Czech Republic)

Requirements for an Information Privacy Pedagogy based on the Constructivism Learning Theory

Thanos Papaioannou (Ionian University, Greece), Aggeliki Tsohou (Ionian University, Greece), Maria Karyda (University of the Aegean, Greece), Stylianos Karagiannis (PDM & FC, Portugal)

CyBOK - The Cyber Security Body Of Knowledge

Dr. Yulia Cherdantseva, Senior Lecturer at the School of Computer Science & Informatics at Cardiff University

Abstract: Cyber Security Body of Knowledge (CyBOK) is a major project sponsored by the UK National Cyber Security Centre with the aim of developing a substantial resource offering a guide to the Cyber Security as a discipline and as a field of professional practice.  CyBOK codifies the foundational knowledge in cyber security for education and professional training.  It is an open and freely accessible resource (www.cybok.org) developed by the Community for the Community with contributions from over 115 experts across the world since 2017. CyBOK v1.1 is constituted by 21 knowledge areas. There are also free supplementary resources for students, educators and trainers, e.g. podcasts, resources for developing programmes based on CyBOK, lab materials, case studies for use in classroom, etc. This presentation will describe the process of developing CyBOK and maintaining it up to date, discuss the role of the international community in this process, outline the use cases of CyBOK and the future directions of the CyBOK project evolution.

SECPID I
Session Chair:
Sebastian Ramacher (AIT Austrian Institute of Technology GmbH, Austria)

Hide and Seek: Privacy-Preserving and FAA-compliant Drones Location Tracing

Alessandro Brighente (University of Padova, Italy), Mauro Conti (University of Padova, Italy, Delft University of Technology, The Netherlands), Savio Sciancalepore (Eindhoven University of Technology (TU/e)The Netherlands)

Revisiting Online Privacy and Security Mechanisms Applied in the In-App Payment Realm from the Consumers’ Perspective

Salatiel Ezennaya-Gomez, Edgar Blumenthal, Marten Eckardt, Justus Krebs, Christopher Kuo, Julius Porbeck, Emirkan Toplu, Stefan Kiltz and Jana Dittmann (Otto-von-Guericke University Magdeburg, Germany)

Towards Efficient FHE Based cPIR Schemes and Their Parameter Selection

Cavidan Yakupoglu and Kurt Rohloff (NJIT, United States)

12:45 - 13:45
Lunch Break
13:45 - 15:15
IWPSMTS I
Session Chair:
Roland Rieke (Fraunhofer Institute for Secure Information Technology SIT, Germany)

Introduction to the International Workshop on Privacy and Security of Multi-Modal Transport Systems

Roland Rieke (Fraunhofer SIT | ATHENE, Germany)

Challenges and solutions for security and seamless authentication services in airport-train multimodal travels 

Stefano Sebastio (Collins ART, Ireland)

SECurity Test and Evaluation platform for Autonomous driving

Daniel Zelle (Fraunhofer SIT | ATHENE, Germany)

Security Operations Center for Multi-Modal Transport Systems

Ali Recai Yekta (Yekta IT GmbH, Germany)

Collaborative Security Pattern for Automotive Electrical/Electronic (E/E) Architectures

Florian Fenzl (Fraunhofer SIT | ATHENE, Germany)

EPESec II
Session Chair:
Theodoros Rokkas (inCITES Consulting, Luxembourg)

Demonstration of alignment of the Pan-European Cybersecurity Incidents Information Sharing Platform to Cybersecurity policy, regulatory and legislative advancements

Dimitrios Skias (Netcompany-Intrasoft, Luxembourg), Sofia Tsekeridou (Netcompany-Intrasoft, Greece), Theodore Zahariadis (SYNELIXIS SOLUTIONS S.A, Greece.), Artemis Voulkidis (SYNELIXIS SOLUTIONS S.A., Greece) and Terpsichori-Helen Velivassaki (SYNELIXIS SOLUTIONS S.A., Greece)

A Collaborative Intelligent Intrusion Response Framework for Smart Electrical Power and Energy Systems

Konstantinos P. Grammatikakis, Ioannis Koufos and Nicholas Kolokotronis (University of the Peloponnese, Department of Informatics and Telecommunications, Greece)

Evaluating The Cyber-Security Culture of the EPES Sector

Anna Georgiadou, Ariadni Michalitsi-Psarrou and Dimitris Askounis (National Technical University of Athens, Greece)

Classifying the factors affecting the adoption of the SDN-microSENSE innovations

Theodoros Rokkas and Ioannis Neokosmidis (inCITES Consulting, Luxembourg)

IWCSEC II
Software Certification
Session Chair:
Maura Pintor (Pluribus One s.r.l., Italy and University of Cagliari, Italy)

The AssureMOSS security certification scheme

Ákos Milánkovich, Gergely Eberhardt and Dávid Lukács (Search-Lab Ltd., Hungary)

Panel discussion:

Panel on delta certification - challenges and possible solutions

NG - SOC II
SP2I II
Security And Machine Learning In Intelligent Infrastructures
Session Chair:
Raimundas Matulevicius (University of Tartu, Estonia)

Artificial Intelligence-Assisted Side Channel Attacks

Xiaolu HouFaculty of Informatics and Information Technologies, Slovak University of Technology

Abstract: Deep neural networks (DNN) have gained popularity in the last decade due to advances in available computational resources. In particular, side-channel attacks (SCA) have received the most attention as being a classification problem, DNN comes as a natural candidate. In this talk, we will first provide the basics of SCA and explain how it can recover the secret key of a cryptographic implementation. Then, we will present the recent literature on applications of DNN to SCA. As a demonstration, we will detail a work that aims to propose a general framework that helps users with the overall trace analysis aided by DNN, minimizing the necessity for architecture adjustments by the user.

CloudFL: A Zero-Touch Federated Learning Framework for Privacy-aware Sensor Cloud

Viraaji Mothukuri (Kennesaw State University, United States), Reza M. Parizi (Kennesaw State University, United States), Seyedamin Pouriyeh (Kennesaw State University, United States), Afra Mashhadi (University of Washington, United States)

Enhanced anomaly detection for cyber-attack detection in smart water distribution systems

Branka Stojanovic, Helmut Neuschmied, Martin Winter and Ulrike Kleb (JOANNEUM RESEARCH Forschungsgesellschaft mbH, Austria)

ETACS II
Cybersecurity Skills Frameworks And Tools
Session Chair:
Jan Hajny (SPARTA, Brno University of Technology, Czech Republic)

Adding European Cybersecurity Skills Framework into Curricula Designer

Jan Hajny (Brno University of Technology, Czech Republic), Marek Sikora (Brno University of Technology, Czech Republic), Athanasios Grammatopoulos (University of Piraeus, Greece), Fabio Di Franco (ENISA, Greece)

The Platform for Czech National Qualifications Framework in Cybersecurity

Jakub Vostoupal (Masaryk University, Faculty of Informatics, Masaryk University, Faculty of Law, Czech Republic), František Kasl (Masaryk University, Faculty of Informatics, Masaryk University, Faculty of Law, Czech Republic), Pavel Loutocký (Masaryk University, Faculty of Informatics, Masaryk University, Faculty of Law, Czech Republic), Tomáš Pitner (Masaryk University, Faculty of Informatics, Czech Republic), Patrik Valo (Masaryk University, Faculty of Informatics, Czech Republic), Adam Valalský (Masaryk University, Faculty of Informatics, Czech Republic), Damián Paranič (Masaryk University, Faculty of Informatics, Czech Republic)

Job Adverts Analyzer for Cybersecurity Skills Needs Evaluation

Sara Ricci (Brno University of Technology, Czech Republic), Marek Sikora (Brno University of Technology, Czech Republic), Simon Parker (Deutsches Krebsforschungszentrum, Germany), Imre Lendak (University of Novi Sad, Serbia), Yianna Danidou (European University Cyprus, Cyprus), Argyro Chatzopoulou (APIROPLUS Solutions Ltd., Cyprus), Remi Badonnel (University of Lorraine, France), Donatas Alksnys (Mykolas Romeris University, Lithuania)

SECPID II
Session Chair:
Stephan Krenn (AIT Austrian Institute of Technology GmbH, Austria)

YOU SHALL NOT COMPUTE on my Data: Access Policies for Privacy-Preserving Data Marketplaces and an Implementation for a Distributed Market using MPC

Stefan More and Lukas Alber (Graz University of Technology, Austria)

Identity and Access Management Framework for Multi-tenant Resources in Hybrid Cloud Computing

Saurabh Deochake and Vrushali Channapattan (Twitter, United States)

All that is Solid Melts into Air: Towards Decentralized Cryptographic Access Control

Harry Halpin (K.U. Leuven, Belgium)

15:15 - 15:45
Coffee Break
15:45 - 17:15
IWPSMTS II
Session Chair:
Roland Rieke (Fraunhofer Institute for Secure Information Technology SIT, Germany)

Identity management for a seamless authentication in the transportation sector

Piotr Sobonski (Collins ART, Ireland)

 

 

 

 

Attribute-based authorization for a transaction between a transport company and a passenger

Jean-Paul Bultel (CEA, France)

 

 

 

An authentication and data sharing framework in the mobility service domain

Henry Gadacz (Fraunhofer SIT | ATHENE, Germany)

 

 

Utilizing the Trusted Platform Module in automotive networks to secure car sharing applications

Christian Plappert (Fraunhofer SIT | ATHENE, Germany)

EPESec III
Session Chair:
Theodoros Rokkas (inCITES Consulting, Luxembourg)

Panel disccusion with representatives from EPES projects

ENS I
Session Chair:
Prof. Wojciech Mazurczyk (Warsaw University of Technology, Poland & FernUniversitaet in Hagen, Germany)

Distributed Key Management in Microgrids

Christos Xenakis, University of Piraeus

Abstract: Security for smart industrial systems is prominent due to the proliferation of cyber threats threatening national critical infrastructures. Smart grid comes with intelligent applications that can utilize the bidirectional communication network among its entities. Microgrids are small-scale smart grids that enable Machine-to-Machine (M2M) communications as they can operate with some degree of independence from the main grid. In addition to protecting critical microgrid applications, an underlying key management scheme is needed to enable secure M2M message transmission and authentication. Existing key management schemes are not adequate due to microgrid special features and requirements. We propose the Micro sElf-orgaNiSed mAnagement (MENSA), which is the first hybrid key management and authentication scheme that combines Public Key Infrastructure (PKI) and Web-of-Trust concepts in micro-grids. Our experimental results demonstrate the efficiency of MENSA in terms of scalability and swiftness.

The cybersecurity-related ethical issues of cloud technology and how to avoid them

Aleksandra Pawlicka (ITTI Sp. z o.o. and University of Warsaw, Poland), Marek Pawlicki (ITTI Sp. z o.o. and Bydgoszcz University of Science and Technology, Poland), Rafał Renk (ITTI Sp. z o.o. and Adam Mickiewicz University, Poland), Rafał Kozik (ITTI Sp. z o.o. and Bydgoszcz University of Science and Technology, Poland) and Michal Choras (ITTI Sp. z o.o. and Bydgoszcz University of Science and Technology, Poland)

PCSCI I
Critical Infrastructures And Interdependencies
Session Chair:
Stefan Schauer (Austrian Insitute of Technology, Austria)

The PRAETORIAN Project in a Nutshell

Eva María Muñoz Navarro (ETRA I+D) and Frederic Guyomard (Électricité de France)

The PRECINCT Project in a Nutshell

Jenny Rainbird (Inlecom Pathways)

CI Interdependencies and Cascading Effects

Stefan Schauer and Sandra König (AIT Austrian Institute of Technology)

Resilience Management Framework for Interdependent CIs

Lorcan Connolly (Research Driven Solutions)

Parametrization of Probabilistic Risk Models

Sandra König and Abdelkader Magdy Shaaban (AIT Austrian Institute of Technology)

Response Coordination for Complex Scenarios

Lazaros Papadopoulos (Institute of Communication and Computer Systems)

SP2I III
Security And Trust In Intelligent Infrastructures
Session Chair:
Zdenek Martinasek (Brno University of Technology, Czech Republic)

On Secure and Side-Channel Resistant Hardware Implementations of Post-Quantum Cryptography

Petr Jedlicka (Brno University of Technology, FEEC, Department of Telecommunications, Czech Republic), Lukas Malina (Brno University of Technology, FEEC, Department of Telecommunications, Czech Republic), Tomas Gerlich (Brno University of Technology, FEEC, Department of Telecommunications, Czech Republic), Zdenek Martinasek (Brno University of Technology, FEEC, Department of Telecommunications, Czech Republic), Jan Hajny (Brno University of Technology, FEEC, Department of Telecommunications, Czech Republic), Petr Socha (Czech Technical University in Prague, Faculty of Information Technology, Dept. of Digital Design, Czech Republic)

Securing Shared Mobility Integration into Public Transport Infrastructure

Abasi-Amefon Obot Affia and Raimundas Matulevicius

An Internet-Wide View of Connected Cars: Discovery of Exposed Automotive Devices

Takahiro Ueda, Takayuki Sasaki, Katsunari Yoshioka and Tsutomu Matsumoto (Yokohama National University, Japan)

CyberSane I
Session Chair:
Jorge Manuel Martins (Project Manager, PDMFC)

CyberSANE project: Jorge Manuel Martins & Luis Landeiro Ribeiro

CyberSANE architecture: Core and 5 components: Thanos Karantjias & Guillermo Yuste

CyberSANE pilots: use cases and lessons learnt: Pablo Giménez Salazar (Transport and pilot coordination), Robert Bordianu (Energy), Andrius Patapovas  (Health)

 

 

CS-EDU

tba

17:15 - 17:30
Short Coffee Break
17:30 - 19:00
IWPSMTS III
Session Chair:
Roland Rieke (Fraunhofer Institute for Secure Information Technology SIT, Germany)

Ticket based lightweight security solution for small car E/E-components

Claus-Henning Friederichs (AVL, Germany)

Practical guidelines to configure homomorphic encryption schemes: An application to machine learning

Antoine Choffrut (CEA, France)

Homomorphic Encryption Based Pattern Search for Privacy Preserving Analytics

Hoang-Gia NGUYEN (CEA, France)

ROADIE: andRoid App fOr Automotive customizeD servIcEs

Marco de Vincenzi (CNR, Italy)

ENS II
Session Chair:
Prof. Krzysztof Cabaj (Warsaw University of Technology, Poland)

SAMM: Situation Awareness with Machine Learning for Misbehavior Detection in VANET

Mohammed A. Abdelmaguid, Hossam S. Hassanein and Mohammad Zulkernine (School of Computing, Queen’s University, Canada)

Towards Deployment Shift Inhibition Through Transfer Learning in Network Intrusion Detection

Marek Pawlicki, Rafał Kozik and Michał Choraś (ITTI Sp. z o.o. Poznań, Bydgoszcz University of Science and Technology Bydgoszcz, Poland)

Image-based Neural Network Models for Malware Traffic Classification using PCAP to Picture Conversion

Giorgos Agrafiotis, Eftychia Makri, Ioannis Flionis, Antonios Lalas, Konstantinos Votis and Dimitrios Tzovaras (Centre for Research and Technology Hellas/ Information Technologies Institute (CERTH/ITI), Greece)

Applying Machine Learning on RSRP-based Features for False Base Station Detection

Prajwol Kumar Nakarmi, Jakob Sternby and Ikram Ullah (Ericsson, Sweden)

 

PCSCI II
Technologies And Use Cases
Session Chair:
Stefan Schauer (Austrian Institute of Technology, Austria)

Physical and Cyber Situational Awareness for CI

Juan José Hernández Montesino (ETRA I+D) and Stephane Paul (Thales)

Hybrid Situational Awareness

Israel Perez Llopis and Javier Hingant Gómez (Universitat Politecnica de Valencia)

Serious Games in Crisis Situations

Daniel McCrum and Páraic Carroll (University College Dublin)

A Methodology for Enhancing Emergency Situational Awareness through Social Media

Antonios Karteris, Georgios Tzanos, Lazaros Papadopoulos, Konstantinos Demestichas, Dimitrios Soudris, Juliette Pauline Philibert and Carlos López Gómez

The PRAETORIAN Use Cases in a Nutshell

Eva María Munoz Navarro (ETRA I+D), Frederic Guyomard (Électricité de France) and
Tamara Hadjina (KONCAR)

The PRECINCT Living Labs in a Nutshell

Isabel Verwee and Shirley Delannoy (VIAS Institute)

CyberSane II
Session Chair:
Luis Landeiro Ribeiro (Head of PMO at PDMFC, Project Manager for the CyberSANE project)

Standardisation activities: Manos Athanathos

CyberSANE Business models: Armend Duzha

Q&A: Jorge Manuel Martins & Luis Landeiro Ribeiro

19:15 - 23:30
Evening Reception And “Welcome back to ARES” Party