Time (UTC +2) | Zoom Room A | Zoom Room B | Zoom Room C | Zoom Room D |
---|---|---|---|---|
09:00 - 10:30 | NG - SOC I Session Chair: Ewa Piatkowska (AIT, Austria) Zoom Room D The SOCCRATES Project: Overview and Objectives The SAPPAN Project: Overview and Objectives Keynote: Semi-Automated Cyber Threat Intelligence (ACT) | |||
10:30 - 11:00 | Coffe Break | |||
11:00 - 12:45 | ARES Opening & Keynote Session Chair: Melanie Volkamer (KASTEL, Karlsruhe Institute of Technology, Germany) Zoom Room A ARES Opening Keynote: Children need Cyber Security Education too
| NG - SOC II Session Chair: Avikarsha Mandal (Fraunhofer FIT, Germany) Zoom Room D Monitoring Malicious Infrastructures to Produce Threat Intelligence Pipeline development for Automatically Generated Domain detection Leveraging Machine Learning for DGA Detection Knowledge Management and Anonymization Techniques in Cyber-Threat Intelligence Reputation Management Techniques for IP addresses, domains, and mail | ||
12:45 - 13:45 | Lunch Break | |||
13:45 - 15:15 | WSDF I Session Chair: Andrew Marrington (Zayed University, UAE) Zoom Room A Keynote: Internet of Things (IoT) Forensics: Challenges and Opportunities TAVeer - An Interpretable Topic-Agnostic Authorship Verification Method | EPESEC I Session Chair: Theodoros Rokkas, inCITES Consulting, Luxembourg Zoom Room B Cyber-Risk Identification for a Digital Substation Data Visualisation in Internet of Things: Tools, Methodologies, and Challenges Threat Landscape for Smart Grid Systems Building a testing environment for SDN networks analysis for electrical grid applications
| IWCC I Session Chair: Artur Janicki (Warsaw University of Technology, Poland) Zoom Room C Keynote: Track me if you can: Abusing the DNS infrastructure to prevent (botnet) takedowns | NG - SOC III Session Chair: Tomas Jirsik (Masaryk University, Czechia) Zoom Room D Host and Application Behaviour Modelling L-ADS: Live Anomaly Detection System Adversarial Examples against Intrusion Detection Systems Fast and Scalable Cybersecurity Data Processing |
15:15 - 15:30 | short Coffee Break | |||
15:30 - 17:00 | WSDF II Session Chair: Virginia Franqueira (University of Kent, UK) Zoom Room A Post-mortem digital forensic artifacts of TikTok Android App DFS3: Automated Distributed File System Storage State Reconstruction 4P Based Forensics Investigation Framework for Smart Connected Toys SysGen: System State Corpus Generator | EPESEC II Session Chair: Theodoros Rokkas, inCITES Consulting, Luxembourg Zoom Room B Advanced Metering Infrastructures: Security Risks and Mitigations On the Importance of cyber-security training for multi-vector energy distribution system operators DIDEROT: An Intrusion Detection and Prevention System for DNP3-based SCADA Systems Factors affecting the market adoption of cyber-security products in Energy and Electrical systems: The case of SPEAR | IWCC II Session Chair: Artur Janicki (Warsaw University of Technology, Poland) Zoom Room C Cyberspace threats: not only hackers and criminals. Privacy-Enhanced Robust Image Hashing with Bloom Filters Locality Sensitive Hashing for Tampering Detection in Automotive Systems A privacy-aware digital forensics investigation in enterprises | NG - SOC IV Session Chair: Irina Chiscop (TNO, the Netherlands) Zoom Room D 15:30-16:50 Attack Analysis with Attack Defence Graphs Attack Graph-based Courses of Action for Defense Visual Analytics for Cyber Security Data An anomaly detection approach to analysis of security monitoring data from endpoints. Dmitry Komashinskiy, David Karpuk, Samuel Marshal, Alexey Kirichenko (Fsecure, Finland) |
17:00 - 17:15 | short Coffee Break | |||
17:15 - 18:45 | ARES Full I Human Factors in Security Session Chair: Alexandra Mai (SBA Research) Zoom Room A Attacker-Centric Thinking in Security — Perspectives from Financial Services Practitioners SoK: Contemporary Issues and Challenges to Enable Cyber Situational Awareness for Network Security Testing the Effectiveness of Tailored Phishing Techniques in Industry and Academia: a Field Experiment A Real World Study on Employees' Susceptibility to Phishing Attacks | IWSMR Session Chair: Steffen Wendzel, Worms University of Applied Sciences, Germany Zoom Room B Keynote: Structural equation modeling in cybersecurity research Generalizing the Phishing Principle - Analyzing User Behavior in Response to Controlled Stimuli for IT Security Awareness Assessment An Overview of Limitations and Approaches in Identity Management Framework for Automated Evaluation of Security Metrics | IWCC III Session Chair: Krzysztof Szczypiorski (Warsaw University of Technology, Poland) Zoom Room C Ransomware 2.0: To sell, or not to sell. A Game-theoretical Model of Data-selling Ransomware Real-Time Stream Processing Tool for Detecting Suspicious Network Patterns Using Machine Learning Detection and classification of Slow DoS Attacks targeting network servers A comparison of stream mining algorithms on botnet detection | NG - SOC V - Panel Session Session Chair: Tomas Jirsik (Masaryk University, Czechia) Zoom Room D 17:05-17:45 Panel: Discussion on Future Challenges for SOC Speakers: |