08:40–09:00 CET |
Chairs: S. Shiaeles, University of Portsmouth (UK) |
|
|
|
|
09:00–10:00 CET |
Chair: S. Shiaeles, University of Portsmouth (UK) |
|
|
Invited talk: Tracking technologies: From James Bond to everyone P. Haskell-Dowland |
|
|
|
|
10:00–11:40 CET |
Chair: R. Kashef, Toronto Metropolitan University (CA) |
|
|
10:00–10:20 |
Flood control: TCP-SYN flood detection for software-defined networks using OpenFlow port statistics T. Das, O. Abuhamdan, S. Sengupta, E. Arslan |
|
10:20–10:40 |
A stable generative adversarial network architecture for network intrusion detection R. Soleymanzadeh, R. Kashef |
|
10:40–11:00 |
LSTM-based anomalous behavior detection in multi-agent reinforcement learning C. Lischke, T. Liu, J. Mccalmon, M. Rahman, T. Halabi, S. Alqahtani |
|
11:00–11:20 |
H4rm0ny: a competitive zero-sum two-player Markov game for multi-agent learning on evasive malware generation and detection C. Molloy, S. Ding, B. Fung, P. Charland |
|
11:20–11:40 |
Ensemble of random and isolation forests for graph-based intrusion detection in containers A. Iacovazzi, S. Raza |
|
|
|
11:40–12:00 CET |
Coffee break |
|
|
|
|
12.00–13:20 CET |
Chair: E. Schiavone, ResilTech S.R.L. (IT) |
|
|
12.00–12:20 |
Auditing a software-defined cross domain solution architecture N. Daughety, M. Pendleton, R. Perez, S. Xu, J. Franco |
|
12.20–12:40 |
CoReTM: An approach enabling cross-functional collaborative threat modeling J. Von der Assen, M. Figueredo Franco, C. Killer |
|
12.40–13:00 |
Modelling and assessing the risk of cascading effects with resilblockly I. Bicchierai, E. Schiavone, F. Brancati |
|
13.00–13:20 |
An approach to address risk management challenges focused on IT governance framework H. Alessa, R. Boodai, A. Alanazi |
|
|
|
13:20–14:20 CET |
Lunch break |
|
|
|
|
14:20–16:00 CET |
Chair: E. Bellini, LOGOS Ricerca e Innovazione (IT) |
|
|
14:20–14:40 |
ICT in healthcare: The role of IoT and the SECANT solution M. Caballero, D. Kavallieros, A. Spyros, A. Tavernarakis, A. Tziouvaras, S. Bonacina, K. Chandrarmouli, M. Coroiu, L. Chen, T. Dounia, I. Giannoulakis, N. Gligoric, E. Kafetzakis, T. Kasig, V. Koumaras, T. Krousarlis, K. Lapidaki, A. Markakis, S. Marin, M. Manulis, S. Menesidou, S. Nifakos, L. Meng, S. Mhiri, M. Nati, K. Ntafloukas, D. Oniga, D. Papamartzivanos, S. Papastergiou, K. Sanchez, C. Sakkas, K. Stelliou, L. Trujillo, T. Tsikrika, E. Venegas, S. Vrochidis, D. Xydias |
|
14:40–15:00 |
SENTINEL: Approachable, tailor-made cybersecurity and data protection for small enterprises T. Trantidou, G. Bravos, P. Valoggia, I. Skourtis, M. Falelakis, K. Poulios, I. Spais, S. Ioannidis, T. Oudin, R. Costa, C. Konialis, D. Holkham, Z. Kasapi, A. Karantjias |
|
15:00–15:20 |
BLEND: Efficient and blended iot data storage and communication with application layer security J. Hoglund, S. Raza |
|
15:20–15:40 |
A blockchain-based trustworthy cloud services digital ecosystem E. Bellini, S. Cimato, A. Esposito, I. Aversa |
|
15:40–16:00 |
CIDS: Collaborative intrusion detection system using blockchain technology G. Gurung, G. Bendiab, M. Shiaele, S. Shiaeles |
|
|
|
16:00–16:20 CET |
Coffee break |
|
|
|
|
16:20–18:00 CET |
Chair: N. Kolokotronis, University of the Peloponnese (GR) |
|
|
16:20–16:40 |
Blockchain-enabled digital forensics for the IoT: Challenges, features, and current frameworks S. Brotsis, N. Kolokotronis |
|
16:40–17:00 |
Android device incident response: Viber analysis A. Vasilaras, D. Dosis, M. Kotsis, P. Rizomiliotis |
|
17:00–17:20 |
SeeShells: An optimized solution for utilizing shellbags in a digital forensic investigation E. Amoruso, R. Leinecker, C. Zou |
|
17:20–17:40 |
Evaluating perceptual hashing algorithms in detecting image manipulation over social media platforms M. Alkhowaiter, K. Almubarak, C. Zou |