CSNet'18

2nd Cyber Security In Networking Conference
October 24-26, 2018
Paris, France

CSNet'18 Program

CSNeT 2018
October 24, 2018 October 25, 2018 October 26, 2018
Welcome coffee
9:30 Opening conference 9:30 Keynote 3: Chair of Cyber Defense in the Maritime Context : Issues, Challenges and Opportunities for R&D 9:30 Keynote 4: Artificial Intelligence : New security Holy Grail ?
10:00 Keynote 1: The Ancient Origin of Our Cyber Universe    
    10:30 Coffee Break 10:30 Coffee Break
11:00 Coffee Break / Exposition 11:00 Technical Session 3: Virtualization and Cloud Security 11:00 Short Session
11:15 Keynote 2: Cyber Stability, Proliferation and State Responsibility    
12:15 Lunch Break / Exposition 12:15 Lunch Break 12:40 Lunch Break
14:00 Technical Session 1: Attacks Analysis and Detection 14:00 Technical Session 4: Cryptography and Privacy 14:30 Technical Session 6: Networking and cybersecurity
15:40 Coffee Break / Exposition 15:00 Coffee Break 16:10 - 16:40 Closing ceremony/Award
16:10 Technical Session 2: BlockChain and Smart Contracts 15:30 Technical Session 5: Cybersecurity of crtitical infrastructures
 
19:00 - 21:00 Gala Dinner


Wednesday October 24, 2018

Welcome Coffee
09:30-10:00 Opening Conference
10:00-11:00 Keynote 1: The Ancient Origin of Our Cyber Universe
Jon D. Paul (Crypto-Museum, ARCSI, Paris)
11:00-11:15 Coffee Break
11:15-12:15 Keynote 2: Cyber Stability, Proliferation and State Responsibility
Frederick Douzet (Paris 8)
12:15-14:00 Lunch Break
14:00-15:40 Technical Session 1: Attacks Analysis and Detection

SENATUS: An Approach to Joint Traffic Anomaly Detection and Root Cause Analysis
Atef Abdelkefi (Accenture, Norway); Yuming Jiang (Norwegian University of Science and Technology (NTNU), Norway); Sachin Sharma (National College of Ireland, Ireland)

A Human-Centred Model for Cyber Attacks Analysis
Thibaud Merien (Naval Academy Research Institute, France); Xavier Bellekens (University of Abertay Dundee, United Kingdom (Great Britain)); David Brosset and Christophe Claramunt (Naval Academy Research Institute, France)

Centralized Defense Using Smart Routing Against Link-Flooding Attacks
Dallal Belabed (Thales, France); Mathieu Bouet and Vania Conan (Thales Communications & Security, France)

A Forensic Pattern-Based Approach for Investigations in Cloud System Environments
Juan Bennett (SPAWAR Systems Center Pacific (SSCPAC), USA); Mamadou H Diallo (53560 Hull St & SPAWAR Systems Center Pacific, USA)
15:40-16:10 Coffee Break
16:10-17:30 Technical Session 2: BlockChain and Smart Contracts 

Concept for Controlled Business Critical Information Sharing Using Smart Contracts
Klaus Zaerens (National Defence University, Finland)

A Probablistic Model of Periodic Pulsed Transaction Injection
Saumendra Sengupta (SUNYIT, USA); Jorge Novillo, Bruno Andriamanalimanana, Chen-Fu Chiang and Ali Tekeoglu (SUNY Polytechnic Institute, USA)

Performance of Revocation Protocols for Vehicular Ad-Hoc Network. Review of State-Of-Art Techniques and Proposition of New Enhancement Revocation Method
Hassan Noun (Lebanon, Lebanon); Walid Fahs (Université Islamique du Liban, Lebanon); Ali Kalakech (Universite Libanaise, Lebanon); Jamal Haydar (IUL Lebanon, France)


Thursday October 25, 2018

09:30-10:30 Keynote 3: Title: Chair of Cyber Defense in the Maritime Context : Issues, Challenges and Opportunities for R&D
Yvon Kermarec (Telecom Brest)
10:30-11:00 Coffee Break
11:00-12:15 Technical Session 3: Virtualization and Cloud Security

The Challenges in ML-based Security for SDN
Tam Nguyen (North Carolina State University, USA)

Securing Industrial SDN Networks Through a Policy Checker Architecture.
Andrea Melis (University of Bologna, Italy); Davide Berardi (Università di Bologna, Italy); Chiara Contoli (University of Bologna, Italy); Franco Callegati (Universita` di Bologna, Italy); Marco Prandini (University of Bologna, Italy); Flavio Esposito (Saint Louis University, USA)

Cloud Security Up for Auction: a DSIC Online Mechanism for Secure IaaS Resource Allocation
Talal Halabi (École Polytechnique de Montréal, Canada); Martine Bellaïche (École Polytechnique, Canada); Adel Abusitta (Ecole Polytechnique de Montreal, Canada)
12:15-14:00 Lunch Break
14:00-15:00 Technical Session 4: Cryptography and Privacy

Privacy-preserving Tax Calculations in Smart Cities by Means of Inner-Product Functional Encryption
Oana Stan (UTC & CEA, France); Renaud Sirdey (CEA, France); Cédric Gouy-Pailler (CEA, LIST, France); Pierre Blanchart (Researcher, France); Amira Ben Hamida (Institute for Technological Research SystemX, France); Mohamed-Haykel Zayani (IRT-SYSTEMX, France)

Two-level Chaotic System Versus Non-Autonomous Modulation in the Context of Chaotic Voice Encryption
Mahmoud Abd Elzaher (Ain Shams University, Egypt); Mohamed Shalaby (Arab Academy for Science Technology, Egypt); Salwa Elramly (Ain Shams University, Egypt)
15:00-15:30 Coffee Break
15:30-16:30 Technical Session 5: Cybersecurity of crtitical infrastructures 

From ICS Attacks' Analysis to the S.A.F.E. Approach: Implementation of Filters Based on Behavioral Models and Critical State Distance for ICS Cybersecurity
Franck Sicard, Cédric Escudero and Eric Zamaï (Univ Grenoble Alpes, CNRS, Grenoble INP*, G-SCOP, France); Jean-Marie Flaus (G-SCOP Laboratory, France)

Detecting and Hunting Cyberthreats in a Maritime Environment: Specification and Experimentation of a Maritime Cybersecurity Operations Centre
Olivier Jacq (Ministère de la Défense, France); Xavier Boudvin (Ecole Navale, France); David Brosset (Naval Academy Research Institute, France); Yvon Kermarrec (Telecom Bretagne, France); Jacques Simonin (LUSSI, Telecom Bretagne, France)
19:00-21:00 Gala Dinner


Friday October 26, 2018

09:30-10:30 Keynote 4: Artificial Intelligence : New security Holy Grail ?
Sylvain Labetoule (Orange)
10:30-11:00 Coffee Break
11:00-12:40 Short Session

Cyber Attacks Classification in IoT-based-Healthcare Infrastructure
Amir Djenna (University of Constantine, Algeria)

Improving a Credit Card Fraud Detection System Using K-means Clustering and Genetic Algorithm
Ibtissam Benchaji and Samira Douzi (University Mohammed V, Morocco); Bouabid Ouahidi (Mohammed V University, Morocco)

Hybrid Approach for Intrusion Detection Using Fuzzy_ Association Rules, Anomaly and Misuse Detection
Samira Douzi and Ibtissam Benchaji (University Mohammed V, Morocco); Bouabid El Ouahidi (Mohammed-V university Rabat, Morocco)

Cross Channel Scripting (XCS) Attacks in Web Applications: Detection and Mitigation Approaches
R 'Madhusudhan (National Institute of Technology Karnataka, India); Shashidhara R (NITK, India)

Tango: The Beginning - A Semi-Synchronous Iota-Tangle Type Distributed Ledger with Periodic Pulsed Entries
Bruno Andriamanalimanana and Chen-Fu Chiang (SUNY Polytechnic Institute, USA); Saumendra Sengupta (SUNYIT, USA); Jorge Novillo and Ali Tekeoglu (SUNY Polytechnic Institute, USA)
12:40-14:30 Lunch Break
14:30-16:10 Technical Session 6: Networking and cybersecurity

A Heuristic Algorithm for Relaxed Optimal Rule Ordering Problem
Takashi Harada and Ken Tanaka (Kanagawa University, Japan); Kenji Mikawa (Niigata University, Japan)

Ransomware Encrypted Your Files but You Restored Them from Network Traffic
Eduardo Berrueta Irigoyen (Public University of Navarre (UPNA), Spain); Daniel Morato and Eduardo Magaña (Universidad Publica de Navarra, Spain); Mikel Izal (Public University of Navarra (UPNA), Spain)

Analysis of Cryptographic Algorithms on IoT Hardware Platforms
Mohammed Ibrahim El-hajj (USJ, Lebanon); Maroun Chamoun (Université Saint Joseph, Lebanon); Ahmad Fadlallah (University of Science and Arts in Lebanon, Lebanon); Ahmed Serhrouchni (ENST, France)
16:10-16:40 Closing ceremony/Award


Key dates

  • Paper Submission Due
    May 13, 2018
    May 23, 2018 (Firm)
  • Paper Review Feedback
    July 2, 2018
  • Final Papers Due
    July 15, 2018
  • Conference
    October 24-26, 2018

Technical Sponsors

Supported by

Organized by

Previous conferences