2nd Cyber Security In Networking Conference
October 24-26, 2018
Paris, France
CSNeT 2018 | |||||||
October 24, 2018 | October 25, 2018 | October 26, 2018 | |||||
Welcome coffee | |||||||
9:30 | Opening conference | 9:30 | Keynote 3: Chair of Cyber Defense in the Maritime Context : Issues, Challenges and Opportunities for R&D | 9:30 | Keynote 4: Artificial Intelligence : New security Holy Grail ? | ||
10:00 | Keynote 1: The Ancient Origin of Our Cyber Universe | ||||||
10:30 | Coffee Break | 10:30 | Coffee Break | ||||
11:00 | Coffee Break / Exposition | 11:00 | Technical Session 3: Virtualization and Cloud Security | 11:00 | Short Session | ||
11:15 | Keynote 2: Cyber Stability, Proliferation and State Responsibility | ||||||
12:15 | Lunch Break / Exposition | 12:15 | Lunch Break | 12:40 | Lunch Break | ||
14:00 | Technical Session 1: Attacks Analysis and Detection | 14:00 | Technical Session 4: Cryptography and Privacy | 14:30 | Technical Session 6: Networking and cybersecurity | ||
15:40 | Coffee Break / Exposition | 15:00 | Coffee Break | 16:10 - 16:40 | Closing ceremony/Award | ||
16:10 | Technical Session 2: BlockChain and Smart Contracts | 15:30 | Technical Session 5: Cybersecurity of crtitical infrastructures | ||||
19:00 - 21:00 | Gala Dinner |
Welcome Coffee | |
09:30-10:00 | Opening Conference |
10:00-11:00 |
Keynote 1: The Ancient Origin of Our Cyber Universe Jon D. Paul (Crypto-Museum, ARCSI, Paris) |
11:00-11:15 | Coffee Break |
11:15-12:15 |
Keynote 2: Cyber Stability, Proliferation and State Responsibility Frederick Douzet (Paris 8) |
12:15-14:00 | Lunch Break |
14:00-15:40 | Technical Session 1: Attacks Analysis and Detection
SENATUS: An Approach to Joint Traffic Anomaly Detection and Root Cause Analysis Atef Abdelkefi (Accenture, Norway); Yuming Jiang (Norwegian University of Science and Technology (NTNU), Norway); Sachin Sharma (National College of Ireland, Ireland) A Human-Centred Model for Cyber Attacks Analysis Thibaud Merien (Naval Academy Research Institute, France); Xavier Bellekens (University of Abertay Dundee, United Kingdom (Great Britain)); David Brosset and Christophe Claramunt (Naval Academy Research Institute, France) Centralized Defense Using Smart Routing Against Link-Flooding Attacks Dallal Belabed (Thales, France); Mathieu Bouet and Vania Conan (Thales Communications & Security, France) A Forensic Pattern-Based Approach for Investigations in Cloud System Environments Juan Bennett (SPAWAR Systems Center Pacific (SSCPAC), USA); Mamadou H Diallo (53560 Hull St & SPAWAR Systems Center Pacific, USA) |
15:40-16:10 | Coffee Break |
16:10-17:30 | Technical Session 2: BlockChain and Smart Contracts
Concept for Controlled Business Critical Information Sharing Using Smart Contracts Klaus Zaerens (National Defence University, Finland) A Probablistic Model of Periodic Pulsed Transaction Injection Saumendra Sengupta (SUNYIT, USA); Jorge Novillo, Bruno Andriamanalimanana, Chen-Fu Chiang and Ali Tekeoglu (SUNY Polytechnic Institute, USA) Performance of Revocation Protocols for Vehicular Ad-Hoc Network. Review of State-Of-Art Techniques and Proposition of New Enhancement Revocation Method Hassan Noun (Lebanon, Lebanon); Walid Fahs (Université Islamique du Liban, Lebanon); Ali Kalakech (Universite Libanaise, Lebanon); Jamal Haydar (IUL Lebanon, France) |
09:30-10:30 |
Keynote 3: Title: Chair of Cyber Defense in the Maritime Context : Issues, Challenges and Opportunities for R&D Yvon Kermarec (Telecom Brest) |
10:30-11:00 | Coffee Break |
11:00-12:15 | Technical Session 3: Virtualization and Cloud Security
The Challenges in ML-based Security for SDN Tam Nguyen (North Carolina State University, USA) Securing Industrial SDN Networks Through a Policy Checker Architecture. Andrea Melis (University of Bologna, Italy); Davide Berardi (Università di Bologna, Italy); Chiara Contoli (University of Bologna, Italy); Franco Callegati (Universita` di Bologna, Italy); Marco Prandini (University of Bologna, Italy); Flavio Esposito (Saint Louis University, USA) Cloud Security Up for Auction: a DSIC Online Mechanism for Secure IaaS Resource Allocation Talal Halabi (École Polytechnique de Montréal, Canada); Martine Bellaïche (École Polytechnique, Canada); Adel Abusitta (Ecole Polytechnique de Montreal, Canada) |
12:15-14:00 | Lunch Break |
14:00-15:00 | Technical Session 4: Cryptography and Privacy
Privacy-preserving Tax Calculations in Smart Cities by Means of Inner-Product Functional Encryption Oana Stan (UTC & CEA, France); Renaud Sirdey (CEA, France); Cédric Gouy-Pailler (CEA, LIST, France); Pierre Blanchart (Researcher, France); Amira Ben Hamida (Institute for Technological Research SystemX, France); Mohamed-Haykel Zayani (IRT-SYSTEMX, France) Two-level Chaotic System Versus Non-Autonomous Modulation in the Context of Chaotic Voice Encryption Mahmoud Abd Elzaher (Ain Shams University, Egypt); Mohamed Shalaby (Arab Academy for Science Technology, Egypt); Salwa Elramly (Ain Shams University, Egypt) |
15:00-15:30 | Coffee Break |
15:30-16:30 | Technical Session 5: Cybersecurity of crtitical infrastructures
From ICS Attacks' Analysis to the S.A.F.E. Approach: Implementation of Filters Based on Behavioral Models and Critical State Distance for ICS Cybersecurity Franck Sicard, Cédric Escudero and Eric Zamaï (Univ Grenoble Alpes, CNRS, Grenoble INP*, G-SCOP, France); Jean-Marie Flaus (G-SCOP Laboratory, France) Detecting and Hunting Cyberthreats in a Maritime Environment: Specification and Experimentation of a Maritime Cybersecurity Operations Centre Olivier Jacq (Ministère de la Défense, France); Xavier Boudvin (Ecole Navale, France); David Brosset (Naval Academy Research Institute, France); Yvon Kermarrec (Telecom Bretagne, France); Jacques Simonin (LUSSI, Telecom Bretagne, France) |
19:00-21:00 | Gala Dinner |
09:30-10:30 |
Keynote 4: Artificial Intelligence : New security Holy Grail ? Sylvain Labetoule (Orange) |
10:30-11:00 | Coffee Break |
11:00-12:40 | Short Session
Cyber Attacks Classification in IoT-based-Healthcare Infrastructure Amir Djenna (University of Constantine, Algeria) Improving a Credit Card Fraud Detection System Using K-means Clustering and Genetic Algorithm Ibtissam Benchaji and Samira Douzi (University Mohammed V, Morocco); Bouabid Ouahidi (Mohammed V University, Morocco) Hybrid Approach for Intrusion Detection Using Fuzzy_ Association Rules, Anomaly and Misuse Detection Samira Douzi and Ibtissam Benchaji (University Mohammed V, Morocco); Bouabid El Ouahidi (Mohammed-V university Rabat, Morocco) Cross Channel Scripting (XCS) Attacks in Web Applications: Detection and Mitigation Approaches R 'Madhusudhan (National Institute of Technology Karnataka, India); Shashidhara R (NITK, India) Tango: The Beginning - A Semi-Synchronous Iota-Tangle Type Distributed Ledger with Periodic Pulsed Entries Bruno Andriamanalimanana and Chen-Fu Chiang (SUNY Polytechnic Institute, USA); Saumendra Sengupta (SUNYIT, USA); Jorge Novillo and Ali Tekeoglu (SUNY Polytechnic Institute, USA) |
12:40-14:30 | Lunch Break |
14:30-16:10 | Technical Session 6: Networking and cybersecurity
A Heuristic Algorithm for Relaxed Optimal Rule Ordering Problem Takashi Harada and Ken Tanaka (Kanagawa University, Japan); Kenji Mikawa (Niigata University, Japan) Ransomware Encrypted Your Files but You Restored Them from Network Traffic Eduardo Berrueta Irigoyen (Public University of Navarre (UPNA), Spain); Daniel Morato and Eduardo Magaña (Universidad Publica de Navarra, Spain); Mikel Izal (Public University of Navarra (UPNA), Spain) Analysis of Cryptographic Algorithms on IoT Hardware Platforms Mohammed Ibrahim El-hajj (USJ, Lebanon); Maroun Chamoun (Université Saint Joseph, Lebanon); Ahmad Fadlallah (University of Science and Arts in Lebanon, Lebanon); Ahmed Serhrouchni (ENST, France) |
16:10-16:40 | Closing ceremony/Award |