Wednesday October 23, 2019


09:00 – 09:15Welcome Coffee


09:15 – 11:00Tutorial 1Verifiable credentials: user-centric identity management systems
Abdelmalek Benzekri, Romain Laborde, David Chadwick, Ahmad-Samer Wazan, IRIT (University of Toulouse 3 Paul Sabatier, France)


11:00 – 11:30Coffee Break


11:30 – 12:30Keynote 1 – Improving cybersecurity measures effectiveness by artificial intelligence
Solange Ghernaouti, director of the Swiss Cybersecurity Advisory and Research Group, professor of the University of Lausanne, Swizerland


12:30 – 14:00Lunch Break


14:00 – 14:40 Invited paper Efficient Block replication to optimize the blockchain resources
El-Hacen Diallo, Alexandre Laube, Khaldoun Al Agha, and Steven Martin (University of Paris-South, France)


14:40 – 15:30Technical Session 1 (part 1) – Security with Blockchain

  1. A Blockchain-Encryption-Based Approach to Protect Fog Federations from Rogue Nodes – Mohammed Alshehri and Brajendra Panda (University of Arkansas, USA)
  1. Towards Blockchain Services for Mobile Money Traceability and Federation – Pascal Urien (Télécom ParisTech, France); Edem Kodjo S. A. (Telecom ParisTech, Burkina Faso)

15:30 – 16:00Coffee Break


16:00 – 17:15Technical Session 1 (part 2) – Security with Blockchain

  1. Going Beyond the Blockchain Hype: In Which Cases are Blockchains Useful for IT Applications ? – Nour El Madhoun (ISEP Engineering School, France); Julien Hatin (Orange/IMT/OLPS/ASE/SEC, France); Emmanuel Bertin (Orange Labs, France)
  2. A Blockchain-based Lightweight Authentication Solution for IoT – Achraf Fayad (Télécom ParisTech, France); Rida Khatoun (Telecom ParisTech, France); Badis Hammi (Télécom ParisTech, France); Ahmed Serhrouchni (ENST, France)
  3. A Secure and Fault-Tolerant Architecture for LoRaWAN Based on Blockchain – Pasknel Ribeiro and Raimir Holanda (University of Fortaleza, Brazil); Alex Ramos (Federal Institute of Ceara (IFCE), Brazil)

Thursday October 24, 2019


09:00 – 10:45Tutorial 2 – The importance of a managerial, legal and technical approach when designing a security policy
Solange Ghernaouti, director of the Swiss Cybersecurity Advisory and Research Group, professor of the University of Lausanne (Switzerland)


10:45 – 11:15Coffee Break


11:15 – 12:45  Technical Session 2 – Trust and Security Management

  1. Trust-based Collaborative Defences in Multi Network Alliances – Ralph Koning and Ameneh Deljoo (University of Amsterdam, The Netherlands); Lydia Meijer (TNO, The Netherlands); Cees de Laatand Paola Grosso (University of Amsterdam, The Netherlands)
  2. Managing Effective Collaboration in Cybersecurity Alliances Using Social Computational Trust – Ameneh Deljoo, Ralph Koning and Tom van Engers (University of Amsterdam, The Netherlands); Leon Gommans (Air-France KLM, The Netherlands); Cees de Laat (University of Amsterdam, The Netherlands)
  3. Information Sharing in Cybersecurity – Solange Ghernaouti, Léonore Cellier, Bastien Wanner (Swiss Cybersecurity Advisory and Research Group, University of Lausanne, Switzerland)
  4. Information Security Management Frameworks in Higher Education Institutions: An Overview – Jorge Merchan-Lima (Universidad de Cuenca, Ecuador); Fabian Astudillo-Salinas (University of Cuenca, Ecuador); Luis Tello-Oquendo(Universidad Nacional de Chimborazo, Ecuador); Franklin Sanchez and Gabriel Lopez (Escuela Politecnica Nacional, Ecuador); Dorys Quiroz (Universidad de las Fuerzas Armadas ESPE, Ecuador)

12:45 – 14:00Launch Break


14:00 – 15:00Keynote 2Blockchain For Mesh Networks
Khaldoun Al Agha (Paris-South University, France)


15:00 – 15:40 Invited paper Dynamic security management driven by situations: An Exploratory analysis of logs for the identification of security situations
Abdelmalek Benzekri – Romain Laborde – Darine Rammal – Arnaud Oglaza – François Barrère (Institut de Recherche en Informatique de Toulouse, Université de Toulouse 3 Paul Sabatier, France)


15:40 – 16:10Coffee Break


16:10 – 17:25  Technical Session 3 – Security data analysis & Machine learning

  1. Human Interaction Proofs (HIPs) Based on Emerging Images and Topological Data Analysis (TDA) Techniques – María Osorio Angarita (National University of Colombia, Colombia); Ebroul Izquierdo (Queen Mary, University of London, United Kingdom (Great Britain)); Agustin Moreno Cañadas (National University of Colombia, Colombia)
  2. The EMV Payment System: Is It Reliable ? – Nour El Madhoun (ISEP Engineering School, France); Emmanuel Bertin (Orange Labs, France); Guy Pujolle (Sorbonne University, France)

19:30  Gala dinner


Friday October 25, 2019


09:00 – 11:05  Technical Session 4 – Cybersecurity of constrained & IoT systems

  1. A Risk Management Framework and A Generalized Attack Automata for IoT Based Smart Home Environment – Fathima James (5720 Grand Ave, USA)
  2. Hashing-based Authentication for CAN Bus and Application to Denial-of-Service Protection – Olivier Cros and Gabriel Chênevert (ISEN Lille, France)
  3. Bluetooth Low Energy Makes Just Works Not Work – Karim Lounis and Mohammad Zulkernine (Queen’s University, Canada)
  4. IoT Cyber Security Based Smart Home Intrusion Prevention System – Fathima James (5720 Grand Ave, USA)
  5. Cloud-based Sybil Attack Detection Scheme for Connected Vehicles – Anika Anwar (Queen’s University, Canada & University of Asia Pacific, Bangladesh); Mohammad Zulkernine and Talal Halabi (Queen’s University, Canada)

11:05 – 11:35Coffee Break


11:35 – 12:40  Technical Session 5 – Cybersecurity of platforms and networks

  1. Physical Layer Security for 5G Wireless Networks: A Comprehensive Survey – Jose David Vega Sanchez, Luis F Urquiza-Aguiar and Martha Cecilia Paredes Paredes (Escuela Politécnica Nacional, Ecuador)
  2. Verification of Keyboard Acoustics Authentication on Laptops and Smartphones Using WebRTC – Christian Tietz, Eric Klieme, Lukas Behrendt, Pawel Boening and Leonard Marschke (Hasso Plattner Institute, Germany); Christoph Meinel (Hasso Plattner Institute, University of Potsdam, Germany)
  3. Social Consensus-inspired Aggregation for Edge Computing – Zenon D Chaczko (University of Technology, Sydney & SEDE, Australia); Firas Al-Doghman (University of Technology Sydney, Australia); Wayne Brookes (UTS, Australia); Lucia Carrion Gordon (UTS University of Technology Sydney, Australia)

12:40 – 14:00Lunch Break


14:00 – 15:00Keynote 3Enhancing cybersecurity capabilities to protect national critical infrastructure
Frankie Catota (Universidad Internacional SEK, Ecuador)


15:00 – 16:20Technical Session 6 – Attacks Analysis and Detection

  1. XSStudent: Proposal to Avoid Cross-Site Scripting(XSS) Attacks in Universities – Germán Rodríguez, Jenny Torres, Pamela Flores and Diego Benavides (Escuela Politécnica Nacional, Ecuador); Daniel Agurto (Universidad de las Fuerzas Armadas, Ecuador)
  2. A Precise Method for Monitoring and Detecting Recurrent Attacks on Wireless Networks Based on Link-Layer Traffic Classification – Andreane Spano Roza, Asr and João Vitor Valle (Universidade Federal Fluminense, Brazil); Diogo Mattos (Universidade Federal Fluminense & MídiaCom, Brazil)
  3. TAG: Topological Attack Graph Analysis Tool – Marek Malowidzki, Damian Hermanowski and Przemyslaw Berezinski (Military Communication Institute, Poland)
  4. Phishing Attacks: Detecting and Preventing Infected E-mails Using Machine Learning Methods – Diego Oña, Lenín Zapata and Walter Fuertes (Universidad de las Fuerzas Armadas ESPE, Ecuador); Germán Rodríguez and Diego Benavides (Escuela Politécnica Nacional, Ecuador); Theo Toulkeridis (Universidad de las Fuerzas Armadas ESPE, Ecuador)

16:20 – 17:00Coffee Break, awards, next CSNet, and conference closing


  • Important dates

    • Paper Submission Due
      June 30, 2019
    • Paper Review Feedback
      July 30, 2019
    • Final Papers Due
      August 15, 2019
    • Conference Date
      October 23-25, 2019
  • Technical Sponsors

  • Sponsors

  • In collaboration with

  • Organized by

    DNAC CSNet 2019 Quito

  • Previous Conferences