Program Outline
(Click here to download CSNet Program in PDF format)
Time (GST) |
Tuesday, Oct 12 | Wednesday, Oct 13 | Thursday, Oct 14 |
10:00 | Tutorial | ||
11:00 | Opening Ceremony | Demo Papers Session | |
11:15 | |||
11:30 | Keynote #1 | ||
12:00 | Invited Talk I | Invited Talk II | |
12:30 | Lunch Break | Lunch Break | Lunch Break |
14:00 |
Technical Session #1 Blockchain I |
Technical Session #3 Artificial Intelligence and Cybersecurity I |
Technical Session #5 Attack techniques and detection |
15:20 | Coffee Break | Keynote #2 | Keynote #3 |
15:40 |
Technical Session #2 Blockchain II |
||
16:20 | Coffee Break | Coffee Break | |
16:40 |
Technical Session #4 Blockchain II |
Technical Session #6 Artificial Intelligence and Cybersecurity II |
|
17:00 | |||
17:20 | Closing & Awards | ||
20:00 | Gala dinner |
*Timing used is (GST) Gulf Standard Time, that is UTC/GMT+4h
Tuesday, October 12, 2021
11:00 – 11:30 Opening Conference
11:30 – 12:30 Keynote #1: Conciling privacy rights with security needs
Speaker: Maryline Laurent (Télécom SudParis, France )
Chaired by: Farkhund Iqbal (Zayed University, UAE)
12:30 – 14:00 Lunch Break
14:00 – 15:20 Technical Session #1: Blockchain I
Chaired by: Asad Khattak (Zayed University, UAE)
- Innovative Countermeasures to Defeat Cyber Attacks Against Blockchain Wallets
Pascal Urien (Telecom Paris, France) - C4M: A Partition-Robust Consensus Algorithm for Blockgraph in Mesh Network
David Cordova Morales (LIP6, France); Pedro B. Velloso (Universidade Federal do Rio de Janeiro (UFRJ), France & LIP6, Sorbonne Université, France); Alexandre Laube (Université Pierre et Marie Curie, France); Thi Mai Trang Nguyen (Sorbonne Université & LIP6, France); Guy Pujolle (Sorbonne University & Green Communications, France) - A Secure Blockchain-Based Architecture for the COVID-19 Data Network (Short Paper)
Darine Al-Mohtar (Lebanese University, Faculty of Technology, Lebanon); Amani Ramzi Daou (Lebanese University Faculty of Technology, Lebanon); Nour El Madhoun (EPITA Engineering School, France); Rachad Maallawi (France)
15:20 – 15:40 Coffee Break
15:40 – 16:40 Technical Session #2: Blockchain II
Chaired by: Farkhund Iqbal (Zayed University, UAE)
- Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems
Mwrwan Abdelrazig Abubakar (Edinburgh Napier University, United Kingdom (Great Britain)); Zakwan Jaroucheh (Edinburgh Napier University & School of Computing, United Kingdom (Great Britain)); Ahmed Y Al-Dubai and Bill Buchanan (Edinburgh Napier University, United Kingdom (Great Britain) - State of the Art: Cross Chain Communications
Pedro B. Velloso (Universidade Federal do Rio de Janeiro (UFRJ), France & LIP6, Sorbonne Université, France); David Cordova Morales (LIP6, France); Thi Mai Trang Nguyen (Sorbonne Université & LIP6, France); Guy Pujolle (Sorbonne University, France)
20:00 Gala dinner
Wednesdays, October 13, 2021
10:00 – 12:00 Tutorial : Trust on Wheels – Towards Trust Management in the Internet of Vehicles
Speaker: Adnan Mahmood (Department of Computing, Macquarie University, Sydney, Australia)
Chaired by: Guy Pujolle (Sorbonne University, UAE)
12:00 – 12:30 Invited Talk I: Security on Drones Swarm Communication: Trends and challenges
Speaker: Martin Andreoni (TII, UAE)
Chaired by: Liza Ahmad (Zayed University, UAE)
12:30 – 14:00 Lunch Break
14:00 – 15:20 Technical Session #3:Artificial Intelligence and Cybersecurity
Chaired by: Abdul Kadhim Hayawi (Zayed University, UAE)
- Authenticating IDS Autoencoders Using Multipath Neural Networks
Raphaël Larsen (IMT Atlantique, France); Marc-Oliver Pahl (IMT Atlantique, France & Technical University of Munich, Germany) - Mitigation of Poisoning Attack in Federated Learning by Using Historical Distance Detection
Zhaosen Shi, Xuyang Ding, Fagen Li, Yingni Chen and Canran Li (University of Electronic Science and Technology of China, China) - Advances in ML-Based Anomaly Detection for the IoT (Short Paper)
Christian Lübben (Technical University of Munich, Germany); Marc-Oliver Pahl (IMT Atlantique, France & Technical University of Munich, Germany)
15:20 – 16:20 Keynote #2: End-2-End Security and Resilience in Cyber-Physical and Autonomous Systems
Speaker: Shreekant (Ticky) Thakkar (TII, UAE)
Chaired by: Ahmad Samer Wazan (Zayed University, UAE)
16:20 – 16:40 Coffee Break
16:40 – 17:05 Technical Session #4:Network Security
Chaired by: Nour El-Madhoun (EPITA, France)
- Inferring Legacy IoT Device Behavior over a Layer 2 TLS Tunnel
Rodrigo Caldas (FEUP & INESC TEC, University of Porto, Portugal); Carlos Novo (INESC TEC, University of Porto, Portugal); Ricardo Morla (INESC Porto and Faculty of Engineering, University of Porto, Portugal); Luis Cruz, Antonio Carvalho and David Campelo (Bosch Security and Safety Systems, Portugal)
Thursday, October 14, 2021
11:00 – 12:00 Demo Papers Session
Chaired by: Asad Khattak (Zayed University, UAE)
- Real Time Detection of Social Bots on Twitter Using Machine Learning and Apache Kafka
Eiman Alothali (United Arab Emirates University, United Arab Emirates); Hany Alashwal (United Arab Emirates University & College of Information Technology, United Arab Emirates); Motamen Salih (American University of Sharjah, United Arab Emirates); Abdul Kadhim Hayawi (Zayed University, United Arab Emirates) - Blockchain-Based Secure CIDS Operation
Imran Makhdoom (University of Technology Sydney, Australia); Abdul Kadhim Hayawi (Zayed University, United Arab Emirates); Mohammed Kaosar (Murdoch University, Australia); Sujith Samuel Mathew (Zayed University, United Arab Emirates); Mohammad Mehedy Masud (United Arab Emirates University & College of Information Technology, United Arab Emirates) - AI Based Login System Using Facial Recognition
Asad Khattak, Siem Girmay and Faniel Samsom (Zayed University, United Arab Emirates)
12:00 – 12:30 Invited Talk II: The Internet of Edges : a new solution for cybersecurity
Speaker: Khaldoun Al Agha (Paris-Saclay University and Green Communications, France)
Chaired by: Fatima Alharbi (Zayed University, UAE)
12:30 – 14:00 Lunch Break
14:00 – 15:20 Technical Session #5: Attack techniques and detection
Chaired by: Mohammed Badra (Zayed University, UAE)
- Incremental Code Updates Exploitation as a Basis for Return Oriented Programming Attacks on Resource-Constrained Devices
AbdElaziz Saad (IHP GmbH & Brandenburg University of Technology Cottbus-Senftenberg, Germany); Kai Lehniger (IHP GmbH, Germany); Peter Langendoerfer (IHP Microelectronics, Germany) - Forensic Analysis of the Cisco WebEx Application
Zainab Khalid (National University of Science and Technology, Pakistan); Farkhund Iqbal and Mohammed Hussain (Zayed University, United Arab Emirates); Faouzi Kamoun (ESPRIT, Tunisia); Liaqat Ali (Air University, Pakistan) - Modelling Evasive Malware Authoring Techniques (Short Paper)
Mathew Nicho Nicho and Maitha Alkhateri (Zayed University, United Arab Emirates)
15:20 – 16:20 Keynote #3: Why doesn’t cybersecurity work?
Speaker: Solange Ghernaouti (Swiss Cybersecurity Advisory & research Group, University of Lausanne, Switzerland)
Chaired by: Asad Khattak (Zayed University, UAE)
16:20 – 16:40 Coffee Break
16:40 – 17:20 Technical Session #6: Artificial Intelligence and Cybersecurity II
Chaired by: Mohammed Badra (Zayed University, UAE)
- Intrusion Detection Systems in In-Vehicle Networks Based on Bag-Of-Words
Gianmarco Baldini (Joint Research Centre – European Commission, Italy) - Classification of Malicious and Benign Websites by Network Features Using Supervised Machine Learning Algorithms (Short Paper)
Sanaa Kaddoura (Zayed University, United Arab Emirates)
17:20 – 17:30 Closing & Awards