{"id":448,"date":"2021-09-06T22:55:45","date_gmt":"2021-09-06T22:55:45","guid":{"rendered":"https:\/\/csnet-conference.org\/2021\/?page_id=448"},"modified":"2021-10-23T17:39:19","modified_gmt":"2021-10-23T17:39:19","slug":"program","status":"publish","type":"page","link":"https:\/\/csnet-conference.org\/2021\/index.php\/program\/","title":{"rendered":"Program"},"content":{"rendered":"\n<h3 class=\"has-text-align-center\"><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">Program Outline<\/span><\/strong><\/h3>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/csnet-conference.org\/2021\/wp-content\/uploads\/2021\/10\/CSNet2021_4.pdf\"><strong>(Click here to download CSNet Program in PDF format)<\/strong><\/a><\/p>\n\n\n\n<div id=\"CSNet_2021-program-grid_19551\" x:publishsource=\"Excel\" align=\"center\">\n\n\t\t<table class=\"xl6319551\" style=\"border-collapse:collapse;table-layout:fixed;\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\" border=\"0\">\n\t\t\t<colgroup><col class=\"xl8319551\" style=\"mso-width-source:userset;mso-width-alt:\n 2218;\" width=\"9%\">\n\t\t\t<col class=\"xl6319551\" style=\"mso-width-source:userset;\n mso-width-alt:7253;\" width=\"29%\" span=\"2\">\n\t\t\t<col class=\"xl6319551\" style=\"mso-width-source:userset;mso-width-alt:\n 7594;\" width=\"31%\">\n\t\t\t<\/colgroup><tbody><tr style=\"height:36.0pt\" height=\"48\">\n\t\t\t\t<td class=\"xl7619551\" style=\"height:36.0pt;width:47pt\" width=\"9%\" height=\"48\">Time<br>\n\t\t\t\t\t(GST)<\/td>\n\t\t\t\t<td class=\"xl6819551\" style=\"border-left:none;width:153pt\" width=\"29%\">Tuesday,\n\t\t\t\t\tOct 12<\/td>\n\t\t\t\t<td class=\"xl6819551\" style=\"border-left:none;width:153pt\" width=\"29%\">Wednesday,\n\t\t\t\t\tOct 13<\/td>\n\t\t\t\t<td class=\"xl6919551\" style=\"border-left:none;width:160pt\" width=\"31%\">Thursday,\n\t\t\t\t\tOct 14<\/td>\n\t\t\t<\/tr>\n\t\t\t<tr style=\"height:23.4pt\" height=\"31\">\n\t\t\t\t<td class=\"xl7719551\" style=\"height:23.4pt;border-top:none\" height=\"31\">10:00<\/td>\n\t\t\t\t<td class=\"xl9619551\" style=\"border-top:none;border-left:none;\n  width:153pt\" width=\"29%\">&nbsp;<\/td>\n\t\t\t\t<td rowspan=\"4\" class=\"xl8619551\" style=\"border-top:none;width:153pt\" width=\"29%\"><a href=\"https:\/\/csnet-conference.org\/2021\/index.php\/tutorial\/#tutorial1\">Tutorial<\/a><\/td>\n\t\t\t\t<td class=\"xl9519551\" style=\"border-top:none;border-left:none;\n  width:160pt\" width=\"31%\">&nbsp;<\/td>\n\t\t\t<\/tr>\n\t\t\t<tr style=\"height:23.4pt\" height=\"31\">\n\t\t\t\t<td class=\"xl7719551\" style=\"height:23.4pt;border-top:none\" height=\"31\">11:00<\/td>\n\t\t\t\t<td rowspan=\"2\" class=\"xl6719551\" style=\"border-top:none;width:153pt\" width=\"29%\">Opening\n\t\t\t\t\tCeremony<\/td>\n\t\t\t\t<td rowspan=\"3\" class=\"xl8819551\" style=\"border-top:none\">Demo Papers Session<\/td>\n\t\t\t<\/tr>\n\t\t\t<tr style=\"height:23.4pt\" height=\"31\">\n\t\t\t\t<td class=\"xl7719551\" style=\"height:23.4pt;border-top:none\" height=\"31\">11:15<\/td>\n\t\t\t<\/tr>\n\t\t\t<tr style=\"height:23.4pt\" height=\"31\">\n\t\t\t\t<td class=\"xl7719551\" style=\"height:23.4pt;border-top:none\" height=\"31\">11:30<\/td>\n\t\t\t\t<td rowspan=\"2\" class=\"xl8419551\" style=\"border-top:none\"><a href=\"https:\/\/csnet-conference.org\/2021\/index.php\/keynotes\/#keynote1\">Keynote #1<\/a><\/td>\n\t\t\t<\/tr>\n\t\t\t<tr style=\"height:23.4pt\" height=\"31\">\n\t\t\t\t<td class=\"xl7719551\" style=\"height:23.4pt;border-top:none\" height=\"31\">12:00<\/td>\n\t\t\t\t<td class=\"xl6419551\" style=\"border-top:none;border-left:none\">Invited Talk I<\/td>\n\t\t\t\t<td class=\"xl7019551\" style=\"border-top:none;border-left:none\">Invited Talk II<\/td>\n\t\t\t<\/tr>\n\t\t\t<tr style=\"mso-height-source:userset;height:32.25pt\" height=\"42\">\n\t\t\t\t<td class=\"xl7719551\" style=\"height:32.25pt;border-top:none\" height=\"42\">12:30<\/td>\n\t\t\t\t<td class=\"xl6619551\" style=\"border-top:none;border-left:none\">Lunch Break<\/td>\n\t\t\t\t<td class=\"xl6619551\" style=\"border-top:none;border-left:none\">Lunch Break<\/td>\n\t\t\t\t<td class=\"xl7119551\" style=\"border-top:none;border-left:none\">Lunch Break<\/td>\n\t\t\t<\/tr>\n\t\t\t<tr style=\"height:23.4pt\" height=\"31\">\n\t\t\t\t<td rowspan=\"3\" class=\"xl7719551\" style=\"height:70.2pt;border-top:none\" height=\"93\">14:00<\/td>\n\t\t\t\t<td rowspan=\"3\" class=\"xl8919551\" style=\"border-top:none;width:153pt\" width=\"29%\">\n\t\t\t\t\t<font class=\"font519551\">Technical Session #1<br>\n\t\t\t\t\t<\/font>\n\t\t\t\t\t<font class=\"font619551\">Blockchain I<\/font>\n\t\t\t\t<\/td>\n\t\t\t\t<td rowspan=\"3\" class=\"xl8919551\" style=\"border-top:none;width:153pt\" width=\"29%\">\n\t\t\t\t\t<font class=\"font519551\">Technical Session #3<br>\n\t\t\t\t\t<\/font>\n\t\t\t\t\t<font class=\"font619551\">Artificial Intelligence<br>\n\t\t\t\t\t\tand Cybersecurity I<\/font>\n\t\t\t\t<\/td>\n\t\t\t\t<td rowspan=\"3\" class=\"xl9019551\" style=\"border-top:none;width:160pt\" width=\"31%\">\n\t\t\t\t\t<font class=\"font519551\">Technical Session #5<br>\n\t\t\t\t\t<\/font>\n\t\t\t\t\t<font class=\"font619551\">Attack techniques and detection<\/font>\n\t\t\t\t<\/td>\n\t\t\t<\/tr>\n\t\t\t<tr style=\"height:23.4pt\" height=\"31\">\n\t\t\t<\/tr>\n\t\t\t<tr style=\"height:23.4pt\" height=\"31\">\n\t\t\t<\/tr>\n\t\t\t<tr style=\"height:23.4pt\" height=\"31\">\n\t\t\t\t<td class=\"xl7719551\" style=\"height:23.4pt;border-top:none\" height=\"31\">15:20<\/td>\n\t\t\t\t<td class=\"xl6519551\" style=\"border-top:none;border-left:none\">Coffee Break<\/td>\n\t\t\t\t<td rowspan=\"2\" class=\"xl8419551\" style=\"border-top:none\"><a href=\"https:\/\/csnet-conference.org\/2021\/index.php\/keynotes\/#keynote2\">Keynote #2<\/a><\/td>\n\t\t\t\t<td rowspan=\"2\" class=\"xl9119551\" style=\"border-top:none\"><a href=\"https:\/\/csnet-conference.org\/2021\/index.php\/keynotes\/#keynote3\">Keynote #3<\/a><\/td>\n\t\t\t<\/tr>\n\t\t\t<tr style=\"height:23.4pt\" height=\"31\">\n\t\t\t\t<td class=\"xl7719551\" style=\"height:23.4pt;border-top:none\" height=\"31\">15:40<\/td>\n\t\t\t\t<td rowspan=\"3\" class=\"xl8919551\" style=\"border-top:none;width:153pt\" width=\"29%\">\n\t\t\t\t\t<font class=\"font519551\">Technical Session #2<br>\n\t\t\t\t\t<\/font>\n\t\t\t\t\t<font class=\"font619551\">Blockchain II<\/font>\n\t\t\t\t<\/td>\n\t\t\t<\/tr>\n\t\t\t<tr style=\"height:23.4pt\" height=\"31\">\n\t\t\t\t<td class=\"xl7719551\" style=\"height:23.4pt;border-top:none\" height=\"31\">16:20<\/td>\n\t\t\t\t<td class=\"xl6519551\" style=\"border-top:none;border-left:none\">Coffee Break<\/td>\n\t\t\t\t<td class=\"xl7219551\" style=\"border-top:none;border-left:none\">Coffee Break<\/td>\n\t\t\t<\/tr>\n\t\t\t<tr style=\"height:23.4pt\" height=\"31\">\n\t\t\t\t<td class=\"xl7719551\" style=\"height:23.4pt;border-top:none\" height=\"31\">16:40<\/td>\n\t\t\t\t<td rowspan=\"4\" class=\"xl8919551\" style=\"border-top:none;width:153pt\" width=\"29%\">\n\t\t\t\t\t<font class=\"font519551\">Technical Session #4<br>\n\t\t\t\t\t<\/font>\n\t\t\t\t\t<font class=\"font619551\">Blockchain II<\/font>\n\t\t\t\t<\/td>\n\t\t\t\t<td rowspan=\"3\" class=\"xl9019551\" style=\"border-top:none;width:160pt\" width=\"31%\">\n\t\t\t\t\t<font class=\"font519551\">Technical Session #6<br>\n\t\t\t\t\t<\/font>\n\t\t\t\t\t<font class=\"font619551\">Artificial Intelligence and Cybersecurity\n\t\t\t\t\t\tII<\/font>\n\t\t\t\t<\/td>\n\t\t\t<\/tr>\n\t\t\t<tr style=\"height:23.4pt\" height=\"31\">\n\t\t\t\t<td rowspan=\"2\" class=\"xl7919551\" style=\"border-bottom:.5pt solid black;\n  height:46.8pt;border-top:none\" height=\"62\">17:00<\/td>\n\t\t\t\t<td style=\"border-bottom:1.0pt solid black;\n  border-top:none;width:153pt\" rowspan=\"3\" width=\"29%\"><\/td>\n\t\t\t<\/tr>\n\t\t\t<tr style=\"height:23.4pt\" height=\"31\">\n\t\t\t<\/tr>\n\t\t\t<tr style=\"height:23.4pt\" height=\"31\">\n\t\t\t\t<td class=\"xl8119551\" style=\"border-bottom:1.0pt solid black;\n  height:47.4pt;border-top:none\" rowspan=\"1\" height=\"63\">17:20<\/td>\n\t\t\t\t<td class=\"xl7319551\" style=\"border-top:none;border-left:none;\n  width:160pt\" width=\"31%\">Closing &amp; Awards<\/td>\n\t\t\t<\/tr>\n\t\t\t<tr style=\"height:24.0pt\" height=\"32\">\n\t\t\t\t<td style=\"border-bottom:1.0pt solid black;\n  height:23pt;border-top:none\" class=\"xl8119551\" height=\"32\">20:00<\/td>\n\t\t\t\t<td style=\"border-top:none;border-left:none;\n  width:160pt\" class=\"xl6719551\" width=\"31%\">Gala dinner<\/td>\n\t<td class=\"xl7519551\" style=\"border-top:none;border-left:none;\n  width:160pt\" width=\"31%\">&nbsp;<\/td>\n\t<td class=\"xl7519551\" style=\"border-top:none;border-left:none;\n  width:160pt\" width=\"31%\">&nbsp;<\/td>\n\t\t\t<\/tr>\n\t\t\t<!--[if supportMisalignedColumns]-->\n\t\t\t<tr style=\"display:none\" height=\"0\">\n\t\t\t\t<td style=\"width:47pt\" width=\"9%\"><\/td>\n\t\t\t\t<td style=\"width:153pt\" width=\"29%\"><\/td>\n\t\t\t\t<td style=\"width:153pt\" width=\"29%\"><\/td>\n\t\t\t\t<td style=\"width:160pt\" width=\"31%\"><\/td>\n\t\t\t<\/tr>\n\t\t\t<!--[endif]-->\n\t\t<\/tbody><\/table>\n\n\t<\/div>\n\n\n\n<p class=\"has-text-align-center\"><span class=\"has-inline-color has-vivid-red-color\"><strong>*Timing used is&nbsp;(GST) <em>Gulf Standard Time, that is UTC\/GMT+4h<\/em><\/strong><\/span><\/p>\n\n\n\n<div class=\"frame\"><h3><strong>Tuesday, October 12, 2021<\/strong><\/h3>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>11:00 &#8211; 11:30\u2003<strong>Opening Conference<\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>11:30 &#8211; 12:30 \u2003 <a href=\"https:\/\/nof2021.dnac.org\/keynotes\/#keynote1\"><strong>Keynote #1: <\/strong><\/a><strong><strong><a href=\"https:\/\/csnet-conference.org\/2021\/index.php\/keynotes\/#keynote1\">Conciling privacy rights with security needs<\/a><\/strong><\/strong><br><em>Speaker: <strong>Maryline Laurent<\/strong> (T\u00e9l\u00e9com SudParis, France )<br>Chaired by: Farkhund Iqbal<\/em> (Zayed University, UAE)<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>12:30 &#8211; 14:00 \u2003<strong>Lunch Break<\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>14:00 &#8211; 15:20 <strong>\u2003Technical Session #1: Blockchain I<br><\/strong>Chaired by: <em>Asad Khattak<\/em> (Zayed University, UAE)<\/p>\n\n\n\n<ul><li><strong><strong>Innovative Countermeasures to Defeat Cyber Attacks Against Blockchain Wallets<\/strong><\/strong><br>Pascal Urien&nbsp;(Telecom Paris, France)<\/li><li><strong>C4M: A Partition-Robust Consensus Algorithm for Blockgraph in Mesh Network<\/strong><br>David Cordova Morales&nbsp;(LIP6, France);&nbsp;Pedro B. Velloso&nbsp;(Universidade Federal do Rio de Janeiro (UFRJ), France &amp; LIP6, Sorbonne Universit\u00e9, France);&nbsp;Alexandre Laube&nbsp;(Universit\u00e9 Pierre et Marie Curie, France);&nbsp;Thi Mai Trang Nguyen&nbsp;(Sorbonne Universit\u00e9 &amp; LIP6, France);&nbsp;Guy Pujolle&nbsp;(Sorbonne University &amp; Green Communications, France)<\/li><li><strong><strong>A Secure Blockchain-Based Architecture for the COVID-19 Data Network (Short Paper)<\/strong><\/strong><br>Darine Al-Mohtar&nbsp;(Lebanese University, Faculty of Technology, Lebanon);&nbsp;Amani Ramzi Daou&nbsp;(Lebanese University Faculty of Technology, Lebanon);&nbsp;Nour El Madhoun&nbsp;(EPITA Engineering School, France);&nbsp;Rachad Maallawi&nbsp;(France)<\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>15:20 &#8211; 15:40 \u2003<strong> Coffee Break<\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>15:40 &#8211; 16:40 <strong>\u2003Technical Session #2: Blockchain II<br><\/strong>Chaired by: <em>Farkhund Iqbal<\/em> (Zayed University, UAE)<\/p>\n\n\n\n<ul><li><strong><strong><strong>Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems<\/strong><\/strong><\/strong><br>Mwrwan Abdelrazig Abubakar&nbsp;(Edinburgh Napier University, United Kingdom (Great Britain));&nbsp;Zakwan Jaroucheh&nbsp;(Edinburgh Napier University &amp; School of Computing, United Kingdom (Great Britain));&nbsp;Ahmed Y Al-Dubai&nbsp;and&nbsp;Bill Buchanan&nbsp;(Edinburgh Napier University, United Kingdom (Great Britain)<\/li><li><strong><strong>State of the Art: Cross Chain Communications<\/strong><\/strong><br>Pedro B. Velloso&nbsp;(Universidade Federal do Rio de Janeiro (UFRJ), France &amp; LIP6, Sorbonne Universit\u00e9, France);&nbsp;David Cordova Morales&nbsp;(LIP6, France);&nbsp;Thi Mai Trang Nguyen&nbsp;(Sorbonne Universit\u00e9 &amp; LIP6, France);&nbsp;Guy Pujolle&nbsp;(Sorbonne University, France)<\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>20:00 \u2003<strong> Gala dinner<\/strong><\/p>\n\n\n\n<\/div><div class=\"frame\"><h3><strong>Wednesdays, October 13, 2021<\/strong><\/h3>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>10:00 &#8211; 12:00 \u2003 <a href=\"https:\/\/csnet-conference.org\/2021\/index.php\/tutorial\/#tutorial1\"><strong>Tutorial : <strong>Trust on Wheels \u2013 Towards Trust Management in the Internet of Vehicles<\/strong><\/strong><\/a><br><em>Speaker: <strong>Adnan Mahmood<\/strong>  (Department of Computing, Macquarie University, Sydney, Australia<\/em>)<em><br>Chaired by: Guy Pujolle<\/em> (Sorbonne University, UAE)<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>12:00 &#8211; 12:30 \u2003<strong>Invited Talk<\/strong> <strong>I:<\/strong> <strong>Security on Drones Swarm Communication: Trends and challenges<\/strong><br><em>Speaker: <\/em><strong>Martin Andreoni<\/strong> (TII, UAE)<br>Chaired by: <em>Liza Ahmad<\/em> (Zayed University, UAE)<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>12:30 &#8211; 14:00 \u2003<strong>Lunch Break<\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>14:00 &#8211; 15:20 \u2003<strong>Technical Session #3:Artificial Intelligence and Cybersecurity<br><\/strong>Chaired by: <em>Abdul Kadhim Hayawi<\/em> (Zayed University, UAE)<\/p>\n\n\n\n<ul><li><strong><strong>Authenticating IDS Autoencoders Using Multipath Neural Networks<\/strong><\/strong><br>Rapha\u00ebl Larsen&nbsp;(IMT Atlantique, France);&nbsp;Marc-Oliver Pahl&nbsp;(IMT Atlantique, France &amp; Technical University of Munich, Germany)<\/li><li><strong><strong>Mitigation of Poisoning Attack in Federated Learning by Using Historical Distance Detection<\/strong><\/strong><br>Zhaosen Shi,&nbsp;Xuyang Ding,&nbsp;Fagen Li,&nbsp;Yingni Chen&nbsp;and&nbsp;Canran Li&nbsp;(University of Electronic Science and Technology of China, China)<\/li><li><strong><strong>Advances in ML-Based Anomaly Detection for the IoT (Short Paper)<\/strong><\/strong><br>Christian L\u00fcbben&nbsp;(Technical University of Munich, Germany);&nbsp;Marc-Oliver Pahl&nbsp;(IMT Atlantique, France &amp; Technical University of Munich, Germany)<\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>15:20 &#8211; 16:20 \u2003<strong><a href=\"https:\/\/csnet-conference.org\/2021\/index.php\/keynotes\/#keynote2\"><strong>Keynote #2: <strong>End-2-End Security and Resilience in Cyber-Physical and Autonomous Systems<\/strong><\/strong><\/a><br><\/strong><em>Speaker:<\/em><strong><em> <strong><strong>Shreekant (Ticky) Thakkar <\/strong><\/strong><\/em><\/strong><em>(TII, UAE)<\/em><strong><em><br>Chaired by: <\/em><\/strong><em>Ahmad Samer Wazan<\/em> (Zayed University, UAE)<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>16:20 &#8211; 16:40 \u2003<strong>Coffee Break<\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>16:40 &#8211; 17:05 \u2003<strong>Technical Session #4:Network Security<br><\/strong>Chaired by: Nour El-Madhoun (EPITA, France)<\/p>\n\n\n\n<ul><li><strong><strong><strong>Inferring Legacy IoT Device Behavior over a Layer 2 TLS Tunnel<\/strong><\/strong><\/strong><br>Rodrigo Caldas&nbsp;(FEUP &amp; INESC TEC, University of Porto, Portugal);&nbsp;Carlos Novo&nbsp;(INESC TEC, University of Porto, Portugal);&nbsp;Ricardo Morla&nbsp;(INESC Porto and Faculty of Engineering, University of Porto, Portugal);&nbsp;Luis Cruz,&nbsp;Antonio Carvalho&nbsp;and&nbsp;David Campelo&nbsp;(Bosch Security and Safety Systems, Portugal)<\/li><\/ul><\/div>\n\n\n\n<div class=\"frame\"><h3><strong>Thursday, October 14, 2021<\/strong><\/h3>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>11:00 &#8211; 12:00 \u2003<strong>Demo Papers Session<br><\/strong>Chaired by<strong>: <\/strong><em>Asad Khattak <\/em>(Zayed University, UAE)<\/p>\n\n\n\n<ul id=\"block-2d079e5f-c44a-448b-8c2a-e9d5d6c69619\"><li><strong><em>Real Time Detection of Social Bots on Twitter Using Machine Learning and Apache Kafka<\/em><\/strong><br>Eiman Alothali&nbsp;(United Arab Emirates University, United Arab Emirates);&nbsp;Hany Alashwal&nbsp;(United Arab Emirates University &amp; College of Information Technology, United Arab Emirates);&nbsp;Motamen Salih&nbsp;(American University of Sharjah, United Arab Emirates);&nbsp;Abdul Kadhim Hayawi&nbsp;(Zayed University, United Arab Emirates)<\/li><li><em><strong>Blockchain-Based Secure CIDS Operation<\/strong><\/em><br>Imran Makhdoom&nbsp;(University of Technology Sydney, Australia);&nbsp;Abdul Kadhim Hayawi&nbsp;(Zayed University, United Arab Emirates);&nbsp;Mohammed Kaosar&nbsp;(Murdoch University, Australia);&nbsp;Sujith Samuel Mathew&nbsp;(Zayed University, United Arab Emirates);&nbsp;Mohammad Mehedy Masud&nbsp;(United Arab Emirates University &amp; College of Information Technology, United Arab Emirates)<\/li><li><em><strong>AI Based Login System Using Facial Recognition<\/strong><\/em><br>Asad Khattak,&nbsp;Siem Girmay&nbsp;and&nbsp;Faniel Samsom&nbsp;(Zayed University, United Arab Emirates)<\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>12:00 &#8211; 12:30 \u2003<strong>Invited Talk<\/strong> <strong>II<\/strong>: <strong>T<strong>he Internet of Edges : a new solution for cybersecurity<\/strong><\/strong><br><em>Speaker: <\/em><strong>Khaldoun Al Agha <\/strong>(Paris-Saclay University and Green Communications, France)<br>Chaired by: <em>Fatima Alharbi<\/em> (Zayed University, UAE)<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>12:30 &#8211; 14:00 \u2003<strong>Lunch Break<\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>14:00 &#8211; 15:20 \u2003<strong>Technical Session #5: Attack techniques and detection<br><\/strong>Chaired by<strong>: <\/strong><em>Mohammed Badra<\/em> (Zayed University, UAE)<\/p>\n\n\n\n<ul><li><strong><strong>Incremental Code Updates Exploitation as a Basis for Return Oriented Programming Attacks on Resource-Constrained Devices<\/strong><\/strong><br>AbdElaziz Saad&nbsp;(IHP GmbH &amp; Brandenburg University of Technology Cottbus-Senftenberg, Germany);&nbsp;Kai Lehniger&nbsp;(IHP GmbH, Germany);&nbsp;Peter Langendoerfer&nbsp;(IHP Microelectronics, Germany)<\/li><li><strong>Forensic Analysis of the Cisco WebEx Application<\/strong><br>Zainab Khalid&nbsp;(National University of Science and Technology, Pakistan);&nbsp;Farkhund Iqbal&nbsp;and&nbsp;Mohammed Hussain&nbsp;(Zayed University, United Arab Emirates);&nbsp;Faouzi Kamoun&nbsp;(ESPRIT, Tunisia);&nbsp;Liaqat Ali&nbsp;(Air University, Pakistan)<\/li><li><strong>Modelling Evasive Malware Authoring Techniques (Short Paper)<\/strong><br>Mathew Nicho Nicho&nbsp;and&nbsp;Maitha Alkhateri&nbsp;(Zayed University, United Arab Emirates)<\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>15:20 &#8211; 16:20 \u2003<a href=\"https:\/\/csnet-conference.org\/2021\/index.php\/keynotes\/#keynote3\"><strong>Keynote #3: <strong>Why doesn&#8217;t cybersecurity work?<\/strong><\/strong><\/a><br><em>Speaker: <strong><strong>Solange Ghernaouti<\/strong><\/strong> (Swiss Cybersecurity Advisory &amp; research Group, University of Lausanne, Switzerland)<br>Chaired by: Asad Khattak<\/em> (Zayed University, UAE)<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>16:20 &#8211; 16:40 <strong>\u2003Coffee Break<\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>16:40 &#8211; 17:20 \u2003<strong>Technical Session #6: Artificial Intelligence and Cybersecurity II<br><\/strong><em>Chaired by: Mohammed Badra<\/em> (Zayed University, UAE)<\/p>\n\n\n\n<ul id=\"block-c2748400-1a78-4906-9d63-2f53aff02d75\"><li><strong><strong>Intrusion Detection Systems in In-Vehicle Networks Based on Bag-Of-Words<\/strong><\/strong><br>Gianmarco Baldini&nbsp;(Joint Research Centre &#8211; European Commission, Italy)<\/li><li><strong>Classification of Malicious and Benign Websites by Network Features Using Supervised Machine Learning Algorithms (Short Paper)<\/strong><br>Sanaa Kaddoura&nbsp;(Zayed University, United Arab Emirates)<\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>17:20 &#8211; 17:30 \u2003<strong>Closing &amp; Awards<\/strong><\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Program Outline (Click here to download &hellip; <a href=\"https:\/\/csnet-conference.org\/2021\/index.php\/program\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v15.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Program - CSNet 2021<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/csnet-conference.org\/2021\/index.php\/program\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Program - CSNet 2021\" \/>\n<meta property=\"og:description\" content=\"Program Outline (Click here to download &hellip; Continue reading &rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/csnet-conference.org\/2021\/index.php\/program\/\" \/>\n<meta property=\"og:site_name\" content=\"CSNet 2021\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-23T17:39:19+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\">\n\t<meta name=\"twitter:data1\" content=\"5 minutes\">\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/csnet-conference.org\/2021\/#website\",\"url\":\"https:\/\/csnet-conference.org\/2021\/\",\"name\":\"CSNet 2021\",\"description\":\"5th Cyber Security in Networking Conference\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/csnet-conference.org\/2021\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/csnet-conference.org\/2021\/index.php\/program\/#webpage\",\"url\":\"https:\/\/csnet-conference.org\/2021\/index.php\/program\/\",\"name\":\"Program - CSNet 2021\",\"isPartOf\":{\"@id\":\"https:\/\/csnet-conference.org\/2021\/#website\"},\"datePublished\":\"2021-09-06T22:55:45+00:00\",\"dateModified\":\"2021-10-23T17:39:19+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/csnet-conference.org\/2021\/index.php\/program\/\"]}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/csnet-conference.org\/2021\/index.php\/wp-json\/wp\/v2\/pages\/448"}],"collection":[{"href":"https:\/\/csnet-conference.org\/2021\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/csnet-conference.org\/2021\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/csnet-conference.org\/2021\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/csnet-conference.org\/2021\/index.php\/wp-json\/wp\/v2\/comments?post=448"}],"version-history":[{"count":77,"href":"https:\/\/csnet-conference.org\/2021\/index.php\/wp-json\/wp\/v2\/pages\/448\/revisions"}],"predecessor-version":[{"id":650,"href":"https:\/\/csnet-conference.org\/2021\/index.php\/wp-json\/wp\/v2\/pages\/448\/revisions\/650"}],"wp:attachment":[{"href":"https:\/\/csnet-conference.org\/2021\/index.php\/wp-json\/wp\/v2\/media?parent=448"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}