{"id":206,"date":"2022-10-06T18:19:56","date_gmt":"2022-10-06T18:19:56","guid":{"rendered":"https:\/\/csnet-conference.org\/2022\/?page_id=206"},"modified":"2022-10-22T13:34:15","modified_gmt":"2022-10-22T13:34:15","slug":"program","status":"publish","type":"page","link":"https:\/\/csnet-conference.org\/2022\/program\/","title":{"rendered":"Program"},"content":{"rendered":"\n<h2>Program<\/h2>\n\n\n\n<p class=\"has-text-align-center\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-very-dark-gray-color\"><strong>Technical Program of the <strong><br><\/strong><\/strong><\/mark><strong><strong>6th Cyber Security in Networking Conference<\/strong><\/strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-very-dark-gray-color\"><br><\/mark><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">CSNet 2022<\/mark><\/strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-very-dark-gray-color\"><br><strong>October 24-26, 2022 &#8211; Rio de Janeiro, Brazil<\/strong><\/mark><\/p>\n\n\n\n<p class=\"has-text-align-center\">*<strong>Timing used is&nbsp;<em>BRT\/UTC-3h<\/em><\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"789\" height=\"483\" src=\"https:\/\/csnet-conference.org\/2022\/wp-content\/uploads\/2022\/10\/program.png\" alt=\"\" class=\"wp-image-207\" srcset=\"https:\/\/csnet-conference.org\/2022\/wp-content\/uploads\/2022\/10\/program.png 789w, https:\/\/csnet-conference.org\/2022\/wp-content\/uploads\/2022\/10\/program-300x184.png 300w, https:\/\/csnet-conference.org\/2022\/wp-content\/uploads\/2022\/10\/program-768x470.png 768w\" sizes=\"(max-width: 789px) 100vw, 789px\" \/><\/figure><\/div>\n\n<div id=\"program\" class=\"frame\">\n<table width=\"100%\">\n<tbody>\n<tr>\n<td class=\"programTitleTD\" colspan=\"2\" width=\"100%\">\n<h3 class=\"programTitleH3\"><strong>Day 1 \u2013 Monday, October 24, 2022<\/strong><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\">\n<p><strong>Time<\/strong><\/p>\n<\/td>\n<td width=\"80%\">\n<p><strong>Event<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\">\n<p>09:00 &#8211; 09:30<\/p>\n<\/td>\n<td width=\"80%\">\n<p><span style=\"color: #0000ff;\"><strong>Opening ceremony and registration<\/strong><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\">\n<p>09:30 &#8211; 11:00<\/p>\n<\/td>\n<td width=\"80%\">\n<p><span style=\"color: #0000ff;\"><strong>Keynote #1:<\/strong><\/span> <br \/><strong>Chair: <\/strong>Luis Henrique M. K. Costa (UFRJ, Brazil)<\/p>\n<p><strong>Title: A day in the life of Netflix Streaming: Netflix Adaptive Streaming and more<\/strong><br \/><strong>Speaker:<\/strong> Renata Teixeira (INRIA, France)<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\">\n<p>11:00 \u2013 11:30<\/p>\n<\/td>\n<td width=\"80%\">\n<p><strong>Coffee break<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\">\n<p>11:30 \u2013 13:00<\/p>\n<\/td>\n<td width=\"80%\">\n<p><span style=\"color: #0000ff;\"><strong>Technical Session #1:<\/strong> Security and Privacy Assessment<\/span><br \/><strong>Chair: <\/strong>Igor Moraes (UFF, Brazil)<\/p>\n<p><strong>Assessing Software-Defined Radio Performance in Virtualized Environments for Cloud Radio Access Networks<br \/><\/strong>Govinda Mohini G. Bezerra (Universidade Federal Fluminense, Brazil); Tadeu N. Ferreira (Universidade Federal Fluminense, Brazil); Diogo M. F. Mattos (Universidade Federal Fluminense, Brazil)<\/p>\n<p><strong><span class=\"papertitle\">Performance Analysis of a Privacy-Preserving Frame Sniffer on a Raspberry Pi <\/span><\/strong><span class=\"papertitle\">Fernando Dias de Mello Silva (Universidade Federal do Rio de Janeiro, Brazil); Abhishek Kumar Mishra (Inria, France); Aline Carneiro Viana (Inria, France); Nadjib Achir (Inria &amp; University Sorbonne Paris Nord, France); Anne Fladenmuller (Sorbonne Universit\u00e9, France); Lu\u00eds Henrique M. K. Costa (Universidade Federal do Rio de Janeiro, Brazil)<\/span><strong><span class=\"papertitle\"><br \/><\/span><\/strong><\/p>\n<p><strong>A Study on Human Centered Perspectives on Smartphone Privacy<br \/><\/strong>Carol Fung (Concordia University, Canada); Vivian Motti (George Mason University, United States of America); Katie Zhang (Virginia Commonwealth University, United States of America); Yanjun Qian (Virginia Commonwealth University, United States of America)<strong><br \/><\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\">\n<p>13:00 \u2013 14:30<\/p>\n<\/td>\n<td width=\"80%\">\n<p><strong>Lunch break<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\">\n<p>14:30 \u2013 16:00<\/p>\n<\/td>\n<td width=\"80%\">\n<p><span style=\"color: #0000ff;\"><strong>Technical Session #2: <\/strong>Intusion Detection Systems<\/span><br \/><strong>Chair: <\/strong>Khaldoun Al Agha (University Paris-Saclay, France)<\/p>\n<p><strong>A Distributed Platform for Intrusion Detection System Using Data Stream Mining in a Big Data Environment<br \/><\/strong>F\u00e1bio C\u00e9sar Schuartz (Universidade Tecnol\u00f3gica Federal do Paran\u00e1, Brazil); Mauro Fonseca (Universidade Tecnol\u00f3gica Federal do Paran\u00e1, Brazil); Anelise Munaretto (Universidade Tecnol\u00f3gica Federal do Paran\u00e1, Brazil)<strong><br \/><\/strong><\/p>\n<p><strong>GRAFFITO-IDS: A Graph-Based Algorithm for Feature Enrichment on Online Intrusion Detection Systems<br \/><\/strong>Igor Jochem Sanz (Universidade Federal do Rio de Janeiro &amp; Instituto de Pesquisas Eldorado, Brazil); Gabriel Antonio Fontes Rebello (Universidade Federal do Rio de Janeiro, Brazil); Otto Carlos Muniz Bandeira Duarte (Universidade Federal do Rio de Janeiro, Brazil)<strong><br \/><\/strong><\/p>\n<p><strong>Invited: A Stream Learning Intrusion Detection System for Concept Drifting Network Traffic<br \/><\/strong>Pedro Horchulhack (Pontif\u00edcia Universidade Cat\u00f3lica do Paran\u00e1, Brazil); Eduardo K. Viegas (Technology Innovation Institute, United Arab Emirates); Martin Andreoni Lopez (Technology Innovation Institute, United Arab Emirates)<strong><br \/><\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\">\n<p>16:00 \u2013 16:30<\/p>\n<\/td>\n<td width=\"80%\">\n<p><strong>Coffee break<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\">\n<p>16:30 \u2013 18:00<\/p>\n<\/td>\n<td width=\"80%\">\n<p><span style=\"color: #0000ff;\"><strong>Technical Session &#8211; Work in progress<\/strong>\u00a0<\/span><br \/><strong>Chair: <\/strong>Miguel Elias M. Campista (UFRJ, Brazil)<\/p>\n<p><strong>Demonstration of Standalone Intelligent WiFi Sensing for Real-Time Occupancy Monitoring<\/strong><br \/>Junye Li (University of New South Wales, Australia); Aryan Sharma (University of New South Wales, Australia); Deepak Mishra (University of New South Wales, Australia); Aruna Seneviratne (University of New South Wales, Australia)<\/p>\n<p><strong>ICpSAF &#8211; Integrated Cross-platform Security Assessment Framework<\/strong><br \/>Jo\u00e3o Pedro de Lima Cassiano (Centro de Pesquisa e Desenvolvimento em Telecomunica\u00e7\u00f5es, Brazil); S\u00e9rgio Ribeiro (Centro de Pesquisa e Desenvolvimento em Telecomunica\u00e7\u00f5es, Brazil); Alana Almeida (Centro de Pesquisa e Desenvolvimento em Telecomunica\u00e7\u00f5es, Brazil)<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div id=\"program\" class=\"frame\">\n<table width=\"100%\">\n<tbody>\n<tr>\n<td class=\"programTitleTD\" colspan=\"2\" width=\"100%\">\n<h3 class=\"programTitleH3\"><strong>Day 2 \u2013 Tuesday, October 25, 2022<\/strong><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\">\n<p><strong>Time<\/strong><\/p>\n<\/td>\n<td width=\"80%\">\n<p><strong>Event<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\">\n<p>09:00 &#8211; 09:30<\/p>\n<\/td>\n<td width=\"80%\">\n<p><span style=\"color: #0000ff;\"><strong>Registration<\/strong><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\">\n<p>09:30 &#8211; 11:00<\/p>\n<\/td>\n<td width=\"80%\">\n<p><span style=\"color: #0000ff;\"><strong>Keynote #2:<\/strong><\/span> <br \/><strong>Chair: <\/strong>C\u00e9lio Alburquerque (UFF, Brazil)<\/p>\n<p><strong>Title: An overview of the Internet Computer<\/strong><br \/><strong>Speaker:<\/strong> Michel Abdalla (CNRS\/ENS, France)<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\">\n<p>11:00 \u2013 11:30<\/p>\n<\/td>\n<td width=\"80%\">\n<p><strong>Coffee break<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\">\n<p>11:30 \u2013 13:00<\/p>\n<\/td>\n<td width=\"80%\">\n<p><span style=\"color: #0000ff;\"><strong>Technical Session #3:<\/strong> Cyber-Physical Security<\/span><br \/><strong>Chair: <\/strong>Martin Andreoni (TII, UAE)<\/p>\n<p><strong>Securing CoAP with DTLS and OSCORE<br \/><\/strong>Emil Suleymanov (Technical University of Munich, Germany); Erkin Kirdan (Framatome, France &amp; Technical University of Munich, Germany); Marc-Oliver Pahl (Institut Mines-T\u00e9l\u00e9com Atlantique, France &amp; Technical University of Munich, Germany)<strong><br \/><\/strong><\/p>\n<p><strong>Feature Extraction for Intrusion Detection in IEC-61850 Communication Networks<br \/><\/strong>Vagner E. Quincozes (Universidade Federal do Pampa, Brazil); Silvio E. Quincozes (Universidade Federal de Uberl\u00e2ndia, Brazil); C\u00e9lio Albuquerque (Universidade Federal Fluminense, Brazil); Diego Passos (Instituto Polit\u00e9cnico de Lisboa, Portugal); Daniel Moss\u00e9 (University of Pittsburgh, United States of America)<strong><br \/><\/strong><\/p>\n<p><strong>A Secure Cloud-Based Architecture for Monitoring Cyber-Physical Critical Infrastructures<br \/><\/strong>Paulo Assump\u00e7\u00e3o (Casa da Moeda &amp; Universidade Federal do Rio de Janeiro, Brazil); Carlos Oliveira (Instituto Nacional de Metrologia, Qualidade e Tecnologia, Brazil); Pablo Ortiz (Instituto Nacional de Metrologia, Qualidade e Tecnologia, Brazil); Wilson Melo (Instituto Nacional de Metrologia, Qualidade e Tecnologia, Brazil); Luiz Carmo (Instituto Nacional de Metrologia, Qualidade e Tecnologia, Brazil)<strong><br \/><\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\">\n<p>13:00 \u2013 14:30<\/p>\n<\/td>\n<td width=\"80%\">\n<p><strong>Lunch break<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\">\n<p>14:30 \u2013 16:00<\/p>\n<\/td>\n<td width=\"80%\">\n<p><span style=\"color: #0000ff;\"><strong>Keynote #3:<\/strong><\/span> <br \/><strong>Chair: <\/strong>Miguel Elias M. Campista (UFRJ, Brazil)<\/p>\n<p><strong>Title: Wireless CSI Vital Signs Monitoring and Privacy<\/strong><br \/><strong>Speaker:<\/strong> C\u00e9lio Albuquerque (UFF, Brazil)<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\">\n<p>16:00 \u2013 16:30<\/p>\n<\/td>\n<td width=\"80%\">\n<p><strong>Coffee break<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\">\n<p>16:30 \u2013 18:00<\/p>\n<\/td>\n<td width=\"80%\">\n<p><span style=\"color: #0000ff;\"><strong>Technical Session &#8211; Short papers<\/strong>\u00a0<\/span><br \/><strong>Chair: <\/strong>Diogo Mattos (UFF, Brazil)<\/p>\n<p><strong>Estimating Speedup Factor for Personal HSMs Based on Secure Elements<\/strong><br \/>Pascal Urien (Telecom Paris, France)<\/p>\n<p><strong>Horizontal Network for a Better Cybersecurity<\/strong><br \/>Khaldoun Al Agha (University Paris-Saclay, France); Pauline Loygue (Green Communications, France); Guy Pujolle (Sorbonne Universit\u00e9, France)<\/p>\n<p><strong>ASOP: A Sovereign and Secure Device Onboarding Protocol for Cloud-based IoT Services<\/strong><br \/>Khan Reaz (Freie Universit\u00e4t Berlin, Germany); Gerhard Wunder (Freie Universit\u00e4t Berlin, Germany)<\/p>\n<p><strong>A Web User Interface Tool for Metaheuristics-Based Feature Selection Assessment for IDSs<\/strong><br \/>Humberto Mendes (Universidade Federal de Uberl\u00e2ndia, Brazil); Silvio E. Quincozes (Universidade Federal de Uberl\u00e2ndia, Brazil); Vagner E. Quincozes (Universidade Federal do Pampa, Brazil)<\/p>\n<p><strong>The Impact of the Interest Flooding Attack on the Pending Interest Table of CCN Routers<\/strong><br \/>Diego Canizio Lopes (Instituto Federal de Educa\u00e7\u00e3o, Ci\u00eancia e Tecnologia do Acre, Brazil); Andr\u00e9 Luiz Nasserala Pires (Universidade Federal do Acre, Brazil); Igor Monteiro Moraes (Universidade Federal Fluminense, Brazil)<\/p>\n<p><strong>Cyber Deception, the Ultimate Piece of a Defensive Strategy &#8211; Proof of Concept<\/strong><br \/>Wiem Tounsi (Orange Cyberdefense, France)<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\">\n<p>20:00<\/p>\n<\/td>\n<td width=\"80%\">\n<p><span style=\"color: #0000ff;\"><strong>Gala Diner<\/strong><\/span><strong> :\u00a0<\/strong><a href=\"https:\/\/goo.gl\/maps\/uhZMxsCPBR1hAB9z7\">Fogo de Ch\u00e3o<\/a><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div id=\"program\" class=\"frame\">\n<table width=\"100%\">\n<tbody>\n<tr>\n<td class=\"programTitleTD\" colspan=\"2\" width=\"100%\">\n<h3 class=\"programTitleH3\"><strong>Day 3 \u2013 Wednesday, October 26, 2022<\/strong><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\">\n<p><strong>Time<\/strong><\/p>\n<\/td>\n<td width=\"80%\">\n<p><strong>Event<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\">\n<p>09:00 &#8211; 09:30<\/p>\n<\/td>\n<td width=\"80%\">\n<p><span style=\"color: #0000ff;\"><strong>Registration<\/strong><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\">\n<p>09:30 &#8211; 11:00<\/p>\n<\/td>\n<td width=\"80%\">\n<p><span style=\"color: #0000ff;\"><strong>Keynote #4:<\/strong><\/span> <br \/><strong>Chair: <\/strong>Diogo M. F. Mattos (UFF, Brazil)<\/p>\n<p><strong>Title: MeshShield: \u200bSecurity applied to \u200bdistributed mesh networks\u00a0<\/strong><br \/><strong>Speaker:<\/strong> Martin Andreoni (TII, UAE)<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\">\n<p>11:00 \u2013 11:30<\/p>\n<\/td>\n<td width=\"80%\">\n<p><strong>Coffee break<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\">\n<p>11:30 \u2013 13:00<\/p>\n<\/td>\n<td width=\"80%\">\n<p><span style=\"color: #0000ff;\"><strong>Technical Session #4:<\/strong> Blockchain Security<\/span><br \/><strong>Chair: <\/strong>Carol Fung (Concordia University, Canada)<\/p>\n<p><strong>Security and Performance Analysis of Quorum-based Blockchain Consensus Protocols<\/strong><br \/>Gabriel Antonio F. Rebello (Universidade Federal do Rio de Janeiro, Brazil &amp; Sorbonne Universit\u00e9, France); Gustavo F. Camilo (Universidade Federal do Rio de Janeiro, Brazil); Lucas C. B. Guimar\u00e3es (Universidade Federal do Rio de Janeiro, Brazil); Lucas Airam C. de Souza (Universidade Federal do Rio de Janeiro, Brazil); Otto Carlos M. B. Duarte (Universidade Federal do Rio de Janeiro, Brazil)<\/p>\n<p><strong>ZT&amp;T: Secure Blockchain-based Tokens for Service Session Management in Zero Trust Networks<\/strong><br \/>Javier Jose Diaz Rivera (Jeju National University, Republic of Korea); Talha Ahmed Khan (Jeju National University, Republic of Korea); Waleed Akbar (Jeju National University, Republic of Korea); Afaq Muhammad (Jeju National University, Republic of Korea); Wang-Cheol Song (Jeju National University, Republic of Korea)<\/p>\n<p><strong>Blockchain Meets Formal Logic: Semantics Level Cybersecurity Challenges (invited paper)<\/strong><br \/>Nouredine Tamani (Institut Sup\u00e9rieur d\u2019Electronique de Paris, France); Saad El-Jaouhari (Institut Sup\u00e9rieur d\u2019Electronique de Paris, France)<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\">\n<p>13:00 \u2013 14:30<\/p>\n<\/td>\n<td width=\"80%\">\n<p><strong>Lunch break<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\">\n<p>14:30 \u2013 16:00<\/p>\n<\/td>\n<td width=\"80%\">\n<p><span style=\"color: #0000ff;\"><strong>Technical Session #5:<\/strong> Review and Survey on Security<\/span><br \/><strong>Chair: <\/strong>Guy Pujolle (Sorbonne Universit\u00e9, France)<\/p>\n<p><strong>A Survey on the Security Issues of QUIC<\/strong><br \/>Y. A. Joarder (Concordia University, Canada); Carol Fung (Concordia University, Canada)<\/p>\n<p><strong>Security of NFC Banking Transactions: Overview on Attacks and Solutions<\/strong><br \/>Samir Chabbi (University of Souk Ahras, Algeria); Nour El Madhoun (Institut Sup\u00e9rieur d\u2019Electronique de Paris, France); Lazhar Khamer (University of Souk Ahras, Algeria)<\/p>\n<p><strong>A Review on Lexical Based Malicious Domain Name Detection Methods<\/strong><br \/>Cherifa Hamroun (Sorbonne Universit\u00e9, France &amp; Ecole Nationale Sup\u00e9rieure d\u2019Informatique, Algeria); Ahmed Amamou (Gandi, France); Kamel Haddadou (Gandi, France); Hayat Haroun (Ecole Nationale Sup\u00e9rieure d\u2019Informatique, Algeria); Guy Pujolle (Sorbonne Universit\u00e9, France)<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\">\n<p>16:00 \u2013 16:30<\/p>\n<\/td>\n<td width=\"80%\">\n<p><strong>Coffee break<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\">\n<p>16:30 \u2013 17:00<\/p>\n<\/td>\n<td width=\"80%\">\n<p><span style=\"color: #0000ff;\"><strong>Closing Ceremony\u00a0<\/strong><\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Program Technical Program of the 6th &hellip; <a href=\"https:\/\/csnet-conference.org\/2022\/program\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Program - CSNet 2022<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/csnet-conference.org\/2022\/program\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Program - CSNet 2022\" \/>\n<meta property=\"og:description\" content=\"Program Technical Program of the 6th &hellip; Continue reading &rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/csnet-conference.org\/2022\/program\/\" \/>\n<meta property=\"og:site_name\" content=\"CSNet 2022\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-22T13:34:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/csnet-conference.org\/2022\/wp-content\/uploads\/2022\/10\/program.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Dnac_conference\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/csnet-conference.org\/2022\/#organization\",\"name\":\"DNAC\",\"url\":\"https:\/\/csnet-conference.org\/2022\/\",\"sameAs\":[\"https:\/\/twitter.com\/Dnac_conference\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/csnet-conference.org\/2022\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/csnet-conference.org\/2022\/wp-content\/uploads\/2022\/01\/Logo_DNAC_Haut_Res-300x118-1.png\",\"contentUrl\":\"https:\/\/csnet-conference.org\/2022\/wp-content\/uploads\/2022\/01\/Logo_DNAC_Haut_Res-300x118-1.png\",\"width\":300,\"height\":118,\"caption\":\"DNAC\"},\"image\":{\"@id\":\"https:\/\/csnet-conference.org\/2022\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/csnet-conference.org\/2022\/#website\",\"url\":\"https:\/\/csnet-conference.org\/2022\/\",\"name\":\"CSNet 2022\",\"description\":\"6th Cyber Security in Networking Conference\",\"publisher\":{\"@id\":\"https:\/\/csnet-conference.org\/2022\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/csnet-conference.org\/2022\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/csnet-conference.org\/2022\/program\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/csnet-conference.org\/2022\/wp-content\/uploads\/2022\/10\/program.png\",\"contentUrl\":\"https:\/\/csnet-conference.org\/2022\/wp-content\/uploads\/2022\/10\/program.png\",\"width\":789,\"height\":483},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/csnet-conference.org\/2022\/program\/#webpage\",\"url\":\"https:\/\/csnet-conference.org\/2022\/program\/\",\"name\":\"Program - CSNet 2022\",\"isPartOf\":{\"@id\":\"https:\/\/csnet-conference.org\/2022\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/csnet-conference.org\/2022\/program\/#primaryimage\"},\"datePublished\":\"2022-10-06T18:19:56+00:00\",\"dateModified\":\"2022-10-22T13:34:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/csnet-conference.org\/2022\/program\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/csnet-conference.org\/2022\/program\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/csnet-conference.org\/2022\/program\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/csnet-conference.org\/2022\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Program\"}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Program - CSNet 2022","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/csnet-conference.org\/2022\/program\/","og_locale":"en_US","og_type":"article","og_title":"Program - CSNet 2022","og_description":"Program Technical Program of the 6th &hellip; Continue reading &rarr;","og_url":"https:\/\/csnet-conference.org\/2022\/program\/","og_site_name":"CSNet 2022","article_modified_time":"2022-10-22T13:34:15+00:00","og_image":[{"url":"https:\/\/csnet-conference.org\/2022\/wp-content\/uploads\/2022\/10\/program.png"}],"twitter_card":"summary_large_image","twitter_site":"@Dnac_conference","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/csnet-conference.org\/2022\/#organization","name":"DNAC","url":"https:\/\/csnet-conference.org\/2022\/","sameAs":["https:\/\/twitter.com\/Dnac_conference"],"logo":{"@type":"ImageObject","@id":"https:\/\/csnet-conference.org\/2022\/#logo","inLanguage":"en-US","url":"https:\/\/csnet-conference.org\/2022\/wp-content\/uploads\/2022\/01\/Logo_DNAC_Haut_Res-300x118-1.png","contentUrl":"https:\/\/csnet-conference.org\/2022\/wp-content\/uploads\/2022\/01\/Logo_DNAC_Haut_Res-300x118-1.png","width":300,"height":118,"caption":"DNAC"},"image":{"@id":"https:\/\/csnet-conference.org\/2022\/#logo"}},{"@type":"WebSite","@id":"https:\/\/csnet-conference.org\/2022\/#website","url":"https:\/\/csnet-conference.org\/2022\/","name":"CSNet 2022","description":"6th Cyber Security in Networking Conference","publisher":{"@id":"https:\/\/csnet-conference.org\/2022\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/csnet-conference.org\/2022\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/csnet-conference.org\/2022\/program\/#primaryimage","inLanguage":"en-US","url":"https:\/\/csnet-conference.org\/2022\/wp-content\/uploads\/2022\/10\/program.png","contentUrl":"https:\/\/csnet-conference.org\/2022\/wp-content\/uploads\/2022\/10\/program.png","width":789,"height":483},{"@type":"WebPage","@id":"https:\/\/csnet-conference.org\/2022\/program\/#webpage","url":"https:\/\/csnet-conference.org\/2022\/program\/","name":"Program - CSNet 2022","isPartOf":{"@id":"https:\/\/csnet-conference.org\/2022\/#website"},"primaryImageOfPage":{"@id":"https:\/\/csnet-conference.org\/2022\/program\/#primaryimage"},"datePublished":"2022-10-06T18:19:56+00:00","dateModified":"2022-10-22T13:34:15+00:00","breadcrumb":{"@id":"https:\/\/csnet-conference.org\/2022\/program\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/csnet-conference.org\/2022\/program\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/csnet-conference.org\/2022\/program\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/csnet-conference.org\/2022\/"},{"@type":"ListItem","position":2,"name":"Program"}]}]}},"_links":{"self":[{"href":"https:\/\/csnet-conference.org\/2022\/wp-json\/wp\/v2\/pages\/206"}],"collection":[{"href":"https:\/\/csnet-conference.org\/2022\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/csnet-conference.org\/2022\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/csnet-conference.org\/2022\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/csnet-conference.org\/2022\/wp-json\/wp\/v2\/comments?post=206"}],"version-history":[{"count":5,"href":"https:\/\/csnet-conference.org\/2022\/wp-json\/wp\/v2\/pages\/206\/revisions"}],"predecessor-version":[{"id":246,"href":"https:\/\/csnet-conference.org\/2022\/wp-json\/wp\/v2\/pages\/206\/revisions\/246"}],"wp:attachment":[{"href":"https:\/\/csnet-conference.org\/2022\/wp-json\/wp\/v2\/media?parent=206"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}