{"id":363,"date":"2023-09-09T15:25:22","date_gmt":"2023-09-09T15:25:22","guid":{"rendered":"https:\/\/csnet-conference.org\/2023\/?page_id=363"},"modified":"2023-10-12T07:27:16","modified_gmt":"2023-10-12T07:27:16","slug":"program","status":"publish","type":"page","link":"https:\/\/csnet-conference.org\/2023\/program\/","title":{"rendered":"Program"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"363\" class=\"elementor elementor-363\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6ca53e3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6ca53e3\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-46fdb4e\" data-id=\"46fdb4e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8204e22 elementor-widget elementor-widget-heading\" data-id=\"8204e22\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.15.0 - 20-08-2023 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">CSNet 2023 Program<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f9796c elementor-widget elementor-widget-text-editor\" data-id=\"0f9796c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.15.0 - 20-08-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p><em>The current program is provisional and may be subject to changes<\/em><\/p><p>*<strong>Timing used is\u00a0<em>EDT\/GMT-4h<\/em><\/strong><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c53964a elementor-widget elementor-widget-image\" data-id=\"c53964a\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.15.0 - 20-08-2023 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" width=\"727\" height=\"641\" src=\"https:\/\/csnet-conference.org\/2023\/wp-content\/uploads\/2023\/10\/CSNet_23_program_at_glance_2.jpg\" class=\"attachment-large size-large wp-image-540\" alt=\"\" srcset=\"https:\/\/csnet-conference.org\/2023\/wp-content\/uploads\/2023\/10\/CSNet_23_program_at_glance_2.jpg 727w, https:\/\/csnet-conference.org\/2023\/wp-content\/uploads\/2023\/10\/CSNet_23_program_at_glance_2-300x265.jpg 300w\" sizes=\"(max-width: 727px) 100vw, 727px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9ae9f51 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9ae9f51\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2766d71\" data-id=\"2766d71\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-75fc1d9 programTitleTD eael-table-align-center eael-dt-th-align-left elementor-widget elementor-widget-eael-data-table\" data-id=\"75fc1d9\" data-element_type=\"widget\" data-widget_type=\"eael-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"eael-data-table-wrap\" data-table_id=\"75fc1d9\" id=\"eael-data-table-75fc1d9\" data-custom_responsive=\"false\">\n\t\t\t<table class=\"tablesorter eael-data-table center\" id=\"eael-data-table-75fc1d9\">\n\t\t\t    <thead>\n\t\t\t        <tr class=\"table-header\">\n\t\t\t\t\t\t\t\t\t            <th class=\"\" id=\"\" colspan=\"2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"data-table-header-text\">Day #1: October 16th, 2023<\/span><\/th>\n\t\t\t        \t\t\t\t        <\/tr>\n\t\t\t    <\/thead>\n\t\t\t  \t<tbody>\n\t\t\t\t\t\t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">9:00 - 09:30\n<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">Opening Ceremony<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">9:30 - 10:00\n<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\"><p class=\"has-inline-color has-vivid-cyan-blue-color\"><b><i>Work-in-progress Session<\/i><\/b><\/p>\n\n<ul>\n \t<li><strong>IDS (Intrusion Detection System) Using Deep Learning Techniques<\/strong><br><em>Meetsinh Vijaysinh Parihar and Carol Fung\n<\/em><\/li>\n\n<\/ul><\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">10:00 - 11:00\n<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\"><p class=\"has-inline-color has-vivid-cyan-blue-color\"><b><i>Session #1: Mobile Networks and Cyber Security<\/i><\/b><\/p>\n\n<ul>\n \t<li><strong>Adversarial Security and Differential Privacy in mmWave Beam Prediction in 6G Networks\n<\/strong><em>Ghanta Krishna, Kundrapu Supriya and Sanskar Singh (IIIT Naya Raipur, India); Sabur Baidya (University of Louisville, USA)\n<\/em><strong>\n<\/strong><\/li>\n \t<li><strong>An Experimental Study of Denial of Service Attacks on a 5G COTS Hardware\n<\/strong><em>Karim Baccar (INRIA, France); Abdelkader Lahmadi (University of Lorraine, France)<\/em><strong>\n<\/strong><\/li>\n<\/ul><\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">11:00 - 11:30\n<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\"><p class=\"has-inline-color has-vivid-cyan-blue-color\"><em><strong>COFFEE BREAK | Poster Session #1: AI based Methods for Cyber Security<\/strong><\/em><\/p><ul><li><strong>Security-Oriented Network Intent Placement Using Particle Swarm Optimization<br \/><\/strong><em>Marios Avgeris (Carleton University, Canada); Gabriel Landeau; Aris Leivadeas (\u00c9cole de Technologie Sup\u00e9rieure - \u00c9TS, Canada); Ioannis Lambadaris (Carleton University, Canada)<br \/><\/em><strong><br \/><\/strong><\/li><li><strong>A New Approach for Crypto Off-Loading Based on Personal HSM<br \/><\/strong><em>Pascal Urien (Telecom Paris, France)<br \/><\/em><strong><br \/><\/strong><\/li><li><strong>MCM-CASR: Novel Alert Correlation Framework for Cyber Attack Scenario<\/strong><br \/><strong>Reconstruction Based on NLP, NER, and Semantic Similarity<br \/><\/strong><em>Mouhamadou Lamine Diakhame (Gaston Berger University, Senegal); Cherif Diallo (Universite Gaston Berger &amp; SAMOVAR Research Lab, Senegal); Mohamed Mejri (Laval University, Canada)<\/em><strong><br \/><\/strong><\/li><\/ul><\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">11:30 - 12:30\n<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\"><p class=\"has-inline-color has-vivid-cyan-blue-color\"><b><i>Keynote&nbsp;#1: Toward Privacy-Preserving Aggregate Reverse Skyline Query with Strong Security<\/i><\/b><br><br>Speaker: Rongxing Lu (University of New Brunswick, Canada)<\/p><\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">12:30 - 14:00\n<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">Lunch Break<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">14:00 - 15:30\n<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\"><p class=\"has-inline-color has-vivid-cyan-blue-color\"><b><i>Session #2: Privacy<\/i><\/b><\/p>\n\n<ul>\n \t<li><strong>Privacy-Preserving Attribute-Based Access Control with Non-Monotonic Access <\/strong><strong>Structure<\/strong> <br\/>Maede Ashouri-Talouki <em>(University of Isfahan, Iran); Nafiseh Kahani and Masoud Barati (Carleton University, Canada)\n<\/em><strong>\n<\/strong><\/li><br\/>\n \t<li><strong>Employee Watcher: A Machine Learning-Based Hybrid Insider Threat Detection <\/strong><strong>Framework\n<\/strong><br\/><em>Usman Rauf and Zhiyuan Wei (Mercy College, USA); Fadi Mohsen (University of Groningen &amp; Information Systems Group, Bernoulli Institute for Mathematics, Computer Science and AI, The Netherlands)<\/em><\/li>\n<\/ul>\n&nbsp;\n<ul>\n \t<li><strong>Ariadne: A Privacy-Preserving Network Layer Protocol\n<\/strong><br\/><em>Antoine Fressancourt (Huawei Technologies France S.A.S.U, France); Luigi Iannone (Huawei, France)<\/em><strong>\n<\/strong><\/li>\n<\/ul><\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">15:30 - 16:00\n<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\"><p class=\"has-inline-color has-vivid-cyan-blue-color\"><em><strong>COFFEE BREAK | Poster Session #2: Deep Learning based Methods for Cyber Security<\/strong><\/em><\/p>\n\n<ul>\n\n \t<li><strong>A Benchmark of Graph Augmentations for Contrastive Learning-Based Network Attack Detection with Graph Neural Networks\n<\/strong><br\/><em>Tristan Bilot (Iriguard - Universit\u00e9 Paris-Saclay - ISEP Engineering School, France); Nour El Madhoun (ISEP Engineering School, France &amp; Sorbonne Universit\u00e9, LIP6, France); Khaldoun Al Agha (LRI, France); Anis Zouaoui(Iriguard, France)\n<\/em><strong>\n<\/strong>\n<\/li><br\/>\n\n \t<li><strong>A Generalizable Approach for Network Flow Image Representation for Deep Learning\n<\/strong><br\/><em>Stefan Machmeier, Manuel Trageser and Marcus Buchwald (Heidelberg University, Germany); Vincent Heuveline (Interdisciplinary Center for Scientific Computing, Germany)<\/em><strong>\n<\/strong><\/li><br\/>\n\n \t<li><strong>Vulnerability Assessment Based on Real World Exploitability for Prioritizing Patch Applications\n<\/strong><br\/><em>SeongSu Yoon, DoYeon Kim, GaGyeong Kim and IeckChae Euom (Chonnam National University, Korea (South))<\/em><\/li>\n<\/ul><\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">16:00 - 17:30\n<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\"><p class=\"has-inline-color has-vivid-cyan-blue-color\"><b><i>Session #3: Authentication and Web<\/i><\/b><\/p>\n\n<ul>\n \t<li><strong>Collection and Statistical Analysis of a Fixed-Text Keystroke Dynamics Authentication Data Set\n<\/strong><br\/><em>Halvor N Risto (University of South-Eastern Norway &amp; Indra Navia, Norway); Olaf Hallan Graven (University of South-Eastern Norway, Norway)\n<\/em><strong>\n<\/strong><\/li><br\/>\n \t<li><strong>Adaptive, Multi-Factor Authentication as a Service for Web Applications\n<\/strong><br\/><em>David Morais (University of Aveiro &amp; WIT SOFTWARE, Portugal); Andr\u00e9 Z\u00faquete (University of Aveiro, Dep. of Electronics, Telecommunications and Informatics &amp; IEETA, Portugal); Ant\u00f3nio Mendes (WIT SOFTWARE, Portugal)\n<\/em><strong>\n<\/strong><\/li><br\/>\n \t<li><strong>RanABD: Web Page Randomization for Advanced Web-Bot Detection\n<\/strong><br\/><em>Natalija Vlajic and Shadi Sadeghpour (York University, Canada)<\/em><\/li>\n<\/ul><\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t    <\/tbody>\n\t\t\t<\/table>\n\t\t<\/div>\n\t  \t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-efcd8bf programTitleTD eael-table-align-center eael-dt-th-align-left elementor-widget elementor-widget-eael-data-table\" data-id=\"efcd8bf\" data-element_type=\"widget\" data-widget_type=\"eael-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"eael-data-table-wrap\" data-table_id=\"efcd8bf\" id=\"eael-data-table-efcd8bf\" data-custom_responsive=\"false\">\n\t\t\t<table class=\"tablesorter eael-data-table center\" id=\"eael-data-table-efcd8bf\">\n\t\t\t    <thead>\n\t\t\t        <tr class=\"table-header\">\n\t\t\t\t\t\t\t\t\t            <th class=\"\" id=\"\" colspan=\"2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"data-table-header-text\">Day #2: October 17th, 2023<\/span><\/th>\n\t\t\t        \t\t\t\t        <\/tr>\n\t\t\t    <\/thead>\n\t\t\t  \t<tbody>\n\t\t\t\t\t\t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">9:30 - 11:00\n<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\"><p class=\"has-inline-color has-vivid-cyan-blue-color\"><b><i>Session #4: Machine Learning for Cyber Security<\/i><\/b><\/p>\n\n<ul>\n\n \t<li><strong>A Study on the Privacy Concerns of the Internet of Things\n<\/strong><br\/><em>Katie Zhang (Barnard College, USA); Yanjun Qian (Virginia Commonwealth University, USA); Vivian Motti (George Mason University, USA); Carol J Fung(Concordia University, Canada)<\/em><em>\n<\/em><strong>\n<\/strong><\/li><br\/>\n\n\n \t<li><strong>Real-Time Detection of Low-Rate DDoS Attacks in SDN-Based Networks Using Online Machine Learning Model\n<\/strong><br\/><em>Abdussalam Alashhab Alashhab (Universiti Teknologi PETRONAS, Malaysia)\n<\/em><\/li><br\/>\n\n \t<li><strong>A Systematic Literature Review of Machine Learning Approaches for In-Browser Cryptojacking Detection\n<\/strong><br\/><em>Otavio Kiyatake Nicesio (IPT - Institute for Technological Research of the State of S\u00e3o Paulo, Brazil); Adriano Galindo Leal (Institute for Technological Research of the S\u00e3o Paulo State, Brazil)<\/em><strong>\n<\/strong><\/li>\n<\/ul><\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">11:00 - 11:30\n<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\"><p class=\"has-inline-color has-vivid-cyan-blue-color\"><em><strong>COFFEE BREAK | Poster Session #3: Anomaly Detection<\/strong><\/em><\/p>\n\n<ul>\n \t<li><strong>Score-Based Unsupervised Anomaly Detection Using Graph Clustering and the Activity and Event Network Model\n<\/strong><br\/><em>Amir Mohammadi Bagha and Isaac Woungang (Toronto Metropolitan University, Canada); Issa Traore (University of Victoria, Canada)\n<\/em><strong>\n<\/strong><\/li><br\/>\n \t<li><strong>Towards Cluster-Based Split Federated Learning Approach for Continuous User Authentication\n<\/strong><br\/><em>Mohamad Wazzeh (\u00c9cole de Technologie Sup\u00e9rieure, Canada); Mohamad Arafeh (Ecole de Technologie Superieure, Canada); Hakima Ould-Slimane(Universit\u00e9 du Qu\u00e9bec \u00e0 Trois-Rivi\u00e8res, Canada); Chamseddine Talhi (Ecole de Technologie Superieure, Canada); Azzam Mourad (Lebanese American University, Lebanon); Hadi Otrok (Khalifa University, United Arab Emirates &amp; Concordia University, Canada)\n<\/em><strong>\n<\/strong><\/li><br\/>\n \t<li><strong>Feature Engineering for Injection Attack Detection: An Exploration from SQLI to XSS\n<\/strong><br\/><em>Alexander Loginov, Nur Zincir-Heywood and M. I. Heywood (Dalhousie University, Canada)<\/em><strong>\n<\/strong><\/li>\n<\/ul><\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">11:30 - 12:30\n<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\"><p class=\"has-inline-color has-vivid-cyan-blue-color\"><b><i>Keynote&nbsp;#2: Privacy options for central bank digital currencies (CBDCs)<\/i><\/b><br><br>Speaker: Jeremy Clark (Concordia University, Canada)<\/p><\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">12:30 - 14:00\n<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">Lunch Break<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">14:00 - 15:30\n<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\"><p class=\"has-inline-color has-vivid-cyan-blue-color\"><b><i>Session #5: Access Control<\/i><\/b><\/p>\n\n<ul>\n \t<li><strong>Incremental Threshold Scheme Enabled IoT Group Key Management\n<\/strong><br\/><em>Mingyan Li, Samuel C Hollifield and Michael D Iannacone (Oak Ridge National Laboratory, USA)<\/em><\/li><br\/>\n \t<li><strong>Implementing the Principle of Least Privilege Using Linux Capabilities: Challenges and Perspectives\n<\/strong><br\/><em>Eddie Billoir (Universit\u00e9 Toulouse III Paul Sabatier, IRIT &amp; Airbus Protect, France); Romain Laborde (Universit\u00e9 Toulouse III, Paul Sabatier &amp; IRIT, France); Ahmad Samer Wazan (Zayed University, United Arab Emirates); Yves R\u00fctschl\u00e9(Airbus Protect, France); Abdelmalek Benzekri (Paul Sabatier University, France)\n<\/em><strong>\n<\/strong><\/li><br\/>\n \t<li><strong>Protect the Gate - Not Only Once: Continuous Access Evaluation in Practice\n<\/strong><br\/><em>Tobias Hilbig and Vitali Serzantov (Munich University of Applied Sciences, Germany); Thomas Schreck (University of Applied Science Munich, Germany)<\/em><strong>\n<\/strong><\/li>\n<\/ul><\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">15:30 - 16:00\n<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\"><p class=\"has-inline-color has-vivid-cyan-blue-color\"><em><strong>COFFEE BREAK | Poster Session #4: Privacy<\/strong><\/em><\/p>\n\n<ul>\n \t<li><strong>Efficient Privacy-Preserving ML for IoT: Cluster-Based Split Federated Learning<\/strong>\n<strong>Scheme for Non-IID Data\n<\/strong><br\/><em>Mohamad Arafeh (Ecole de Technologie Superieure, Canada); Mohamad Wazzeh (\u00c9cole de Technologie Sup\u00e9rieure, Canada); Hakima Ould-Slimane(Universit\u00e9 du Qu\u00e9bec \u00e0 Trois-Rivi\u00e8res, Canada); Chamseddine Talhi (Ecole de Technologie Superieure, Canada); Azzam Mourad (Lebanese American University, Lebanon); Hadi Otrok (Khalifa University, United Arab Emirates &amp; Concordia University, Canada)\n<\/em><\/li><br\/>\n \t<li><strong>Regulatory Compliance Verification: A Privacy Preserving Approach\n<\/strong><br\/><em>Mohammed B. M. Kamel (Furtwangen University, Germany &amp; Eotvos Lorand University, Hungary); Massimo Morello (European Central Bank, Germany); Petri Sainio (University of Turku, Finland)<\/em>&nbsp;<\/li><br\/>\n \t<li><strong>Private Identity-Related Attribute Verification Protocol Using SoulBound Tokens and Zero-Knowledge Proofs\n<\/strong><br\/><em>Miquel \u00c0ngel Cabot-Nadal (University of the Balearic Islands, Spain); Brendan Playford (Masa Finance, USA); Mar\u00eda Magdalena Payeras-Capell\u00e0 (Universidad de las Islas Baleares, Spain); Sebastian Gerske (Masa Finance, USA); Maci\u00e0 Mut-Puigserver (Universitat de les Illes Balears, Spain); Rosa Pericas Gornals(University of the Balearic Islands, Spain)<\/em><strong>\n<\/strong><\/li>\n<\/ul><\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">16:00 - 17:30\n<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\"><p class=\"has-inline-color has-vivid-cyan-blue-color\"><b><i>Session #6: Inference and Deception for Cyber Security<\/i><\/b><\/p>\n\n<ul>\n \t<li><strong>Inferring the Confidence Level of BGP-Based Distributed Intrusion Detection Systems Alarms\n<\/strong><br\/><em>Renato Souza Silva, Felipe M. F. de Assis, Evandro Luiz Cardoso Macedo and Luis Felipe M. de Moraes (Federal University of Rio de Janeiro (UFRJ), Brazil)<\/em>&nbsp;<\/li><br\/>\n \t<li><strong>Mirage: Cyber Deception Against Autonomous Cyber Attacks\n<\/strong><em>Michael B Kouremetis, Ron Alford and Dean Lawrence (MITRE Corporation, USA)<\/em>&nbsp;<\/li><br\/>\n \t<li><strong>Stealthy Attacks on Multi-Agent Reinforcement Learning in Mobile Cyber-Physical Systems\n<\/strong><br\/><em>Sarra Alqahtani (University of Tulsa, USA); Talal Halabi (Laval University, Canada)<\/em><strong>\n<\/strong><\/li>\n<\/ul><\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">18:00 - 22:30\n<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\"><p class=\"has-inline-color has-vivid-cyan-blue-color\">Gala Diner at <em><strong>Gibbys <\/strong><\/em>located at \"<em>298 Pl. d'Youville, Montr\u00e9al, QC H2Y 2B6<\/em>\"<\/p><\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t    <\/tbody>\n\t\t\t<\/table>\n\t\t<\/div>\n\t  \t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5391e60 programTitleTD eael-table-align-center eael-dt-th-align-left elementor-widget elementor-widget-eael-data-table\" data-id=\"5391e60\" data-element_type=\"widget\" data-widget_type=\"eael-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"eael-data-table-wrap\" data-table_id=\"5391e60\" id=\"eael-data-table-5391e60\" data-custom_responsive=\"false\">\n\t\t\t<table class=\"tablesorter eael-data-table center\" id=\"eael-data-table-5391e60\">\n\t\t\t    <thead>\n\t\t\t        <tr class=\"table-header\">\n\t\t\t\t\t\t\t\t\t            <th class=\"\" id=\"\" colspan=\"2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"data-table-header-text\">Day #3: October 18th, 2023<\/span><\/th>\n\t\t\t        \t\t\t\t        <\/tr>\n\t\t\t    <\/thead>\n\t\t\t  \t<tbody>\n\t\t\t\t\t\t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">9:30 - 11:00\n<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\"><p class=\"has-inline-color has-vivid-cyan-blue-color\"><b><i>Session #7: Graph based Methods for Cyber Security<\/i><\/b><\/p><ul><li><strong>Graph-Based Attack Path Discovery for Network Security<br \/><\/strong><em>Qiaoran Meng and Huilin Wang (National University of Singapore, Singapore); Nay Oo (NCS Cyber Special Ops-R&amp;D, Singapore); Hoon Wei Lim (NCS Cyber Special Ops - R&amp;D, Singapore); Benedikt J Sch\u00e4tz and Biplab Sikdar (National University of Singapore, Singapore)<\/em><strong><br \/><br \/><\/strong><\/li><li><strong>Towards Anomaly Detection Using Multiple Instances of Micro-Cluster Detection<br \/><\/strong><em>Rafael N Copstein (Dalhousie University, Canada); Bradley Niblett and Andrew Johnston (2Keys Corporation - An Interac Company, Canada); Jeff Schwartzentruber, M. I. Heywood and Nur Zincir-Heywood (Dalhousie University, Canada)<\/em><br \/><strong><br \/><\/strong><\/li><li><strong>Unveiling Stealth Attack Paths in Windows Environments Using AWARE<br \/><\/strong><em>Manuel Poisson (CentraleSup\u00e9lec Rennes &amp; Amossys, France); Val\u00e9rie Viet Triem Tong (Inria - CentraleSupelec, France); Gilles Guette (University of Rennes 1, France); Erwan Abgrall (Irisa, France); Fr\u00e9d\u00e9ric Guihery and Damien Cremilleux (Amossys, France)<\/em><strong><br \/><\/strong><\/li><\/ul><\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">11:00 - 11:30\n<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\"><p class=\"has-inline-color has-vivid-cyan-blue-color\"><em><strong>COFFEE BREAK | Poster Session #5: IoT Cyber Security<\/strong><\/em><\/p>\n\n<ul>\n \t<li><strong>A Blockchain-Enabled IoT Framework for NICU\nInfant Health Monitoring System<\/strong><br><i>R Madhusudhan (National Institute of Technology Karnataka, India); Pravisha P (NITK, India)<\/i><\/li><br>\n \t<li><strong>DDoS Attack Detection in IoT Using Ensemble Learning\n<\/strong><br><em>Fariba Laiq (Institute of Management Sciences Peshawar, Pakistan); Feras Al-Obeidat (Zayed University, United Arab Emirates); Adnan Amin (Institute of Management Sciences, Peshawar, Hayatabad Pakistan, Pakistan); Fernando Moreira (REMIT IJP Universidade Portucalense Porto Portugal, Portugal)<\/em><\/li><br>\n \t<li><strong>Smart Home IoT Communication Protocols and Advances in Their Security and Interoperability\n<\/strong><em>Ismael Holguin and Sai Mounika Errapotu (University of Texas at El Paso, USA)<\/em><strong>\n<\/strong><\/li>\n<\/ul><\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">11:30 - 12:30\n<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\"><p class=\"has-inline-color has-vivid-cyan-blue-color\"><b><i>Keynote&nbsp;#3: AI-Powered, Cyberdeceptive Networks<\/i><\/b><br><br>Speaker: Kevin Hamlen\n(University of Texas Dallas, USA)<\/p><\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">12:30 - 14:00\n<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">Lunch Break<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">14:00 - 15:30\n<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\"><p class=\"has-inline-color has-vivid-cyan-blue-color\"><b><i>Session #8: Language Model based Methods for Cyber Security<\/i><\/b><\/p><ul><li><strong>Rejectable SoulBound Tokens for Credentials Assignment and Acceptance of Terms<br \/><\/strong><em>Rosa Peric\u00e0s-Gornals (University of the Balearic Islands, Spain); Maci\u00e0 Mut-Puigserver (Universitat de les Illes Balears, Spain); Mar\u00eda Magdalena Payeras-Capell\u00e0 (Universidad de las Islas Baleares, Spain); Miquel \u00c0ngel Cabot-Nadal(University of the Balearic Islands, Spain); Jaume Ramis-Bibiloni (Universitat de les Illes Balears &amp; Health Research Institute of the Balearic Islands (IdISBa), Spain)<\/em><strong><br \/><br \/><\/strong><\/li><li><strong>Exploring Semantic vs. Syntactic Features for Unsupervised Learning on Application Log Files<br \/><\/strong><em>Egil Alexander Thomas Karlsen and Rafael N Copstein (Dalhousie University, Canada); Xiao Luo (IUPUI, USA); Jeff Schwartzentruber (Dalhousie University, Canada); Bradley Niblett and Andrew Johnston (2Keys Corporation - An Interac Company, Canada); M. I. Heywood and Nur Zincir-Heywood (Dalhousie University, Canada)<\/em><strong><br \/><br \/><\/strong><\/li><li><strong>NESec: A Modified-UI Honeyword Generation Strategy for Mitigating Targeted Guessing Attacks<br \/><\/strong><em>Nilesh Chakraborty (Queen's University, Canada); Mohammad Shojafar(University of Surrey, United Kingdom (Great Britain)); Zhuangzhuang Chen(Shenzhen University, China); Victor C.M. Leung (Shenzhen University, China &amp; The University of British Columbia, Canada); Jianqiang Li (Shenzhen University, China); Mohammad Zulkernine (Queen's University, Canada)<\/em><strong><br \/><\/strong><\/li><\/ul><\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">15:30 - 16:00\n<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\"><p class=\"has-inline-color has-vivid-cyan-blue-color\"><em><strong>COFFEE BREAK | Poster Session #6: Cyber Security for Different Sectors<\/strong><\/em><\/p><ul><li><strong>A Tree-Mapped Taxonomy of Blockchain Attacks<br \/><\/strong><em>Emma Lubes and Justin Pelletier (Rochester Institute of Technology, USA)<br \/><\/em><strong><br \/><\/strong><\/li><li><strong>An Energy-Efficient Multiple-Factor Authentication Protocol for Critical Infrastructure IoT Systems<br \/><\/strong><em>Mohammad Rasool Momeni, Abdollah Jabbari and Carol J Fung (Concordia University, Canada)<br \/><\/em><strong><br \/><\/strong><\/li><\/ul><\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">16:00 - 17:00\n<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\"><p class=\"has-inline-color has-vivid-cyan-blue-color\"><b><i>Keynote&nbsp;#4: A new research landscape for 6G cybersecurity in Europe<\/i><\/b><br><br>Speaker: Rui L. Aguiar (University of Aveiro, Portugal)<\/p><\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">17:30<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">Closing Conference &amp; Awards<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t    <\/tbody>\n\t\t\t<\/table>\n\t\t<\/div>\n\t  \t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>CSNet 2023 Program The current program &hellip; <a href=\"https:\/\/csnet-conference.org\/2023\/program\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Program - CSNet 2023<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/csnet-conference.org\/2023\/program\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Program - CSNet 2023\" \/>\n<meta property=\"og:description\" content=\"CSNet 2023 Program The current program &hellip; Continue reading &rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/csnet-conference.org\/2023\/program\/\" \/>\n<meta property=\"og:site_name\" content=\"CSNet 2023\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-12T07:27:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/csnet-conference.org\/2023\/wp-content\/uploads\/2023\/10\/CSNet_23_program_at_glance_2.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@dnac_conference\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/csnet-conference.org\/2023\/program\/\",\"url\":\"https:\/\/csnet-conference.org\/2023\/program\/\",\"name\":\"Program - CSNet 2023\",\"isPartOf\":{\"@id\":\"https:\/\/csnet-conference.org\/2023\/#website\"},\"datePublished\":\"2023-09-09T15:25:22+00:00\",\"dateModified\":\"2023-10-12T07:27:16+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/csnet-conference.org\/2023\/program\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/csnet-conference.org\/2023\/program\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/csnet-conference.org\/2023\/program\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/csnet-conference.org\/2023\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Program\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/csnet-conference.org\/2023\/#website\",\"url\":\"https:\/\/csnet-conference.org\/2023\/\",\"name\":\"CSNet 2023\",\"description\":\"7th Cyber Security in Networking Conference\",\"publisher\":{\"@id\":\"https:\/\/csnet-conference.org\/2023\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/csnet-conference.org\/2023\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/csnet-conference.org\/2023\/#organization\",\"name\":\"DNAC\",\"alternateName\":\"De Nouvelles Architectures pour les Communications\",\"url\":\"https:\/\/csnet-conference.org\/2023\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/csnet-conference.org\/2023\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/csnet-conference.org\/2023\/wp-content\/uploads\/2022\/11\/Logo_DNAC_Haut_Res-768x303-1.png\",\"contentUrl\":\"https:\/\/csnet-conference.org\/2023\/wp-content\/uploads\/2022\/11\/Logo_DNAC_Haut_Res-768x303-1.png\",\"width\":768,\"height\":303,\"caption\":\"DNAC\"},\"image\":{\"@id\":\"https:\/\/csnet-conference.org\/2023\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/twitter.com\/dnac_conference\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Program - CSNet 2023","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/csnet-conference.org\/2023\/program\/","og_locale":"en_US","og_type":"article","og_title":"Program - CSNet 2023","og_description":"CSNet 2023 Program The current program &hellip; Continue reading &rarr;","og_url":"https:\/\/csnet-conference.org\/2023\/program\/","og_site_name":"CSNet 2023","article_modified_time":"2023-10-12T07:27:16+00:00","og_image":[{"url":"https:\/\/csnet-conference.org\/2023\/wp-content\/uploads\/2023\/10\/CSNet_23_program_at_glance_2.jpg"}],"twitter_card":"summary_large_image","twitter_site":"@dnac_conference","twitter_misc":{"Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/csnet-conference.org\/2023\/program\/","url":"https:\/\/csnet-conference.org\/2023\/program\/","name":"Program - CSNet 2023","isPartOf":{"@id":"https:\/\/csnet-conference.org\/2023\/#website"},"datePublished":"2023-09-09T15:25:22+00:00","dateModified":"2023-10-12T07:27:16+00:00","breadcrumb":{"@id":"https:\/\/csnet-conference.org\/2023\/program\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/csnet-conference.org\/2023\/program\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/csnet-conference.org\/2023\/program\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/csnet-conference.org\/2023\/"},{"@type":"ListItem","position":2,"name":"Program"}]},{"@type":"WebSite","@id":"https:\/\/csnet-conference.org\/2023\/#website","url":"https:\/\/csnet-conference.org\/2023\/","name":"CSNet 2023","description":"7th Cyber Security in Networking Conference","publisher":{"@id":"https:\/\/csnet-conference.org\/2023\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/csnet-conference.org\/2023\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/csnet-conference.org\/2023\/#organization","name":"DNAC","alternateName":"De Nouvelles Architectures pour les Communications","url":"https:\/\/csnet-conference.org\/2023\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/csnet-conference.org\/2023\/#\/schema\/logo\/image\/","url":"https:\/\/csnet-conference.org\/2023\/wp-content\/uploads\/2022\/11\/Logo_DNAC_Haut_Res-768x303-1.png","contentUrl":"https:\/\/csnet-conference.org\/2023\/wp-content\/uploads\/2022\/11\/Logo_DNAC_Haut_Res-768x303-1.png","width":768,"height":303,"caption":"DNAC"},"image":{"@id":"https:\/\/csnet-conference.org\/2023\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/twitter.com\/dnac_conference"]}]}},"_links":{"self":[{"href":"https:\/\/csnet-conference.org\/2023\/wp-json\/wp\/v2\/pages\/363"}],"collection":[{"href":"https:\/\/csnet-conference.org\/2023\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/csnet-conference.org\/2023\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/csnet-conference.org\/2023\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/csnet-conference.org\/2023\/wp-json\/wp\/v2\/comments?post=363"}],"version-history":[{"count":131,"href":"https:\/\/csnet-conference.org\/2023\/wp-json\/wp\/v2\/pages\/363\/revisions"}],"predecessor-version":[{"id":553,"href":"https:\/\/csnet-conference.org\/2023\/wp-json\/wp\/v2\/pages\/363\/revisions\/553"}],"wp:attachment":[{"href":"https:\/\/csnet-conference.org\/2023\/wp-json\/wp\/v2\/media?parent=363"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}