Program at a Glance
Provisional Program subject to changes
Timing used is CET/UTC+1h
Day 1 – Wednesday, December 4 |
|
Time |
Event |
08:30 – 09:15 |
Registration |
09:15 – 09:30 |
Opening Conference |
9:30 – 10:45 |
Technical Session #1:Innovative Security Solutions for IoT and Cyber-Physical Systems A Robust Anonymous Authentication Scheme for Securing IoT-Enabled Healthcare Services
Systems Optimising Intrusion Detection in Cyber-Physical Systems Advanced Anomaly Detection in Energy Control Systems Using Machine Learning and Feature Engineering |
10:45 – 11:15 |
Coffee break |
11:15 – 12:30 |
Short papers Session #1: Innovations in Intrusion Detection and Threat Mitigation Dynamic Defense Framework: A Unified Approach for Intrusion Detection and Mitigation in SDN Introspective Intrusion Detection System Through Explainable AI Lightweight Machine Learning-Based IDS for IoT Environments Effective Anomaly Detectionin 5G Networks via Transformer-Based Modelsand Contrastive Learning A Machine Learning-Based Model for Exhaustion Attacks in Wireless Sensor Networks |
12:30 – 13:30 |
Lunch break |
13:30 – 14:30 |
Keynote #1: AI-native 6G networks: security needs |
14:30 – 15:00 |
Coffee break |
15:00 – 16:55 |
Technical Session #2: Blockchain & AI Innovations in Security and Privacy Blockchain-Enabled Digital Product Passports for Enhancing Security and Lifecycle Management in Healthcare Devices Blockchain-Enhanced E-Ticket Distribution System to Effective Transactions, Validation, and Audits Blockchain-Enabled Collaborative Forged Message Detection in RSU-Based VANETs SDN-API-Sec: A Conflict-Free BC-Based Authorization for Cross-Domain SDNs Keystroke Dynamics Authentication with MLP, CNN, and LSTM on a Fixed-Text Data Set |
17:00 |
Welcome Reception |
Day 2 – Thursday, December 5 |
|
Time |
Event |
08:45 – 09:00 |
Registration |
9:00 – 10:40 |
Technical Session #3:AI Detection and Defense Techniques for Emerging Threats Detecting DNS Tunnelling and Data Exfiltration Using Dynamic Time Warping Chat or Trap? Detecting Scams in Messaging Applications with Large Language Models Ransomwise: A Transaction-Based Dataset for Ransomware Bitcoin Wallet Detection VishGuard: Defending Against Vishing |
10:40 – 11:00 |
Coffee break |
11:00 – 12:15 |
Short papers Session #2: Machine Learning and AI for Cybersecurity Spam No More: A Cross-Model Analysis of Machine Learning Techniques and Large Language Model Efficacies Predicting User Activities and Device Interactions Using Adversarial Sensor Data: A Machine Learning Approach Anticipating Cyber Threats: Deep Learning Approaches for DDoS Attacks Forecasting Identifying APT Attack Stages Using Anomaly Score Calibration Convergence of AI for Secure Software Development |
12:15 – 13:30 |
Lunch break / Posters Session #1 A Multi-Level Network Traffic Classification in Combating Cyberattacks Using Stack Deep Learning Models Password Classification Using Machine Learning and Natural Language Processing Techniques: Methods and Evaluations Detecting Spam Emails Using Machine Learning and Lemmatization Vs Traditional Methods A Machine Learning Approach of Predicting Ransomware Addresses in BlockChain Networks Towards an Unsupervised Reward Function for a Deep Reinforcement Learning Based Intrusion Detection System |
13:30 – 14:30 |
Keynote #2: Self-sovereign Identity: a solid technology that meets the requirements of national digital identity management systems |
14:30 – 16:10 |
Technical Session #4: Cyber Threat Intelligence and Defense Strategies A New Generation of Security for the 6G AsIf: Asset Interface Analysis of Industrial Automation Devices An Efficient Explainable Artificial Intelligence (XAI)-Based Framework for a Robust and Explain- able IDS FASIL: A Challenge-Based Framework for Secure and Privacy-Preserving Federated Learning |
16:10 – 16:40 |
Coffee break |
16:40 – 18:00 |
Technical Session #5: Novel AI Approaches to Cybersecurity Challenges APT Warfare: Technical Arsenal and Target Profiles of Linux Malware in Advanced Persistent Threats Security and Privacy-Preserving for Machine Learning Models: Attacks, Countermeasures, and Future Directions DID U Misbehave? A New Dataset for In-Depth Understanding of Inconspicuous Software |
19:00 |
Conference Dinner |
Day 3 – Friday, December 6 |
|
Time |
Event |
08:45 – 09:15 |
Registration |
9:15 – 10:30 |
Technical Session #6:Emerging Threats and AI Detection Techniques Towards Identification of Network Applications in Encrypted Traffic
An Autonomic Chess Bot Detection and Defeat System A Hybrid Machine Learning – Fuzzy Cognitive Map Approach for Fast, Reliable DDoS Attack Detection |
10:30 – 11:00 |
Coffee break |
11:00 – 12:30 |
Short papers Session #3: Security in Distributed and IoT Environments Kubernetes-Driven Network Security for Distributed ACL Management Towards the Removal of Identification and Authentication Authority from IM Systems Pirates of the MQTT: Raiding IIoT Systems with a Rogue Client A New Similarity-Based Classification Scheme of Drone Network Attacks Blockchain and Biometric Systems Integration for IoMT Security Regulatory Compliance Verification: A Privacy Preserving Approach |
12:30 – 13:30 |
Lunch break / Posters Session #2 A Situational Assessment Module for CCAM Applications Adaptive Optimization of TLS Overhead for Wireless Communication in Critical Infrastructure Interdisciplinary Research Project ‘AI Shield’ Mobbing: AI-Powered Cyberthreat Behavior Analysis and Modeling |
13:30 – 14:30 |
Keynote #3: AI for biometrics |
14:30 – 16:10 |
Technical Session #7: Advances in Machine Learning for Cybersecurity Cross ML for Io(H)T Network Traffic Classification: A New Approach Towards Standardization Advanced Smart Contract Vulnerability Detection Using Large Language Models Advanced Machine Learning Approaches for Zero-Day Attack Detection: A Review AI Security: Cyber Threats and Threat-Informed Defense |
16:10 – 16:20 |
Closing Conference & Awards |