{"id":229,"date":"2024-10-30T13:57:05","date_gmt":"2024-10-30T13:57:05","guid":{"rendered":"https:\/\/csnet-conference.org\/2024\/?page_id=229"},"modified":"2024-12-03T18:02:28","modified_gmt":"2024-12-03T18:02:28","slug":"program","status":"publish","type":"page","link":"https:\/\/csnet-conference.org\/2024\/program\/","title":{"rendered":"Program"},"content":{"rendered":"\n<h2 class=\"wp-block-heading has-text-align-center\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Program at a Glance<\/mark><\/h2>\n\n\n\n<p class=\"has-text-align-center\"><strong><em>Provisional Program subject to changes<\/em><\/strong><br><strong><em>Timing used is&nbsp;CET\/UTC+1h<\/em><\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong><a href=\"https:\/\/csnet-conference.org\/2024\/wp-content\/uploads\/2024\/12\/CSNet2024_Program_V3.pdf\">PDF Program<\/a><\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"839\" src=\"https:\/\/csnet-conference.org\/2024\/wp-content\/uploads\/2024\/12\/program_v21-1024x839.png\" alt=\"\" class=\"wp-image-382\" srcset=\"https:\/\/csnet-conference.org\/2024\/wp-content\/uploads\/2024\/12\/program_v21-1024x839.png 1024w, https:\/\/csnet-conference.org\/2024\/wp-content\/uploads\/2024\/12\/program_v21-300x246.png 300w, https:\/\/csnet-conference.org\/2024\/wp-content\/uploads\/2024\/12\/program_v21-768x629.png 768w, https:\/\/csnet-conference.org\/2024\/wp-content\/uploads\/2024\/12\/program_v21.png 1267w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div id=\"program\" class=\"frame\">\n  <table width=\"100%\">\n    <tbody>\n      <tr>\n        <td class=\"programTitleTD\" colspan=\"2\" width=\"100%\">\n          <h3 class=\"programTitleH3\"><strong>Day 1 &#8211; Wednesday, December 4<\/strong><\/h3>\n        <\/td>\n      <\/tr>\n      <tr>\n        <td width=\"20%\">\n          <p><strong>Time<\/strong><\/p>\n        <\/td>\n        <td width=\"80%\">\n          <p><strong>Event<\/strong><\/p>\n        <\/td>\n      <\/tr>\n      <tr>\n        <td width=\"20%\">\n          <p>08:30 &#8211; 09:15<\/p>\n        <\/td>\n        <td width=\"80%\">\n          <p>Registration<\/p>\n        <\/td>\n      <\/tr>\n      <tr>\n        <td width=\"20%\">\n          <p>09:15 &#8211; 09:30<\/p>\n        <\/td>\n        <td width=\"80%\">\n          <p>\n            <span style=\"color: #3366ff;\"><strong>Opening Conference<\/strong><\/span><br>\n          <\/p>\n        <\/td>\n      <\/tr>\n      <tr>\n        <td width=\"20%\">\n          <p>9:30 &#8211; 10:45<\/p>\n        <\/td>\n        <td width=\"80%\">\n          <p>\n            <span style=\"color: #3366ff;\"><strong>Technical Session #1:Innovative Security Solutions for IoT and Cyber-Physical Systems <\/strong><\/span><br>\n            <strong>Session Chair:<\/strong><em> Ola Salman, DeepVu, USA <\/em>\n          <\/p>\n          <p><strong>A Robust Anonymous Authentication Scheme for Securing IoT-Enabled Healthcare Services\n              Systems<\/strong><br><em>Sana Ullah and Akhtar Badshah (University of Malakand, Pakistan); Muhammad Waqas (School of Computing and Mathematical Sciences, University of Greenwich, United Kingdom (Great Britain) &#038; Edith Cowan University, Australia); Shanshan Tu (Beijing University of Technology, China)<\/em><\/p>\n\n          <p><strong>Optimising Intrusion Detection in Cyber-Physical Systems<\/strong><br><em>Henry C Ukwuoma (IMT Mines Ales, France); Gilles Dusserre (Ecole des Mines D&#8217;Ales, France); Gouenou Coatrieux and Johanne Vincent (IMT Atlantique, France); Nasir Baba Ahmed (Ecole des Mines D&#8217;Ales &#038; Baze University Abuja, France)<\/em><\/p>\n\n          <p><strong>Advanced Anomaly Detection in Energy Control Systems Using Machine Learning and Feature Engineering<\/strong><br><em>Zaid El Allal (Universit\u00e9 Savoie Mont Blanc, France); Hassan Noura (University of Franche-Comt\u00e9 &#038; Institut FEMTO-ST, France); Ola Salman and Ali Chehab (American University of Beirut, Lebanon)<\/em><\/p>\n        <\/td>\n      <\/tr>\n      <tr>\n        <td width=\"20%\">\n          <p>10:45 &#8211; 11:15<\/p>\n        <\/td>\n        <td width=\"80%\">\n          <p><strong>Coffee break<\/strong><\/p>\n        <\/td>\n      <\/tr>\n      <tr>\n        <td width=\"20%\">\n          <p>11:15 &#8211; 12:30<\/p>\n        <\/td>\n        <td width=\"80%\">\n          <p>\n            <span style=\"color: #3366ff;\"><strong>Short papers Session #1: Innovations in Intrusion Detection and Threat Mitigation <\/strong><\/span><br>\n            <strong>Session Chair:<\/strong><em> Hassan Noura, University of Franche-Comt\u00e9, France<\/em>\n          <\/p>\n          <p><strong>Dynamic Defense Framework: A Unified Approach for Intrusion Detection and Mitigation in SDN<\/strong><br><em>Walid El Gadal and Sudhakar Ganti (University of Victoria, Canada)<\/em>\n          <\/p>\n\n          <p><strong>Introspective Intrusion Detection System Through Explainable AI<\/strong><br><em>Bet\u00fcl G\u00fcven\u00e7 Paltun (Ericsson, Turkey); Ramin Fuladi (Ericsson &#038; Bo\u011fazi\u00e7i, Turkey)<\/em><\/p>\n\n          <p><strong>Lightweight Machine Learning-Based IDS for IoT Environments<\/strong><br><em>Zakaria M Alomari (New York Institute of Technology &#8211; Vancouver Campus, Canada); Adetokunbo Makanju and Zhida Li (New York Institute of Technology, Canada)<\/em><\/p>\n\n          <p><strong>Effective Anomaly Detectionin 5G Networks via Transformer-Based Modelsand Contrastive Learning<\/strong><br><em>Saeid Sheikhi and Panos Kostakos (University of Oulu, Finland); Susanna Pirttikangas (University of oulu, Finland)<\/em><\/p>\n\n          <p><strong>A Machine Learning-Based Model for Exhaustion Attacks in Wireless Sensor Networks<\/strong><br><em>Wejdan K Alghamdi (Albaha University, Saudi Arabia)<\/em><\/p>\n<\/td>\n      <\/tr>\n      <tr>\n        <td width=\"20%\">\n          <p>12:30 &#8211; 13:30<\/p>\n        <\/td>\n        <td width=\"80%\">\n          <p><strong>Lunch break<\/strong><\/p>\n<\/td>\n      <\/tr>\n      <tr>\n        <td width=\"20%\">\n          <p>13:30 &#8211; 14:30<\/p>\n        <\/td>\n        <td width=\"80%\">\n          <p>\n            <span style=\"color: #3366ff;\"><strong>Keynote #1: AI-native 6G networks: security needs<\/strong><\/span><br>\n            <strong>Speaker: Dhouha Ayed &#038; Katarzyna Kapusta, Thales, France <\/strong><em> <\/em><br \/>\n            <strong>Session Chair:<\/strong><em> Hassan Noura, University of Franche-Comt\u00e9, France<\/em>\n          <\/p>\n <\/td>\n      <\/tr>\n      <tr>\n        <td width=\"20%\">\n          <p>14:30 &#8211; 15:00<\/p>\n        <\/td>\n        <td width=\"80%\">\n          <p><strong>Coffee break<\/strong><\/p>\n        <\/td>\n      <\/tr>\n      <tr>\n<td width=\"20%\">\n          <p>15:00 &#8211; 16:55<\/p>\n        <\/td>\n        <td width=\"80%\">\n          <p>\n            <span style=\"color: #3366ff;\"><strong>Technical Session #2:  Blockchain &#038; AI Innovations in Security and Privacy <\/strong><\/span><br>\n            <strong>Session Chair:<\/strong><em> Maurras Togbe, ISEP, France<\/em>\n          <\/p>\n          <p><strong> Blockchain-Enabled Digital Product Passports for Enhancing Security and Lifecycle Management in Healthcare Devices<\/strong><br><em>Fatemeh Stodt (University of Strasburg &#038; Furtwangen University, Germany)<\/em><\/p>\n          <p><strong> Blockchain-Enhanced E-Ticket Distribution System to Effective Transactions, Validation, and Audits<\/strong><br><em>Adrian Guayasamin; Walter Fuertes; Nahir Carrera (Universidad de Las Fuerzas Armadas ESPE, Ecuador); Luis Tello-Oquendo (Universidad Nacional de Chimborazo, Ecuador); Valeria Suango (Universidad Central del Ecuador, Ecuador)<\/em><\/p>\n <p><strong> Blockchain-Enabled Collaborative Forged Message Detection in RSU-Based VANETs<\/strong><br><em>Ali Jalooli (California State University, Dominguez Hills, USA); Huzaif Khan and Lokesh Purohit (California State University Dominguez Hills, USA)<\/em><\/p>\n<p><strong> SDN-API-Sec: A Conflict-Free BC-Based Authorization for Cross-Domain SDNs<\/strong><br><em>Majd Latah and Kubra Kalkan (Ozyegin University, Turkey)<\/em><\/p>\n\n<p><strong> Keystroke Dynamics Authentication with MLP, CNN, and LSTM on a Fixed-Text Data Set<\/strong><br><em>Halvor N Risto (University of South-Eastern Norway &#038; Indra Navia, Norway); Olaf Hallan Graven and Steven Bos (University of South-Eastern Norway, Norway)<\/em><\/p>\n<\/td>\n      <\/tr>\n      <tr>\n        <td width=\"20%\">\n          <p>17:00<\/p>\n        <\/td>\n        <td width=\"80%\">\n          <p><strong>Welcome Reception<\/strong><\/p>\n        <\/td>\n      <\/tr>\n    <\/tbody>\n  <\/table>\n<\/div>\n\n\n\n<div id=\"program\" class=\"frame\">\n  <table width=\"100%\">\n    <tbody>\n      <tr>\n        <td class=\"programTitleTD\" colspan=\"2\" width=\"100%\">\n          <h3 class=\"programTitleH3\"><strong>Day 2 &#8211; Thursday, December 5<\/strong><\/h3>\n        <\/td>\n      <\/tr>\n      <tr>\n        <td width=\"20%\">\n          <p><strong>Time<\/strong><\/p>\n        <\/td>\n        <td width=\"80%\">\n          <p><strong>Event<\/strong><\/p>\n        <\/td>\n      <\/tr>\n      <tr>\n        <td width=\"20%\">\n          <p>08:45 &#8211; 09:00<\/p>\n        <\/td>\n        <td width=\"80%\">\n          <p>Registration<\/p>\n        <\/td>\n      <\/tr>\n      <tr>\n        <td width=\"20%\">\n          <p>9:00 &#8211; 10:40<\/p>\n        <\/td>\n        <td width=\"80%\">\n          <p>\n            <span style=\"color: #3366ff;\"><strong>Technical Session #3:AI Detection and Defense Techniques for Emerging Threats<\/strong><\/span><br>\n            <strong>Session Chair:<\/strong><em> Ola Salman, DeepVu, USA<\/em>\n          <\/p>\n          <p><strong>Detecting DNS Tunnelling and Data Exfiltration Using Dynamic Time Warping<\/strong><br><em>Stefan Machmeier (Heidelberg University, Germany &#038; Heidelberg Institute for Theoretical Studies, Germany); Vincent Heuveline (Interdisciplinary Center for Scientific Computing, Germany)<\/em><\/p>\n\n          <p><strong>Chat or Trap? Detecting Scams in Messaging Applications with Large Language Models<\/strong><br><em>Yuan-Chen Chang and Esma Aimeur (University of Montreal, Canada)<\/em><\/p>\n\n          <p><strong>Ransomwise: A Transaction-Based Dataset for Ransomware Bitcoin Wallet Detection<\/strong><br><em>Ioannis Arakas (ICS-FORTH, Greece); Nikolaos Myrtakis (ENSEA, Greece); Thomas Marchioro (University of Padova, Italy); Evangelos Markatos (ICS-FORTH, Greece)<\/em><\/p>\n\n<p><strong>VishGuard: Defending Against Vishing<\/strong><br><em>Zi Heng Phang, Wei Ming Tan, Joshua Sheng Xiong Choo, Zhi Kang Ong, Weng Hong Isaac Tan and Huaqun Guo (Singapore Institute of Technology, Singapore)<\/em><\/p>\n        <\/td>\n      <\/tr>\n      <tr>\n        <td width=\"20%\">\n          <p>10:40 &#8211; 11:00<\/p>\n        <\/td>\n        <td width=\"80%\">\n          <p><strong>Coffee break<\/strong><\/p>\n        <\/td>\n      <\/tr>\n      <tr>\n        <td width=\"20%\">\n          <p>11:00 &#8211; 12:15<\/p>\n        <\/td>\n        <td width=\"80%\">\n          <p>\n            <span style=\"color: #3366ff;\"><strong>Short papers Session #2: Machine Learning and AI for Cybersecurity <\/strong><\/span><br>\n            <strong>Session Chair:<\/strong><em> Hassan Noura, University of Franche-Comt\u00e9, France<\/em>\n          <\/p>\n          <p><strong>Spam No More: A Cross-Model Analysis of Machine Learning Techniques and Large Language Model Efficacies<\/strong><br><em>Robin Chataut (Texas Christian University, USA); Aadesh Upadhyay (University of North Texas, USA); Yusuf Usman (Quinnipiac University, USA); Prashnna K Gyawali (West Virginia University, USA); Mary Nankya (Fitchburg State University, USA)<\/em>\n          <\/p>\n\n          <p><strong>Predicting User Activities and Device Interactions Using Adversarial Sensor Data: A Machine Learning Approach<\/strong><br><em>Umair Mujtaba Qureshi (Chinese University of Hong Kong, Hong Kong); Rizwan Ahmed Kango (The Chinese University of Hong Kong, Hong Kong); Mehak Fatima Qureshi (Hong Kong Baptist University, Hong Kong); Wai-Yiu Keung (The Chinese University of Hong Kong, Hong Kong); Zuneera Umair (Hong Kong Baptist University, Hong Kong); Ho Chuen Kam (The Chinese University of Hong Kong, Hong Kong)<\/em><\/p>\n\n          <p><strong>Anticipating Cyber Threats: Deep Learning Approaches for DDoS Attacks Forecasting<\/strong><br><em>Dhia Ben Ali (Caplogy, France); Mohamed Belaoued (Caplogy &#038; Lab-I, France); Samir Dawaliby (Caplogy R&#038;D, France)<\/em><\/p>\n\n          <p><strong>Identifying APT Attack Stages Using Anomaly Score Calibration<\/strong><br><em>Ornella Lucresse Soh and Issa Traore (University of Victoria, Canada); Isaac Woungang (Toronto Metropolitan University, Canada); Wei Lu (Keene State College, USNH, USA); Marcelo Luiz Brocardo (Santa Catarina State University &#8211; UDESC, Brazil)<\/em><\/p>\n\n          <p><strong>Convergence of AI for Secure Software Development<\/strong><br><em>Roberto Andrade (Universidad San Francisco, Ecuador); Jenny Torres, Pamela Flores, Erick Cabezas and Jorge Luis Segovia (Escuela Polit\u00e9cnica Nacional, Ecuador)<\/em><\/p>\n<\/td>\n      <\/tr>\n      <tr>\n        <td width=\"20%\">\n          <p>12:15 &#8211; 13:30<\/p>\n        <\/td>\n        <td width=\"80%\">\n          <p><strong>Lunch break \/ Posters Session #1<\/strong><\/p>\n<\/p>\n          <p><strong>A Multi-Level Network Traffic Classification in Combating Cyberattacks Using Stack Deep Learning Models<\/strong><br><em>Believe Ayodele and Victor Buttigieg (University of Malta, Malta)<\/em><\/p>\n<\/p>\n          <p><strong>Password Classification Using Machine Learning and Natural Language Processing Techniques: Methods and Evaluations<\/strong><br><em>Binh Le Thanh Thai, Tsubasa Takii and Hidema Tanaka (National Defense Academy, Japan)<\/em><\/p>\n\n<\/p>\n          <p><strong>Detecting Spam Emails Using Machine Learning and Lemmatization Vs Traditional Methods<\/strong><br><em>Derick Jun Peng Kwok and Huaqun Guo (Singapore Institute of Technology, Singapore)<\/em><\/p>\n\n          <p><strong>A Machine Learning Approach of Predicting Ransomware Addresses in BlockChain Networks<\/strong><br><em>Raqeebir Rab, Anika Maisha Tasnim and Md Maraj Rashid (Ahsanullah University of Science and Technology, Bangladesh); Nafis Shahriar (Ahsanullah University of Scinence and Technology, Bangladesh); Abderrahmane Leshob (University of Quebec at Montreal, Canada); Amrin Hassan Heya (Ahsanullah University of Science and Technology, Bangladesh)<\/em><\/p>\n\n <p><strong>Towards an Unsupervised Reward Function for a Deep Reinforcement Learning Based Intrusion Detection System <\/strong><br><em>Bilel Saghrouchni (INSA Lyon CITI &#038; SPIE ICS, France); Fr\u00e9d\u00e9ric Le Mou\u00ebl (INSA Lyon \/ Inria, France); Bogdan Szanto (SPIE ICS, France)<\/em><\/p>\n\n<\/td>\n      <\/tr>\n      <tr>\n        <td width=\"20%\">\n          <p>13:30 &#8211; 14:30<\/p>\n        <\/td>\n        <td width=\"80%\">\n          <p>\n            <span style=\"color: #3366ff;\"><strong>Keynote #2: Self-sovereign Identity: a solid technology that meets the requirements of national digital identity management systems<\/strong><\/span><br>\n            <strong>Speaker: Maryline Laurent, Full professor, T\u00e9l\u00e9com SudParis, France<\/strong><em> <\/em><br \/>\n            <strong>Session Chair:<\/strong><em> Guy Pujolle, Sorbonne University, France<\/em>\n          <\/p>\n        <\/td>\n      <\/tr>\n      <tr>\n<td width=\"20%\">\n          <p>14:30 &#8211; 16:10<\/p>\n        <\/td>\n        <td width=\"80%\">\n          <p>\n            <span style=\"color: #3366ff;\"><strong>Technical Session #4:  Cyber Threat Intelligence and Defense Strategies<\/strong><\/span><br>\n            <strong>Session Chair:<\/strong><em> Nouredine Tamani, ISEP, Franc<\/em>\n          <\/p>\n          <p><strong> A New Generation of Security for the 6G<\/strong><br><em>Guy Pujolle (Sorbonne University, France); Pascal Urien (Ethertrust, France)<\/em><\/p>\n          <p><strong> AsIf: Asset Interface Analysis of Industrial Automation Devices<\/strong><br><em>Thomas Rosenstatter (Salzburg University of Applied Sciences, Austria); Christian Sch\u00e4fer (Salzburg University of Applied Sciences (SUAS), Austria); Olaf Sa\u00dfnick and Stefan Huber (Salzburg University of Applied Sciences, Austria)<\/em><\/p>\n <p><strong> An Efficient Explainable Artificial Intelligence (XAI)-Based Framework for a Robust and Explain- able IDS<\/strong><br><em>Beny Nugraha (Technische Universit\u00e4t Chemnitz, Germany &#038; Mercu Buana University, Indonesia); Abhishek Venkatesh Jnanashree (Technische Universit\u00e4t Chemnitz, Germany); Thomas Bauschert (Chemnitz University of Technology, Germany)<\/em><\/p>\n<p><strong> FASIL: A Challenge-Based Framework for Secure and Privacy-Preserving Federated Learning<\/strong><br><em>Ferhat Karako\u00e7 (Ericsson Research, Turkey); Bet\u00fcl G\u00fcven\u00e7 Paltun and Leyli Kara\u00e7ay (Ericsson, Turkey); \u00d6mer Faruk Tuna (Ericsson Research, Turkey); Ramin Fuladi (Ericsson &#038; Bo\u011fazi\u00e7i, Turkey); Utku G\u00fclen (Ericsson Research, Turkey)<\/em><\/p>\n\n <\/td>\n      <\/tr>\n      <tr>\n        <td width=\"20%\">\n          <p>16:10 &#8211; 16:40<\/p>\n        <\/td>\n        <td width=\"80%\">\n          <p><strong>Coffee break<\/strong><\/p>\n<\/td>\n<\/td>\n      <\/tr>\n      <tr>\n<td width=\"20%\">\n          <p>16:40 &#8211; 18:00<\/p>\n        <\/td>\n        <td width=\"80%\">\n          <p>\n            <span style=\"color: #3366ff;\"><strong>Technical Session #5:  Novel AI Approaches to Cybersecurity Challenges<\/strong><\/span><br>\n            <strong>Session Chair:<\/strong><em>Guy Pujolle, Sorbonne University, France<\/em>\n          <\/p>\n          <p><strong> APT Warfare: Technical Arsenal and Target Profiles of Linux Malware in Advanced Persistent Threats<\/strong><br><em>Jayanthi Ramamoorthy, Cihan Varol and Narasimha Karpoor Shashidhar (Sam Houston State University, USA)<\/em><\/p>\n\n<p><strong> Security and Privacy-Preserving for Machine Learning Models: Attacks, Countermeasures, and Future Directions<\/strong><br><em>Fatema El Husseini (LISTIC, Universit\u00e9 Savoie Mont Blanc, France); Flavien Vernier (LISTIC Universit\u00e9 Savoie Mont Blanc, France); Hassan Noura (University of Franche-Comt\u00e9 &#038; Institut FEMTO-ST, France)<\/em><\/p>\n\n<p><strong> DID U Misbehave? A New Dataset for In-Depth Understanding of Inconspicuous Software<\/strong><br><em>Antonin Verdier (Universit\u00e9 Toulouse III &#8211; Paul Sabatier, France); Romain Laborde and Abir Laraba (Universit\u00e9 Toulouse III, Paul Sabatier &#038; IRIT, France); Abdelmalek Benzekri (Universit\u00e9 Paul Sabatier, France)<\/em><\/p>\n      <\/tr>\n      <tr>\n        <td width=\"20%\">\n          <p>19:00<\/p>\n        <\/td>\n        <td width=\"80%\">\n          <p><strong>Conference Dinner<\/strong><\/p>\n        <\/td>\n      <\/tr>\n    <\/tbody>\n  <\/table>\n<\/div>\n\n\n\n<div id=\"program\" class=\"frame\">\n  <table width=\"100%\">\n    <tbody>\n      <tr>\n        <td class=\"programTitleTD\" colspan=\"2\" width=\"100%\">\n          <h3 class=\"programTitleH3\"><strong>Day 3 &#8211; Friday, December 6<\/strong><\/h3>\n        <\/td>\n      <\/tr>\n      <tr>\n        <td width=\"20%\">\n          <p><strong>Time<\/strong><\/p>\n        <\/td>\n        <td width=\"80%\">\n          <p><strong>Event<\/strong><\/p>\n        <\/td>\n      <\/tr>\n      <tr>\n        <td width=\"20%\">\n          <p>08:45 &#8211; 09:15<\/p>\n        <\/td>\n        <td width=\"80%\">\n          <p>Registration<\/p>\n        <\/td>\n      <\/tr>\n      <tr>\n        <td width=\"20%\">\n          <p>9:15 &#8211; 10:30<\/p>\n        <\/td>\n        <td width=\"80%\">\n          <p>\n            <span style=\"color: #3366ff;\"><strong>Technical Session #6:Emerging Threats and AI Detection Techniques<\/strong><\/span><br>\n            <strong>Session Chair:<\/strong><em> Fatema El Husseini, LISTIC, Universit\u00e9 Savoie Mont Blanc, France<\/em>\n          <\/p>\n          <p><strong>Towards Identification of Network Applications in Encrypted Traffic\n<\/strong><br><em>Ivana Burgetov\u00e1 (Brno University of Technology &#038; Faculty of Information Technology, Czech Republic); Ondrej Rysavy and Petr Matou\u0161ek (Brno University of Technology, Czech Republic)<\/em><\/p>\n\n          <p><strong>An Autonomic Chess Bot Detection and Defeat System<\/strong><br><em>Andrew Bengtson (Johns Hopkins University, USA); Christopher Rouff (Johns Hopkins Applied Physics Laboratory, USA); Ali Tekeoglu (Johns Hopkins University Whiting School of Engineering, USA &#038; Leidos Innovations Center, USA)<\/em><\/p>\n\n          <p><strong>A Hybrid Machine Learning &#8211; Fuzzy Cognitive Map Approach for Fast, Reliable DDoS Attack Detection<\/strong><br><em>Prathibha Keshavamurthy and Sarvesh Kulkarni (Villanova University, USA)<\/em><\/p>\n\n        <\/td>\n      <\/tr>\n      <tr>\n        <td width=\"20%\">\n          <p>10:30 &#8211; 11:00<\/p>\n        <\/td>\n        <td width=\"80%\">\n          <p><strong>Coffee break<\/strong><\/p>\n        <\/td>\n      <\/tr>\n      <tr>\n        <td width=\"20%\">\n          <p>11:00 &#8211; 12:30<\/p>\n        <\/td>\n        <td width=\"80%\">\n          <p>\n            <span style=\"color: #3366ff;\"><strong>Short papers Session #3:  Security in Distributed and IoT Environments<\/strong><\/span><br>\n            <strong>Session Chair:<\/strong><em> Saad El Jaouhari, ISEP &#038; Adservio Group, France<\/em>\n          <\/p>\n          <p><strong>Kubernetes-Driven Network Security for Distributed ACL Management<\/strong><br><em>Tushar Gupta (Senior IEEE Member, USA)<\/em>\n          <\/p>\n\n          <p><strong>Towards the Removal of Identification and Authentication Authority from IM Systems<\/strong><br><em>David A. Cordova Morales (Instituto Polit\u00e9cnico Nacional, Mexico); Ahmad Samer Wazan (Zayed University, United Arab Emirates); Romain Laborde (Universit\u00e9 Toulouse III, Paul Sabatier &#038; IRIT, France); Muhammad Imran Taj (Zayed University, United Arab Emirates); Adib Habbal (Karabuk University &#038; School of Computing, Turkey); Gina Gallegos-Garcia (Instituto Polit\u00e9cnico Nacional, Mexico)<\/em><\/p>\n\n          <p><strong>Pirates of the MQTT: Raiding IIoT Systems with a Rogue Client<\/strong><br><em>Wael Alsabbagh (Brandenburg University of Technology &#038; IHP GmbH, Germany); Peter Langendoerfer (IHP Microelectronics, Germany); Chaerin Kim (Brandenburgische Technische Universit\u00e4t Cottbus &#8211; Senftenberg, Germany); Samuel Amogbonjaye (Brandenburg University of Technology, Germany)<\/em><\/p>\n\n          <p><strong>A New Similarity-Based Classification Scheme of Drone Network Attacks<\/strong><br><em>Salah Dine Maham (Universit\u00e9 de Technologie de Troyes (UTT), France); Guy Pujolle (Sorbonne University, France); Atiq Ahmed (Universit\u00e9 de Technologie de Troyes, France); Dominique Ga\u00efti (University of Technology of Troyes, France)<\/em><\/p>\n\n          <p><strong>Blockchain and Biometric Systems Integration for IoMT Security<\/strong><br><em>Ilham Laabab (Sidi Mohamed Ben Abdellah University, Morocco); Abdellatif Ezzouhairi (National School of Applied Sciences, Morocco); Nour El Madhoun (ISEP, France &#038; Sorbonne Universit\u00e9, LIP6, France); Muhammad Haris Khan (Kineton, Italy)<\/em><\/p>\n\n <p><strong>Regulatory Compliance Verification: A Privacy Preserving Approach<\/strong><br><em>Massimo Morello (European Central Bank, Germany); Petri Sainio (University of Turku, Finland); Mohammed B. M. Kamel (Furtwangen University, Germany &#038; Eotvos Lorand University, Hungary)<\/em>\n          <\/p>\n<\/td>\n      <\/tr>\n      <tr>\n        <td width=\"20%\">\n          <p>12:30 &#8211; 13:30<\/p>\n        <\/td>\n        <td width=\"80%\">\n          <p><strong>Lunch break \/ Posters Session #2<\/strong><\/p>\n<\/p>\n          <p><strong>A Situational Assessment Module for CCAM Applications<\/strong><br><em>Enes Begecarslan (Istanbul Technical University, Turkey &#038; FEV Turkey, Turkey); Burcu Ozbay (Istanbul University-Cerrahpasa, Turkey &#038; FEV Turkiye, Turkey)<\/em><\/p>\n<\/p>\n\n<\/p>\n          <p><strong>Adaptive Optimization of TLS Overhead for Wireless Communication in Critical Infrastructure<\/strong><br><em>J\u00f6rn Bodenhausen and Laurenz Grote (RWTH Aachen University, Germany); Michael Rademacher (Fraunhofer FKIE, Germany); Martin Henze (RWTH Aachen University, Germany &#038; Fraunhofer FKIE, Germany)<\/em><\/p>\n<\/p>\n\n          <p><strong>Interdisciplinary Research Project \u2018AI Shield&#8217;<\/strong><br><em>Evgeni Moyakine (University of Groningen, The Netherlands); Trix Mulder (Hanze University of Applied Sciences, The Netherlands); Thijs van Ede (University of Twente, The Netherlands)<\/em><\/p>\n<\/p>\n\n         <p><strong>Mobbing: AI-Powered Cyberthreat Behavior Analysis and Modeling<\/strong><br><em>Patricio Zambrano, Jenny Torres and Carlos Anchundia (Escuela Polit\u00e9cnica Nacional, Ecuador); Johan Illicachi (Escuela Politecnica Nacional, Ecuador)<\/em><\/p>\n\n<\/td>\n      <\/tr>\n      <tr>\n        <td width=\"20%\">\n          <p>13:30 &#8211; 14:30<\/p>\n        <\/td>\n        <td width=\"80%\">\n          <p>\n            <span style=\"color: #3366ff;\"><strong>Keynote #3: AI for biometrics <\/strong><\/span><br>\n            <strong>Speaker: Christophe Rosenberger, ENSICAEN, France<\/strong><em> <\/em><br \/>\n            <strong>Session Chair:<\/strong><em> Nouredine Tamani, ISEP, France<\/em>\n          <\/p>\n        <\/td>\n      <\/tr>\n      <tr>\n<td width=\"20%\">\n          <p>14:30 &#8211; 16:10<\/p>\n        <\/td>\n        <td width=\"80%\">\n          <p>\n            <span style=\"color: #3366ff;\"><strong>Technical Session #7: Advances in Machine Learning for Cybersecurity<\/strong><\/span><br>\n            <strong>Session Chair:<\/strong><em>Hassan Noura (University of Franche-Comt\u00e9, France)<\/em>\n          <\/p>\n          <p><strong> Cross ML for Io(H)T Network Traffic Classification: A New Approach Towards Standardization<\/strong><br><em>Emmanuel Song Shombot (IMT Mines Ales, Nigeria &#038; Federal University Lafia, Nigeria); Gilles Dusserre (Ecole des Mines D&#8217;Ales, France); Robert Bestak (Czech Technical University in Prague, Czech Republic); Nasir Baba Ahmed (Ecole des Mines D&#8217;Ales &#038; Baze University Abuja, France)<\/em><\/p>\n          <p><strong> Advanced Smart Contract Vulnerability Detection Using Large Language Models<\/strong><br><em>Fatemeh Erfan and Mohammad Yahyatabar (Polytechnique Montreal, Canada); Martine Bella\u00efche (\u00c9cole Polytechnique, Canada); Talal Halabi (Laval University, Canada)<\/em><\/p>\n <p><strong> Advanced Machine Learning Approaches for Zero-Day Attack Detection: A Review<\/strong><br><em>Fatema El Husseini (LISTIC, Universit\u00e9 Savoie Mont Blanc, France); Hassan Noura (University of Franche-Comt\u00e9 &#038; Institut FEMTO-ST, France); Ola Salman (DeepVu, USA); Ali Chehab (American University of Beirut, Lebanon)<\/em><\/p>\n<p><strong> AI Security: Cyber Threats and Threat-Informed Defense<\/strong><br><em>Kamal Singh (MRIIRS &#038; IP Global Services Limited, United Kingdom (Great Britain)); Rohit Saxena (Member, IEEE, United Arab Emirates); Brijesh Kumar (MRIIRS, India)<\/em><\/p>\n\n      <\/tr>\n      <tr>\n        <td width=\"20%\">\n          <p>16:10 &#8211; 16:20<\/p>\n        <\/td>\n        <td width=\"80%\">\n          <p><strong>Closing Conference &#038; Awards<\/strong><\/p>\n        <\/td>\n      <\/tr>\n    <\/tbody>\n  <\/table>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Program at a Glance Provisional Program &hellip; <a href=\"https:\/\/csnet-conference.org\/2024\/program\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-229","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Program - CSNet 2024<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/csnet-conference.org\/2024\/program\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Program - CSNet 2024\" \/>\n<meta property=\"og:description\" content=\"Program at a Glance Provisional Program &hellip; Continue reading &rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/csnet-conference.org\/2024\/program\/\" \/>\n<meta property=\"og:site_name\" content=\"CSNet 2024\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-03T18:02:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/csnet-conference.org\/2024\/wp-content\/uploads\/2024\/12\/program_v21-1024x839.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/csnet-conference.org\/2024\/program\/\",\"url\":\"https:\/\/csnet-conference.org\/2024\/program\/\",\"name\":\"Program - CSNet 2024\",\"isPartOf\":{\"@id\":\"https:\/\/csnet-conference.org\/2024\/#website\"},\"datePublished\":\"2024-10-30T13:57:05+00:00\",\"dateModified\":\"2024-12-03T18:02:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/csnet-conference.org\/2024\/program\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/csnet-conference.org\/2024\/program\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/csnet-conference.org\/2024\/program\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/csnet-conference.org\/2024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Program\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/csnet-conference.org\/2024\/#website\",\"url\":\"https:\/\/csnet-conference.org\/2024\/\",\"name\":\"CSNet 2024\",\"description\":\"8th Cyber Security in Networking Conference\",\"publisher\":{\"@id\":\"https:\/\/csnet-conference.org\/2024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/csnet-conference.org\/2024\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/csnet-conference.org\/2024\/#organization\",\"name\":\"CSNet 2024\",\"url\":\"https:\/\/csnet-conference.org\/2024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/csnet-conference.org\/2024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/csnet-conference.org\/2024\/wp-content\/uploads\/2024\/02\/cropped-csnet_logo_2024-01.png\",\"contentUrl\":\"https:\/\/csnet-conference.org\/2024\/wp-content\/uploads\/2024\/02\/cropped-csnet_logo_2024-01.png\",\"width\":500,\"height\":500,\"caption\":\"CSNet 2024\"},\"image\":{\"@id\":\"https:\/\/csnet-conference.org\/2024\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Program - CSNet 2024","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/csnet-conference.org\/2024\/program\/","og_locale":"en_US","og_type":"article","og_title":"Program - CSNet 2024","og_description":"Program at a Glance Provisional Program &hellip; Continue reading &rarr;","og_url":"https:\/\/csnet-conference.org\/2024\/program\/","og_site_name":"CSNet 2024","article_modified_time":"2024-12-03T18:02:28+00:00","og_image":[{"url":"https:\/\/csnet-conference.org\/2024\/wp-content\/uploads\/2024\/12\/program_v21-1024x839.png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/csnet-conference.org\/2024\/program\/","url":"https:\/\/csnet-conference.org\/2024\/program\/","name":"Program - CSNet 2024","isPartOf":{"@id":"https:\/\/csnet-conference.org\/2024\/#website"},"datePublished":"2024-10-30T13:57:05+00:00","dateModified":"2024-12-03T18:02:28+00:00","breadcrumb":{"@id":"https:\/\/csnet-conference.org\/2024\/program\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/csnet-conference.org\/2024\/program\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/csnet-conference.org\/2024\/program\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/csnet-conference.org\/2024\/"},{"@type":"ListItem","position":2,"name":"Program"}]},{"@type":"WebSite","@id":"https:\/\/csnet-conference.org\/2024\/#website","url":"https:\/\/csnet-conference.org\/2024\/","name":"CSNet 2024","description":"8th Cyber Security in Networking Conference","publisher":{"@id":"https:\/\/csnet-conference.org\/2024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/csnet-conference.org\/2024\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/csnet-conference.org\/2024\/#organization","name":"CSNet 2024","url":"https:\/\/csnet-conference.org\/2024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/csnet-conference.org\/2024\/#\/schema\/logo\/image\/","url":"https:\/\/csnet-conference.org\/2024\/wp-content\/uploads\/2024\/02\/cropped-csnet_logo_2024-01.png","contentUrl":"https:\/\/csnet-conference.org\/2024\/wp-content\/uploads\/2024\/02\/cropped-csnet_logo_2024-01.png","width":500,"height":500,"caption":"CSNet 2024"},"image":{"@id":"https:\/\/csnet-conference.org\/2024\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/csnet-conference.org\/2024\/wp-json\/wp\/v2\/pages\/229","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/csnet-conference.org\/2024\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/csnet-conference.org\/2024\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/csnet-conference.org\/2024\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/csnet-conference.org\/2024\/wp-json\/wp\/v2\/comments?post=229"}],"version-history":[{"count":75,"href":"https:\/\/csnet-conference.org\/2024\/wp-json\/wp\/v2\/pages\/229\/revisions"}],"predecessor-version":[{"id":388,"href":"https:\/\/csnet-conference.org\/2024\/wp-json\/wp\/v2\/pages\/229\/revisions\/388"}],"wp:attachment":[{"href":"https:\/\/csnet-conference.org\/2024\/wp-json\/wp\/v2\/media?parent=229"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}