CSNet 2019 Oct. 23, 2019 to Oct. 25, 2019, Quito, Ecuador

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Tutorial 1 – Verifiable credentials: user-centric identity management systems Romain Laborde , Abdelmalek Benzekri , David Chadwick , Ahmad-samer Wazan , Irid N/A
Keynote 1 – Improving cybersecurity measures effectiveness by artificial intelligence Solange Ghernaouti N/A
Invited paper – Efficient Block replication to optimize the blockchain resources Khaldoun Al Agha , El-hacen Diallo , Alexandre Laube , And Steven Martin N/A
A Blockchain-Encryption-Based Approach to Protect Fog Federations from Rogue Nodes Mohammed Panda N/A
Towards Blockchain Services for Mobile Money Traceability and Federation Pascal A. N/A
Going Beyond the Blockchain Hype: In Which Cases are Blockchains Useful for IT Applications ? Nour El Madhoun , Julien Hatin , Emmanuel Bertin N/A
A Blockchain-based Lightweight Authentication Solution for IoT Achraf Fayad , Rida Khatoun , Badis Hammi , Ahmed Serhrouchni N/A
A Secure and Fault-Tolerant Architecture for LoRaWAN Based on Blockchain Raimir Holanda , Pasknel Ribeiro , Alex Ramos N/A
The importance of a managerial, legal and technical approach when designing a security policy Solange Ghernaouti N/A
Trust-based Collaborative Defences in Multi Network Alliances Ralph Koning , Ameneh Deljoo , Lydia Meijer , Cees Grosso N/A
Managing Effective Collaboration in Cybersecurity Alliances Using Social Computational Trust Cees de Laat , Ralph Koning , Ameneh Deljoo , Tom Van Engers , Leon Gommans N/A
Information Sharing in Cybersecurity Solange Ghernaouti , Léonore Cellier , Bastien Wanner N/A
Information Security Management Frameworks in Higher Education Institutions: An Overview Jorge Merchan-lima , Fabian Astudillo-salinas , Luis Tello-oquendo , Franklin Sanchez , Gabriel Lopez , Dorys Quiroz N/A
Keynote 2 – Blockchain For Mesh Networks Khaldoun Al Agha N/A
Invited paper Dynamic security management driven by situations: An Exploratory analysis of logs for the identification of security situations Francois Barrere , Romain Laborde , Abdelmalek Benzekri , Darine Rammal , Arnaud Oglaza N/A
Human Interaction Proofs (HIPs) Based on Emerging Images and Topological Data Analysis (TDA) Techniques María Osorio Angarita , Ebroul Izquierdo , Agustin Moreno Cañadas N/A
The EMV Payment System: Is It Reliable ? Guy Pujolle , Nour El Madhoun , Emmanuel Bertin N/A
On the Adversarial Machine Learning Paradigm: MoGANS Sophia Catalina Giraldo , David Restrepo , Olga Quintero , Jimmy Ortega N/A
A Risk Management Framework and A Generalized Attack Automata for IoT Based Smart Home Environment Fathima James N/A
Hashing-based Authentication for CAN Bus and Application to Denial-of-Service Protection Olivier Chênevert N/A
Bluetooth Low Energy Makes Just Works Not Work Karim Zulkernine N/A
IoT Cyber Security Based Smart Home Intrusion Prevention System Fathima James N/A
Cloud-based Sybil Attack Detection Scheme for Connected Vehicles Anika Anwar , Mohammad Halabi N/A
Physical Layer Security for 5G Wireless Networks: A Comprehensive Survey Jose Sanchez , Luis F Urquiza-aguiar , Martha Paredes N/A
Verification of Keyboard Acoustics Authentication on Laptops and Smartphones Using WebRTC Christoph Meinel , Christian Tietz , Eric Klieme , Lukas Behrendt , Pawel Boening , Leonard Marschke N/A
Social Consensus-inspired Aggregation for Edge Computing Zenon D Chaczko , Firas Al-doghman , Wayne Brookes , Lucia Carrion Gordon N/A
Keynote 3 – Enhancing cybersecurity capabilities to protect national critical infrastructure Frankie Catota N/A
XSStudent: Proposal to Avoid Cross-Site Scripting(XSS) Attacks in Universities Germán Rodríguez , Jenny Torres , Pamela Flores , Diego Benavides , Daniel Agurto N/A
A Precise Method for Monitoring and Detecting Recurrent Attacks on Wireless Networks Based on Link-Layer Traffic Classification Andreane Spano Roza , Asr Valle , Diogo Mattos N/A
TAG: Topological Attack Graph Analysis Tool Marek Malowidzki , Damian Berezinski N/A
Phishing Attacks: Detecting and Preventing Infected E-mails Using Machine Learning Methods Germán Rodríguez , Diego Benavides , Diego Oña , Lenín Zapata , Walter Fuertes , Theo Toulkeridis N/A