Title |
Speakers |
Summary |
Topic Types |
Tutorial 1 – Verifiable credentials: user-centric identity management systems |
Romain Laborde
,
Abdelmalek Benzekri
,
David Chadwick
,
Ahmad-samer Wazan
,
Irid
|
N/A |
|
Keynote 1 – Improving cybersecurity measures effectiveness by artificial intelligence |
Solange Ghernaouti
|
N/A |
|
Invited paper – Efficient Block replication to optimize the blockchain resources |
Khaldoun Al Agha
,
El-hacen Diallo
,
Alexandre Laube
,
And Steven Martin
|
N/A |
|
A Blockchain-Encryption-Based Approach to Protect Fog Federations from Rogue Nodes |
Mohammed Panda
|
N/A |
|
Towards Blockchain Services for Mobile Money Traceability and Federation |
Pascal A.
|
N/A |
|
Going Beyond the Blockchain Hype: In Which Cases are Blockchains Useful for IT Applications ? |
Nour El Madhoun
,
Julien Hatin
,
Emmanuel Bertin
|
N/A |
|
A Blockchain-based Lightweight Authentication Solution for IoT |
Achraf Fayad
,
Rida Khatoun
,
Badis Hammi
,
Ahmed Serhrouchni
|
N/A |
|
A Secure and Fault-Tolerant Architecture for LoRaWAN Based on Blockchain |
Raimir Holanda
,
Pasknel Ribeiro
,
Alex Ramos
|
N/A |
|
The importance of a managerial, legal and technical approach when designing a security policy |
Solange Ghernaouti
|
N/A |
|
Trust-based Collaborative Defences in Multi Network Alliances |
Ralph Koning
,
Ameneh Deljoo
,
Lydia Meijer
,
Cees Grosso
|
N/A |
|
Managing Effective Collaboration in Cybersecurity Alliances Using Social Computational Trust |
Cees de Laat
,
Ralph Koning
,
Ameneh Deljoo
,
Tom Van Engers
,
Leon Gommans
|
N/A |
|
Information Sharing in Cybersecurity |
Solange Ghernaouti
,
Léonore Cellier
,
Bastien Wanner
|
N/A |
|
Information Security Management Frameworks in Higher Education Institutions: An Overview |
Jorge Merchan-lima
,
Fabian Astudillo-salinas
,
Luis Tello-oquendo
,
Franklin Sanchez
,
Gabriel Lopez
,
Dorys Quiroz
|
N/A |
|
Keynote 2 – Blockchain For Mesh Networks |
Khaldoun Al Agha
|
N/A |
|
Invited paper Dynamic security management driven by situations: An Exploratory analysis of logs for the identification of security situations |
Francois Barrere
,
Romain Laborde
,
Abdelmalek Benzekri
,
Darine Rammal
,
Arnaud Oglaza
|
N/A |
|
Human Interaction Proofs (HIPs) Based on Emerging Images and Topological Data Analysis (TDA) Techniques |
María Osorio Angarita
,
Ebroul Izquierdo
,
Agustin Moreno Cañadas
|
N/A |
|
The EMV Payment System: Is It Reliable ? |
Guy Pujolle
,
Nour El Madhoun
,
Emmanuel Bertin
|
N/A |
|
On the Adversarial Machine Learning Paradigm: MoGANS |
Sophia Catalina Giraldo
,
David Restrepo
,
Olga Quintero
,
Jimmy Ortega
|
N/A |
|
A Risk Management Framework and A Generalized Attack Automata for IoT Based Smart Home Environment |
Fathima James
|
N/A |
|
Hashing-based Authentication for CAN Bus and Application to Denial-of-Service Protection |
Olivier Chênevert
|
N/A |
|
Bluetooth Low Energy Makes Just Works Not Work |
Karim Zulkernine
|
N/A |
|
IoT Cyber Security Based Smart Home Intrusion Prevention System |
Fathima James
|
N/A |
|
Cloud-based Sybil Attack Detection Scheme for Connected Vehicles |
Anika Anwar
,
Mohammad Halabi
|
N/A |
|
Physical Layer Security for 5G Wireless Networks: A Comprehensive Survey |
Jose Sanchez
,
Luis F Urquiza-aguiar
,
Martha Paredes
|
N/A |
|
Verification of Keyboard Acoustics Authentication on Laptops and Smartphones Using WebRTC |
Christoph Meinel
,
Christian Tietz
,
Eric Klieme
,
Lukas Behrendt
,
Pawel Boening
,
Leonard Marschke
|
N/A |
|
Social Consensus-inspired Aggregation for Edge Computing |
Zenon D Chaczko
,
Firas Al-doghman
,
Wayne Brookes
,
Lucia Carrion Gordon
|
N/A |
|
Keynote 3 – Enhancing cybersecurity capabilities to protect national critical infrastructure |
Frankie Catota
|
N/A |
|
XSStudent: Proposal to Avoid Cross-Site Scripting(XSS) Attacks in Universities |
Germán Rodríguez
,
Jenny Torres
,
Pamela Flores
,
Diego Benavides
,
Daniel Agurto
|
N/A |
|
A Precise Method for Monitoring and Detecting Recurrent Attacks on Wireless Networks Based on Link-Layer Traffic Classification |
Andreane Spano Roza
,
Asr Valle
,
Diogo Mattos
|
N/A |
|
TAG: Topological Attack Graph Analysis Tool |
Marek Malowidzki
,
Damian Berezinski
|
N/A |
|
Phishing Attacks: Detecting and Preventing Infected E-mails Using Machine Learning Methods |
Germán Rodríguez
,
Diego Benavides
,
Diego Oña
,
Lenín Zapata
,
Walter Fuertes
,
Theo Toulkeridis
|
N/A |
|