Monday
October 23th, 2023 |
08:00-09:00 AM |
Registration |
08:45-09:00 AM
|
Opening Session
|
09:00-10:00 AM |
Keynote 1: Dr. Ibrahim (Abe) Baggili, Louisiana State University, Baton Rouge, LA, USA
Title: Who You Gonna Call? Unmasking AI Investigations through AI Forensics
Meeting Link
Passcode: 724330
|
10:00 -10:30 AM |
Coffee Break |
10:30 AM-12:00 PM |
IoTSMS Technical Session 1 |
Chair: Cihan Tunc
Meeting Link
Passcode: 916419
|
- Warren Williams and Raahul Pathak
Edge Analytics Solution for Online Monitoring of Building Operations Data
- An Adaptive Flow-based NIDS for Smart Home Networks Against Malware Behavior Using XGBoost combined with Rough Set Theory
Nasser Alsabilah and Danda B. Rawat
- Exploring the Vulnerabilities of IoT Devices: A Comprehensive Analysis of Mirai and Bashlite Attack Vectors
Seth Barrett, Bradley Boswell and Gokila Dorai
- Phoenix: Trust Evaluation in Internet of Things Using Game Theory with a Second Chance Protocol
Himan Namdari, Cihan Tunc and Ram Dantu
|
10:30 AM-12:00 PM |
SDS Technical Session 1 |
Chair: Pradeeban Kathiravelu
Meeting Link
|
- An Intelligent Mobile Application for helping Alzheimer Patients
Kahkashan Tabassum and Rand Alharthi
- Natural Language-Based Model-Checking Framework for Move Smart Contracts
Keerthi Nelaturu, Eric Keilty and Andreas Veneris
- Software Engineering Approaches Adopted By Blockchain Developers
Shawal Khalid and Chris Brown
- Network Measurements and Optimizations for Telehealth in Internet's Remote Regions
Pradeeban Kathiravelu, Ananth Reddy Bhimireddy and Judy Wawira Gichoya
|
10:30 AM-12:00 PM |
ICSC Technical Session 1 |
Chair: Mohamad Nassar
Meeting Link
|
- Revisiting Attack Trees for Modeling Machine Pwning in Training Environments
Khouloud Samrouth, Mohamad Nassar and Hussein Harb
- Why Cyber Threat Modeling Needs Human Factors Expansion: A Position Paper
Stephanie Travis, Denis Gracanin and Erin Lanus
- Adversarial Text Perturbation Generation and Analysis
Jesus Guerrero, Gongbo Liang and Izzat Alsmadi
- Implementation of Server-Based Intrusion Detection Software Framework in Bluetooth Networks
Youjun Han
|
12:00 -1:00 PM |
Lunch Break |
1:00-2:00 PM |
Keynote 2: Prof. Jaime Lloret, Universitat Politecnica de Valencia, Spain.
Title: Artificial Intelligence applied to real-time IoT data delivery
Meeting Link
Passcode: 913037
|
2:00-3:00 PM |
IoTSMS Technical Session 2 |
Chair: Ahmad Al-Omari
Meeting Link
Passcode: 916419
|
- Reducing the travel time of passengers between bus stations in the city by using the smart subsystem of road side unit (RSU) in the high traffic intersections of Zanjan city.
Vahid Ghaffari
- An IoT-based Smart Bathroom for Healthy Life
Yu-Hsien Wei, You-Xian Huang, You-Ching Chen and Der-Lor Way
- Federated Deep Learning-based Intrusion Detection Approach for Enhancing Privacy in Fog-IoT Networks
Bensaid Radjaa, Labraoui Nabila and Haythem Bany Salameh
|
2:00-3:00 PM |
SDS Technical Session 2 |
Chair: Yuvaraj Munian
Meeting Link
|
- Permissioned Blockchain-based Techniques for Refining the Data Security in Commercial Aviation
Khondker Shajadul Hasan, Zakir M. Yusuf and Shezad Rouf Khondker
- A Blockchain based Fund Management System for Construction Projects--A Comprehensive Case Study in Xiong'an New Area China
Cong Tang
- A Lightweight Drone Simulator
Evan Blake Putnam, Dylan Nihal Senarath, Giselle Ramirez Urquijo, Cihan Tunc and Renee Bryce
|
2:00-3:00 PM |
ICSC Technical Session 2 |
Chair: Charles Barone
Meeting Link
|
- Anomaly Detection in Crypto Currency
Ahmad Al-Omari, Izzat Alsmadi and John Dendy
- Deep Neural Networks in Social Media Forensics: Unveiling Suspicious Patterns and Advancing Investigations on Twitter
Yousef Sharrab, Dimah Al-Fraihat and Mohammad Alsmirat
- Gargoyle Guard: Enhancing Cybersecurity with Artificial Intelligence Techniques
Charles Barone, Mehdi Mekni and Mohamad Nassar
|
3:00-3:30 PM |
Coffee Break |
3:30-5:30 PM |
IoTSMS Technical Session 3 |
Chair: Jaime Lloret
Meeting Link
Passcode: 916419
|
- Self-Supervised Image Anomaly Detection and Localization with Synthetic Anomalies
Min-Chun Tsai and Sheng-De Wang
- Automated Security Audit Testbed for Ip-Based IoT Devices Without Physical Access
Ashutosh Kumar, Brijesh Peshvani, S Venkatesan, Manish Kumar, Suneel Yadav and Sandeep Kumar Shukla
- Zero-Knowledge Proofs Based Delegation Authentication for Industrial Internet of Things in Certificateless Proxy Signatures
Rafiq Ullah, Amjad Mehmood, Muhammad Altaf Khan, Carsten Maple and Jaime Lloret
- A New Image Processing System to Diagnose the Orange Fruit Disease
Arman Foroughi, Jose Miguel Jimenez and Jaime Lloret
- Image to Text Recognition for Detecting Human and Machine Altered News in Social Media
Abdullah Kamal, Zaid Jamal, Gabriel Rosales, Brian Robinson, Zach Sotny and Heena Rathore
|
3:30-5:30 PM |
SDS Technical Session 3 |
Chair: Fadi Wedyan
Meeting Link
|
- Regression-Based Approach for Proactive Predictive Modeling of Efficient Cloud Cost Estimation
Mustafa Daraghmeh, Anjali Agarwal and Yaser Jararweh
- Empirical Evaluation of Maintainability Index Accuracy for Measuring Maintainability of Python Programs
Rachael Morrison, Fadi Wedyan and Osama Abuomar
- Integration and Unit Testing of Software Energy Consumption
Fadi Wedyan, Rachael Morrison and Sam Abuomar
|
3:30-5:30 PM |
ICSC Technical Session 3 |
Chair: Yousef Sharrab
Meeting Link
|
- Measuring the Effects of Document Size on RAM Artifacts: A Memory Forensics Approach
Ziad Al-Sharif, Reema Al-Senjalawi and Omar Alzoubi
- Phishing Detection Based on Webpage Content: Static and Dynamic Analysis
Alexander O'Mara, Izzat Alsmadi, Ahmed Aleroud and Dalal Alharthi
- Fingerprint Identification from Digital Images Using Deep Learning
M Moneb Khaled, Aghyad Al Sayadi, Mohammad Alsmirat and Mahmoud Al-Ayyoub
|
Tuesday
October 24th, 2023 |
08:30-09:00 AM |
Registration |
09:00-10:00 AM
|
Keynote 3: Prof.Abdallah Khreishah, New Jersey Institute of Technology, USA
Title: Beyond securing networks and storage: emerging attacks and defenses to machine intelligence
Meeting Link
Passcode: 111334
|
10:00 -10:30 AM |
Coffee Break |
10:30 AM-12:00 PM |
IoTSMS Technical Session 4 |
Chair: Hisham A. Kholidy
Meeting Link
Password: 164316
|
- Memory Extraction of an Emulated STM-32 Blue Pill for Anomaly Detection
Diana Gutierrez, Alexander Perez-Pons, William Ocampo and Adriaan Jansen
- Secure and Scalable Permissioned Blockchain using LDE-P2P Networks
Saydul Akbar Murad and Nick Rahimi
- Enhancing IoT Device Security: Predicting and Analyzing Reconnaissance Attacks Using Flags and Time-Based Attributes
Nazia Sharmin and Christopher Kiekintveld
- Q-SECURE: A Quantum Resistant Security for Resource Constraint IoT Device Encryption
Maurice Ngouen, Mohammad Rahman, Nagarajan Prabakar, Selcuk Uluagac and Laurent Njilla
- A Smart Network Slicing Provisioning Framework for 5G-based IoT Networks
Hisham A. Kholidy
|
10:30 AM-12:00 PM |
SDS Technical Session 4 |
Chair: Elhadj Benkhelifa
Meeting Link
|
- Pathway to Coherent Phase Acquisition in Multi-channel USRP SDRs for Direction of Arrival Estimation
Alda Xhafa, Fran Fabra, José A. López-Salcedo, Gonzalo Seco-Granados and Ivan Lapin
- Towards the Utilization of Parallel Programming to Speed up RAM Forensics
Ziad Al-Sharif, Rahaf Alhamouri and Yaser Jararweh
- Load Balancing Algorithms for Software-Defined Networks
Zina Houhamdi and Belkacem Athamena
|
10:30 AM-12:00 PM |
ICSC Technical Session 4 |
Chair: Izzat Alsmadi
Meeting Link
|
- Enhancing Cybersecurity in SCADA IoT Systems: A Novel Machine Learning-Based Approach for Man-in-the-Middle Attack Detecti
Ala Mughaid, Mohammad Aljamal, Issa Al-Aiash, Mahmoud Aljamal, Rabee Alquran, Shadi Alzu'Bi and Ala A. Abutabanjeh
- Distributed pseudorandom generation protocol based on VRF algorithm
Ivan Velichko, Sergey Vanurin, Alexandra Afanasyeva, Sergey Bezzateev, Mikhail Sayfullin and Konstantin Zhidanov
- Twitter Account Analysis for Drug Involvement Detection
Demetrios Petrou, Victor Martinez-Gil, Francisco Castillo, Cihan Tunc and Renee Bryce
|
12:00 -1:00 PM |
Lunch Break |
1:00-2:00 AM
|
Keynote 4: Vinay Tripathi, Production Network Engineer @ Google, USA
Title: AI/ML Applications in Computer Networks
Meeting Link
Passcode: 196865
|
2:00 PM-3:00 PM |
IoTSMS Technical Session 5 |
Chair: Cihan Tunc
Meeting Link
Password: 164316
|
- Automated Hardware Auditing Testbed for UART and SPI based IoT Devices
Shivam Mishra, Aditya Ray, Manpreet Singh, S. Venkatesan and Anshu S. Anand
- AI-Enabled Plastic Pollution Monitoring System for Toronto Waterways
Benjamin Kelly, Shengkai Cheng, Eric Pengyu Zhou and Maher Elshakankiri
- Four-layer Architecture for IoT Security in Fog Network
Zahra Youssef, Hamza Gharsellaoui and Walid Barhoumi
|
2:00 PM-3:00 PM |
SDS Technical Session 5 |
Chair: Yuvaraj Munian
Meeting Link
|
- Integration of Blockchain in Computer Networking: Overview, Applications, and Future Perspectives for Software-defined Networking (SDN), Network Security and Protocols
Md Jobair Hossain Faruk and Jerry Q. Cheng
- A Reinforcement Learning Approach to Optimize Cache Prefetcher Aggressiveness at Run-Time
Matthew Adiletta, Farah Fargo, Mitchell Diamond, Jack Adiletta, Olivier Franza and Simon C Steely Jr.
- Enhancing Intrusion Detection Systems Accuracy Using Machine Learning
mohammad Sh daoud, Bayan Abu Shawar, Mohammad Alyafeai, Amro Essam, Mohammed Ghassan and Nahyan Alzaabi
|
2:00 PM-3:00 PM |
ICSC Technical Session 5 |
Chair: Izzat Smadi
Meeting Link
|
- Privacy-Preserving Genomic Analysis via PSO-Driven Federated Learning on Blockchain
Reza Nourmohammadi, Iman Behravan and Kaiwen Zhang
- Monitoring Privacy-Preserving Constraints in Microservices Architecture Through Parameter Formalisation
Elena Troubitsyna
- Suppressing Clutter and Jammer Interference in UAS Radar Sensors Using Space-Time Adaptive Processing
Issam Boukabou, Dulana Rupanetti and Naima Kaabouch
|
3:00-3:30 PM |
Coffee Break |
3:30-5:30 PM |
IoTSMS Technical Session 6 |
Chair: Cihan Tunc
Meeting Link
Password: 164316
|
- An Intrusion Detection Cyber Model for 5G Enabled IoT Networks
Asma Alnajjar, Mohammad Salman, Ala Mughaid, Yaser Jararweh and Shadi Alzubi
- IoT Based Smart Gate Access Control System
Muhammad Zeeshan Ansari and Imran Khan
- SIoTSim: Simulator for Social Internet of Things
Meriem Chiraz zouzou, mohamed shahawy, Elhadj Benkhelifa and Hisham Kholidy
- Bolstering the Mobile Cloud: Addressing Emerging Threats and Strengthening Multi-Layered Defenses for Robust Mobile Security
Sriram Vamsi Ilapakurthy
- A Survey on the Cybersecurity of IoT From The Perspective of SoC
Xianping Wang, Hao Qiu, Jiayue Shen and Weiru Chen
|
3:30-5:30 PM |
SDS Technical Session 6 |
Chair: Pradeeban Kathiravelu
Meeting Link
|
- A Survey on Trust Management in Flying Ad Hoc Networks: Challenges, Classifications and Analysis
Sihem Benfriha, Nabila Labraoui, Haythem Bany Salameh and Hafida Saidi
- Leveraging SDN for Real World Windfarm Process Automation Architectures
Soufiane hamadache, Elhadj Benkhelifa, Hisham kholidy, Pradeeban Kathiravelu and Brij B Gupta
- Vehicles Charging Using on the Go Wireless Power Transmission for Modern Cities
Bassam Harb, Omar Al Samahei, Abdullah Hussein, Mohammed Al Saafeen and Tariq Wasfi
- Routing in FD-enabled Cognitive Radio Networks with Minimum Time-sharing for Improved Performance
Ahmed Musa, Rami Halloush, Haythem Bany Salameh, Rami Bani Awwad, Sharhabeel Alnabelsi and Elhadj Benkhelifa
|
3:30-5:30 PM |
ICSC Technical Session 6 |
Chair: Yousef Sharrab
Meeting Link
|
- Design & development of virtual reality empowered cyber-security training testbed for IoT systems
Nikitha Donekal Chandrashekar, Kenneth King, Denis Gracanin and Mohamed Azab
- Enhancing Network Security Through Proactive Anomaly Detection: A Comparative Study of Auto-encoder Models and K-Nearest Neighbours Algorithm
Patrick Ansah, Sumit Kumar Tetarave, Ezhil Kalaimannan, Bibhuti Bhusan Dash and Caroline John
- Integrating Artificial Intelligence and Blockchain Technology for Enhanced US Homeland Security
Mayur Rele, Dipti Patil and Younes Boujoudar
- Examining Anticipated Massive MIMO 5G Network Attacks through Adversarial Examples
Dulana Rupanetti, Issam Boukabou and Naima Kaabouch
- Addressing the Public Health Misinformation Challenge with Real-time Data Fusion
Anoud Bani Hani, Haleama Alsabbah, Munir Majdalawieh, and Nawel Bessadet
|
6:30-09:00 PM |
Gala Dinner and Closing Ceremony
Resturent: Zocca Cuisine D Italia |