Program
October 29, 2019
8:00 | Registration |
09:00 | Opening |
09:15 |
Keynote 1
Lotfi ben Othmane On the security of connected vehicles |
10:30 | Break |
11:00 |
Session 1: Risk Analysis & management Welderufael B. Tesfay, Dimitra Nastouli, Yannis C. Stamatiou and Jetzabel M. Serna pQUANT: A User-centered Privacy Risk Analysis Framework. Aida Omerovic, Hanne Vefsnmo, OddbjørnGjerde, Siri T. Ravndal and Are Kvinnesland. An. Industrial Trial of an Approach to Identification and Modelling of Cybersecurity Risks in the Context of Digital Secondary Substations. Carolina AdarosBoye, Paul Kearney and Mark Josephs. Continuous Risk Management for Industrial IoT: a Methodological View. Nazila Gol Mohammadi, Roman Wirtz and MarittaHeisel. Systematic Asset Identification and Modeling During Requirements Engineering. |
13:00 | Lunch |
14:00 |
Tutorial-1
Suraj Kothari Software Model Checking (SMC) - an essential technology for cybersecurity |
16:00 | Break |
16:30 |
Session 2: Access control & Permission Adel Jebali, Sassi Salma and Abderrazak Jemai. Inference Control in Distributed Environment : A Comparison Study. Rajendra Kumar Solanki, Vijay Laxmi and Manoj Singh Gaur. MAPPER: Mapping Application Description to Permissions. |
October 30, 2019
8:00 | Registration |
09:15 |
Session 3: Secure Embedded Systems Amina Bel Korchi and Nadia El Mrabet. Delegation of Computation using FV cryptosystem. Asma Chaouch, YssoufFangan Dosso, Laurent-Stéphane Didier, Nadia El .Mrabet, BouraouiOuni and Belgacem Bouallegue. Hardware implementation of the modular multiplication in the AMNS representation. Yuning Jiang, Yacine Atif, Jianguo Ding and Wei Wang. A Semantic Framework With Humans in the Loop for Vulnerability-Assessment in Cyber-Physical Production Systems. |
10:30 | Break |
11:00 |
Session 4: Network and cloud security Mahmoud Abdellaoui and Imen Bouabidi. A complete and generic security approach for wireless sensors network. Aymen Abid, Rym Chéour, Abdennaceur Kachouri and Mohamed Abid. Data monitoring for Wireless Sensor Networks using outlier detector strategies. Karim Lounis and Mohammad Zulkernine. WPA3 Connection Deprivation Attacks. Firas Saidi, ZouheirTrabelsi and Henda Ben Ghezala. An Approach for Thwarting Malicious Secret Channel: The case of IP Record Route Option Header-based Covert Channels. Mariem Bouchaala, Cherif Ghazel and Leila AzzouzSaidane. Toward Ciphertext Policy Attribute Based Encryption Model: A Revocable access control solution in Cloud Computing. |
13:00 | Lunch |
14:00 |
Session 5: Information security policy Mouna Rhahla, Sahar Allegue and Takoua Abdellatif. A framework for GDPR compliance in Big Data systems. Saad Altamimi, Dr.Karen Renaud and Dr.Tim Storer. "I do it because they do it": Social-Neutralisation in Information Security Practices of Saudi Medical Interns. |
15:00 |
Tutorial-2
Reda Yaich |
16:00 | Social Event & Dinner@Tunis |
October 31, 2019
8:00 | Registration |
09:15 |
Keynote 2
Takoua Abdellatif GDPR compliance in IoT systems |
10:30 | Break |
11:00 |
Session 6: Data protection and Machine learning for security Mario Parreño-Centeno, Mohammed Aamir Ali, Yu Guan and Aad van Moorsel. Unsupervised Machine Learning for Card Payment Fraud Detection. Hela Mliki, Abir Haj Kacem and Lamia Chaari. Intrusion Detection Study and Enhancement using Machine Learning Routa Moussaileb, Nora Cuppens-Boulahia, Jean-Louis Lanet, Charles Berti and Guillaume De Boisdeffre. Watch Out! Doxware on The Way… Anissa Zenati, Wael Ouarda and Adel Alimi. CDISS-BEMOS: A New Color Document Image Steganography System Based on Beta Elliptic Modeling of The Online Signature. |
13:00 | Lunch |
14:00 |
Session 7: Distributed detection system and Blockchain Ismael Bouassida Rodriguez and Amal Gassara. A graph based model for UAVs group-wide collaboration applied on an anti-terrorism scenario. Amal Abid, Saoussen Cheikhrouhou, Slim Kallel and Mohamed Jmaiel. Modelling and Executing Time-aware Processes in Trustless Blockchain Environment. Fatima Ezzahra Ouerfelli, Khaled Barbaria, Belhassen Zouari and Claude Fachkha. Multi-Scale Adaptive Threshold for DDoS Detection. Linus Karlsson, Pegah Nikbakht Bideh and Martin Hell. A Recommender System for User-Specific Vulnerability Scoring. Fatima Ezzahra Ouerfelli, Khaled Barbaria, Belhassen Zouari and Claude Fachkha. Distributed Detection System Using Wavelet Decomposition and Chi-Square Test. |