Program

October 29, 2019

8:00 Registration
09:00 Opening
09:15 Keynote 1
Lotfi ben Othmane
On the security of connected vehicles
10:30 Break
11:00 Session 1: Risk Analysis & management
Welderufael B. Tesfay, Dimitra Nastouli, Yannis C. Stamatiou and Jetzabel M. Serna
pQUANT: A User-centered Privacy Risk Analysis Framework.
Aida Omerovic, Hanne Vefsnmo, OddbjørnGjerde, Siri T. Ravndal and Are Kvinnesland.
An. Industrial Trial of an Approach to Identification and Modelling of Cybersecurity Risks in the Context of Digital Secondary Substations.
Carolina AdarosBoye, Paul Kearney and Mark Josephs.
Continuous Risk Management for Industrial IoT: a Methodological View.
Nazila Gol Mohammadi, Roman Wirtz and MarittaHeisel.
Systematic Asset Identification and Modeling During Requirements Engineering.
13:00 Lunch
14:00 Tutorial-1
Suraj Kothari
Software Model Checking (SMC) - an essential technology for cybersecurity
16:00 Break
16:30 Session 2: Access control & Permission
Adel Jebali, Sassi Salma and Abderrazak Jemai.
Inference Control in Distributed Environment : A Comparison Study.
Rajendra Kumar Solanki, Vijay Laxmi and Manoj Singh Gaur.
MAPPER: Mapping Application Description to Permissions.

October 30, 2019

8:00 Registration
09:15 Session 3: Secure Embedded Systems
Amina Bel Korchi and Nadia El Mrabet.
Delegation of Computation using FV cryptosystem.
Asma Chaouch, YssoufFangan Dosso, Laurent-Stéphane Didier, Nadia El .Mrabet, BouraouiOuni and Belgacem Bouallegue.
Hardware implementation of the modular multiplication in the AMNS representation.
Yuning Jiang, Yacine Atif, Jianguo Ding and Wei Wang.
A Semantic Framework With Humans in the Loop for Vulnerability-Assessment in Cyber-Physical Production Systems.
10:30 Break
11:00 Session 4: Network and cloud security
Mahmoud Abdellaoui and Imen Bouabidi.
A complete and generic security approach for wireless sensors network.
Aymen Abid, Rym Chéour, Abdennaceur Kachouri and Mohamed Abid.
Data monitoring for Wireless Sensor Networks using outlier detector strategies.
Karim Lounis and Mohammad Zulkernine.
WPA3 Connection Deprivation Attacks.
Firas Saidi, ZouheirTrabelsi and Henda Ben Ghezala.
An Approach for Thwarting Malicious Secret Channel: The case of IP Record Route Option Header-based Covert Channels.
Mariem Bouchaala, Cherif Ghazel and Leila AzzouzSaidane.
Toward Ciphertext Policy Attribute Based Encryption Model: A Revocable access control solution in Cloud Computing.
13:00 Lunch
14:00 Session 5: Information security policy
Mouna Rhahla, Sahar Allegue and Takoua Abdellatif.
A framework for GDPR compliance in Big Data systems.
Saad Altamimi, Dr.Karen Renaud and Dr.Tim Storer.
"I do it because they do it": Social-Neutralisation in Information Security Practices of Saudi Medical Interns.
15:00 Tutorial-2
Reda Yaich
16:00 Social Event & Dinner@Tunis

October 31, 2019

8:00 Registration
09:15 Keynote 2
Takoua Abdellatif
GDPR compliance in IoT systems
10:30 Break
11:00 Session 6: Data protection and Machine learning for security
Mario Parreño-Centeno, Mohammed Aamir Ali, Yu Guan and Aad van Moorsel.
Unsupervised Machine Learning for Card Payment Fraud Detection.
Hela Mliki, Abir Haj Kacem and Lamia Chaari.
Intrusion Detection Study and Enhancement using Machine Learning
Routa Moussaileb, Nora Cuppens-Boulahia, Jean-Louis Lanet, Charles Berti and Guillaume De Boisdeffre.
Watch Out! Doxware on The Way…
Anissa Zenati, Wael Ouarda and Adel Alimi.
CDISS-BEMOS: A New Color Document Image Steganography System Based on Beta Elliptic Modeling of The Online Signature.
13:00 Lunch
14:00 Session 7: Distributed detection system and Blockchain
Ismael Bouassida Rodriguez and Amal Gassara.
A graph based model for UAVs group-wide collaboration applied on an anti-terrorism scenario.
Amal Abid, Saoussen Cheikhrouhou, Slim Kallel and Mohamed Jmaiel.
Modelling and Executing Time-aware Processes in Trustless Blockchain Environment.
Fatima Ezzahra Ouerfelli, Khaled Barbaria, Belhassen Zouari and Claude Fachkha.
Multi-Scale Adaptive Threshold for DDoS Detection.
Linus Karlsson, Pegah Nikbakht Bideh and Martin Hell.
A Recommender System for User-Specific Vulnerability Scoring.
Fatima Ezzahra Ouerfelli, Khaled Barbaria, Belhassen Zouari and Claude Fachkha.
Distributed Detection System Using Wavelet Decomposition and Chi-Square Test.