BEGIN:VCALENDAR
CALSCALE:GREGORIAN
VERSION:2.0
X-WR-CALNAME:[IEEE CSR] Technical session WS-ACTI
METHOD:PUBLISH
PRODID:-//Apple Inc.//macOS 12.4//EN
BEGIN:VTIMEZONE
TZID:Europe/Athens
BEGIN:DAYLIGHT
TZOFFSETFROM:+0200
RRULE:FREQ=YEARLY;BYMONTH=3;BYDAY=-1SU
DTSTART:19810329T030000
TZNAME:EEST
TZOFFSETTO:+0300
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0300
RRULE:FREQ=YEARLY;BYMONTH=10;BYDAY=-1SU
DTSTART:19961027T040000
TZNAME:EET
TZOFFSETTO:+0200
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
ORGANIZER;CN=IEEE CSR:mailto:info@ieee-csr.org
TRANSP:OPAQUE
DTEND;TZID=Europe/Athens:20220729T170000
UID:356F5988-9E86-4544-97D9-45995A506526
DTSTAMP:20220709T124153Z
LOCATION:https://www.ieee-csr.org/
DESCRIPTION:Room: Nafsika\n\n14:20–14:40 CET\nWelcome by the ACTI Chair\
 n\n14:40–15:00 CET\nTowards continuous enrichment of cyber threat intell
 igence: A study on a honeypot dataset\n\n15:00–15:20 CET\nCombining text
  analysis techniques with unsupervised machine learning methodologies fo
 r improved software vulnerability management
URL;VALUE=URI:https://www.ieee-csr.org/
SEQUENCE:1
SUMMARY:[IEEE CSR] Technical session WS-ACTI
LAST-MODIFIED:20220709T131541Z
DTSTART;TZID=Europe/Athens:20220729T152000
CREATED:20220709T124153Z
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
BEGIN:VALARM
UID:478C33DA-73DE-4B65-8072-774C3A213B01
ACTION:NONE
TRIGGER;VALUE=DATE-TIME:19760401T005545Z
X-WR-ALARMUID:478C33DA-73DE-4B65-8072-774C3A213B01
END:VALARM
BEGIN:VALARM
UID:7A9C8F93-A9E5-4025-9EF7-92FB889B5E9B
ACTION:AUDIO
TRIGGER:-P1D
ATTACH;VALUE=URI:Chord
X-WR-ALARMUID:7A9C8F93-A9E5-4025-9EF7-92FB889B5E9B
END:VALARM
BEGIN:VALARM
UID:401E3110-2EDA-490E-ADD4-708DBBF4DC72
ACTION:AUDIO
TRIGGER:-PT1H
ATTACH;VALUE=URI:Chord
X-WR-ALARMUID:401E3110-2EDA-490E-ADD4-708DBBF4DC72
END:VALARM
BEGIN:VALARM
UID:DDDFAFC8-25C4-458E-9B0D-3290CB63FD90
ACTION:AUDIO
TRIGGER:-PT15M
ATTACH;VALUE=URI:Chord
X-WR-ALARMUID:DDDFAFC8-25C4-458E-9B0D-3290CB63FD90
END:VALARM
END:VEVENT
END:VCALENDAR
