Loading...

CSR Workshops’ Program

Wednesday, July 27

All sessions are held in Nafsika room


10:00–11:40 CET

Technical session WS-DS4CS-1

Chair: C. Tryfonopoulos, University of the Peloponnese (GR)
Room: Nafsika

10:00–10:20

Welcome by the DS4CS Chairs

C. Tryfonopoulos, S. Skiadopoulos, and A. Marnerides

10:20–11:00

Invited talk: AI: Ultimate threat or ultimate solution to cyber challenges?

A. Mauthe

[More details]

11:00–11:20

Employing social network analysis to dark web communities

S. Nikoletos and P. Raftopoulou

11:20–11:40

Phishing detection using machine learning algorithm

J. Tanimu and S. Shiaeles

11:40–12:00 CET

Coffee break

12.00–13:20 CET

Technical session WS-DS4CS-2

Chair: C. Tryfonopoulos, University of the Peloponnese (GR)
Room: Nafsika

12.00–12:20

Machine learning-based ransomware detection using low-level memory access patterns obtained from live-forensic hypervisor

M. Hirano and R. Kobayashi

12.20–12:40

A Bayesian model combination based approach to active malware analysis

A. Hota and J. Schonwalder

12.40–13:00

A comprehensive API call analysis for detecting Windows-based ransomware

P. Mohan Anand, P. V. Sai Charan, and S. K. Shukla

13:20–15:00 CET

Lunch break

15.00–16:00 CET

Technical session WS-MCS-1

Chair: L. Maglaras, De Montfort University (UK)
Room: Nafsika

15.00–15:20

Welcome by the MCS Chairs

L. Maglaras, C. Douligeris, D. Polemi, V. Vlachos, Y. He, I. Kantzavelou

15.20–16:00

Invited talk: Geopolitical crisis impacts maritime cybersecurity

D. Polemi

[More details]

16:00–16:20 CET

Coffee break

16:20–18:00 CET

Technical session WS-MCS-2

Chair: L. Maglaras, De Montfort University (UK)
Room: Nafsika

16:20–16:40

A multi-level trust framework for the Internet of underwater things

A. Almutairi, Y. He, and S. Furnell

16:40–17:00

FFDA: A novel four-factor distributed authentication mechanism

J. Edwards, F. Aparicio-Navarro, L. Maglaras, and C. Douligeris

17:00–17:20

A supply chain service cybersecurity certification scheme based on the cybersecurity act

A. Michota and N. Polemi

17:20–17:40

Training the maritime security operations centre teams

M. Raimondi, G. Longo, A. Merlo, A. Armando, and E. Russo

17:40–18:00

Cybersecurity at merchant shipping

E. D. Charitos, N. A. Kounalakis, and I. Kantzavelou

Thursday, July 28

All sessions are held in Nafsika room


10:00–11:40 CET

Technical session WS-CRE-1

Chair: N. J. Multari, Pacific Northwest National Lab (US)
Room: Nafsika

10:00–10:20

Welcome by the CRE Chairs

N. J. Multari and R. McQuaid

10:20–10:40

Policy-based profiles for intrusion response systems

K. Hughes

10:40–11:20

Invited talk: Towards trustworthy AI: The European human-centered approach

G. Sharkov

[More details]

11:40–12:00 CET

Coffee break

12.00–13:20 CET

Technical session WS-CRST

Chair: A. Amditis, Institute of Communication and Computer Systems (GR)
Room: Nafsika

12.00–12:20

Welcome by the CRST Chairs

T. Tsikrika, A. Amditis, G. Kokkinis, and D. Kavallieros

12.20–12:40

Leveraging cyber ranges for prototyping, certification and training: The ECHO case

N. Mengidis, M. Bozhilova, C. Ceresola, C. Colabuono, M. Cooke, G. Depaix, A. Genchev, G. Koykov, W. Mees, M. Merialdo, A. Voulgaridis, T. Tsikrika, K. Votis, and S. Vrochidis

12.40–13:00

Design and proof of concept of a prediction engine for decision support during cyber range attack simulations in the maritime domain

M. Antonopoulos, G. Drainakis, E. Ouzounoglou, G. Papavassiliou, and A. Amditis

13:20–16:20 CET

Break

16:20–18:00 CET

Technical session WS-CRE-2

Chair: N. J. Multari, Pacific Northwest National Lab (US)
Room: Nafsika

16:20–16:40

Recap by the CRE Chairs

N. J. Multari and R. McQuaid

16:40–17:00

Using potential effects on threat events (PETE) to assess mitigation effectiveness and return on investment (ROI)

D. Bodeau, R. Graubart, and R. Mcquaid

17:00–17:40

Invited talk: The top 10 challenges (Ty’s and Cy’s) on the road to cyber resiliency

S. Foote and S. Foote

[More details]

18:00–18:20 CET

Coffee break

18:20–20:00 CET

Technical session WS-CRE-3

Chair: N. J. Multari, Pacific Northwest National Lab (US)
Room: Nafsika

18:20–18:40

Process mining for asymmetric cybersecurity audit

R. Turner

18:40–19:40

Panel discussion: Potential support and obstructions to cyber resilience

P. Nielsen, G. Sharkov, S. Foote, and S. Foote

[More details]

Friday, July 29

All sessions are held in Nafsika room


10:00–11:40 CET

Technical session WS-EPES-SPR

Chair: P. Sarigiannidis, University of Western Macedonia (GR)
Room: Nafsika

10:00–10:20

Welcome by the EPES-SPR Chair

P. Sarigiannidis

10:20–10:40

Protecting IEC 60870-5-104 ICS/SCADA systems with honeypots

E. Grigoriou, A. Liatifis, P. Radoglou-Grammatikis, T. Lagkas, I. Moscholios, E. Markakis, and P. Sarigiannidis

10:40–11:00

Risk analysis of DNP3 attacks

V. Kelli, P. Radoglou-Grammatikis, T. Lagkas, E. Markakis, and P. Sarigiannidis

11:00–11:20

Privacy preserving human activity recognition using microaggregated generative deep learning

A. Aleroud, M. Shariah, and R. Malkawi

11:20–11:40

Current drainage induced by bias injection attack against Kalman filter of BLDC motor

Y. Boiko, I. Kiringa, and T. Yeap

11:40–14:20 CET

Break

14:20–16:00 CET

Technical session WS-ACTI

Chair: V. Katos, Bournemouth University (UK)
Room: Nafsika

14:20–14:40

Welcome by the ACTI Chair

V. Katos

14:40–15:00

Towards continuous enrichment of cyber threat intelligence: A study on a honeypot dataset

A. Spyros, A. Papoutsis, I. Koritsas, N. Mengidis, C. Iliou, D. Kavallieros, T. Tsikrika, S. Vrochidis, and I. Kompatsiaris

15:00–15:20

Combining text analysis techniques with unsupervised machine learning methodologies for improved software vulnerability management

M. Anastasiadis, G. Aivatoglou, G. Spanos, A. Voulgaridis, and K. Votis