2024 IEEE International Conference on Cyber Security and Resilience




If you would like to create a personalized program, check the boxes next to the sessions you would like to attend, then click the Create My Program button at the bottom of the page. You may then save or print your personalized program through your browser.

Please be aware that the timeslots in the program are based on the conference location's timezone and note that the conference enforces a strict policy regarding no-show papers.


Only show sessions for the following day:

MONDAY, 2 SEPTEMBER 2024
OTHER8:40-9:00 WelcomeChair: IEEE CSR Chairs
 
TRACK19:00-10:20 CSR 1Chair: Ali Ismail Awad
United Arab Emirates University
Tower Suite A
 09:00-09:20A Hybrid Ensemble Learning-based Intrusion Detection System For The Internet Of Things
Mohammed M. Alani, Toronto Metropolitan University, Ali Ismail Awad, United Arab Emirates University, Ezedin Barka, United Arab Emirates University
 09:20-09:40Verifying The Robustness Of Machine Learning Based Intrusion Detection Against Adversarial Perturbation
Ehsan Nowroozi, Ravensbourne University London, Rahim Taheri, University of Portmouth, Mehrdad Hajizadeh, Technische Universitat Chemnitz, Thomas Bauschert, Technische Universitat Chemnitz
 09:40-10:00Rebotdetector: A Detection Model With Lstm Feature Extractor For Session-replay Web Bot Attacks
Shadi Sadeghpour, The Citadel, Natalija Vlajic, York University
 10:00-10:20Explainable Federated Learning For Botnet Detection In Iot Networks
Rajesh Kalakoti, Taltech, Hayretdin Bahsi, Taltech and Northern Arizona University, United States, Sven Nomm, Taltech
TRACK19:00-10:20 CSR 2Chair: Gabor Visky
Tallinn University of Technology
Tower Suite C
 09:00-09:20A Version-based Algorithm For Quality Enhancement Of Automatically Generated Vulnerability Inventories
Silvia Bonomi, Sapienza Universita di Roma, Marco Cuoci, Sapienza Universita di Roma, Simone Lenti, Sapienza Universita di Roma
 09:20-09:40Asset-centric Threat Modeling For Ai-based Systems
Jan von der Assen, Jamo Sharif, Chao Feng
 09:40-10:00When Rewards Deceive: Counteracting Reward Poisoning On Online Deep Reinforcement Learning
Myria Bouhaddi, Universite du Quebec en Outaouais, kamel Adi, Universite du Quebec en Outaouais
TRACK29:00-10:20 2P-DPA1Chair: Salvatore D’Antonio
University of Naples Parthenope (IT)
More London Suite
 09:00-09:20Dscs: Towards An Extensible Secure Decentralised Distributed Computation Protocol
Alexander Dalton, Imperial College London, David Thomas, University of Southampton, Peter Cheung, Imperial College London
 09:20-09:40A Novel Approach For Securing Federated Learning: Detection And Defense Against Model Poisoning Attacks
Giovanni Maria Cristiano, Salvatore D'Antonio, University of Napoli Parthenope, Federica Uccello
 09:40-10:00Secure And Transparent Data Sharing Among Connected Devices: Integrating Data Spaces And Provenance
Roberto Nardone, Univ. of Naples Parthenope, Alfredo Petruolo, Univ. of Naples Parthenope, Federica Uccello, Univ. of Naples Parthenope
 10:00-10:20Enhancing Healthcare Data Confidentiality Through Decentralized Tee Attestation
Salvatore D'Antonio, Jonah Giglio, Giovanni Mazzeo, Federica Uccello, Teresa Mannarino
 10:20-10:40 Coffee BreakChair: IEEE CSR Chairs
Tower Foyer
TRACK110:40-12:00 CSR 3Chair: Valeria Rossi
Universita degli Studi dell’Insubria
Tower Suite A
 10:40-11:00Are Ids Violating Segmentation In Industrial Networks?
Giovanni Battista Gaggero, University of Genova, Roberto Caviglia, HWG Sababa Security s.p.a., Paola Girdinio, University of Genova, Mario Marchese, University of Genova
 11:00-11:20New Approach To Shorten Feature Set Via Tf-idf For Machine Learning-based Webshell Detection
Viet Anh Phan, Department of Telecommunications, Brno University of Technology, Jan Jerabek, Department of Telecommunications, Brno University of Technology, Dinh Khanh Le, Center 286, Cyber Command, Tomas Gotthans, Department of Radio Electronics
 11:20-11:40Anomaly Detection In Operational Technology Systems Using Non-intrusive Load Monitoring Based On Supervised Learning
Adam Schroeder, Naval Postgraduate School, Patrick McClure, Naval Postgraduate School, Preetha Thulasiraman, Naval Postgraduate School
 11:40-12:00Can Deep Learning Detect Fake News Better When Adding Context Features?
Rachel Ladouceur, Quebec University of Chicoutimi, Abubakr Hassan, Computer Science and Software Engineering, Fehmi Jaafar, Quebec University of Chicoutimi, Mohamed Mejri, Computer Science and Software Engineering
TRACK110:40-12:00 CSR 4Chair: Cyprien De La Vergne De Cerval
Institut de Radioprotection et de Surete Nucleaire
Tower Suite C
 10:40-11:00Building A Use Case-driven Adversarial Threat Matrix: A Comprehensive Approach
Prodromos Kiriakidis, CERTH-ITI, Efi Kafali, CERTH-ITI, Georgios Rizos, CERTH-ITI, Antonis Voulgaridis, CERTH-ITI, Theodoros Semertzidis, CERTH-ITI, Stephane Gazut, CEA, Petros Daras, CERTH-ITI, Konstantinos Votis, CERTH-ITI
 11:00-11:20Third-party Cloud Risk Management
Breno Pinto
 11:20-11:40A Trust Management Delegation Protocol For Fog Computing Applications
Phongsathon Fongta, University of Strathclyde, Sotirios Terzis, University of Strathclyde
 11:40-12:00Ai-based Attacker Models For Enhancing Multi-stage Cyberattack Simulations In Smart Grids Using Co-simulation Environments
Omer Sen, Digital Energy at Fraunhofer FIT, Christoph Pohl, IAEW at RWTH Aachen Univserity, Immanuel Hacker, Digital Energy at Fraunhofer FIT, Markus Stroot, IAEW at RWTH Aachen Univserity, Andreas Ulbig, IAEW at RWTH Aachen Univserity
TRACK210:40-12:00 2P-DPA2Chair: Salvatore D’Antonio
University of Naples Parthenope (IT)
More London Suite
 10:40-11:00Simplifying Differential Privacy For Non-experts: The Encrypt Project Approach
Stelios Erotokritou, Eight Bells Ltd, Ioannis Giannoulakis, Eight Bells Ltd, Emmanouil Kafetzakis, Eight Bells Ltd, Konstantinos Kaltakis, Eight Bells Ltd
 11:00-11:20Zadig: A Novel Extended Detection And Response System
Stefano Perone, Universita Campus Bio-Medico di Roma, Luca Faramondi, Universita Campus Bio-Medico di Roma, Simone Guarino, Universita Campus Bio-Medico di Roma, Roberto Setola, Universita Campus Bio-Medico di Roma, Martina Nobili, Universita Campus Bio-Medico di Roma, Ernesto del Prete, INAIL, Giovanni Patruno, bitCorp, Luca Piccirillo, bitCorp, Annunziata Laurenda, bitCorp
 11:20-11:40Towards Gpu Accelerated Fhe Computations
Orion Papadakis, The University of Manchester, Michail Papadimitriou, The University of Manchester, Athanasios Stratikopoulos, The University of Manchester, Maria Xekalaki, The University of Manchester, Juan Fumero, The University of Manchester, Nikos Foutris, The University of Manchester, Christos Kotselidis, The University of Manchester
 11:40-12:00Towards A Generic Framework For Knowledge Graph Construction: The Healthcare Domain
Christina Karalka, School of Informatics, Aristotle University of Thessaloniki, \\ Thessaloniki, Georgios Meditskos, School of Informatics, Aristotle University of Thessaloniki, \\ Thessaloniki, Maria Papoutsoglou, School of Informatics, Aristotle University of Thessaloniki, \\ Thessaloniki, Nick Bassiliades, School of Informatics, Aristotle University of Thessaloniki, \\ Thessaloniki
 12:00-13:00 Keynote Lecture - Building cyber security resilience through educationChair: Stavros Shiaeles
University of Portsmouth
Tower Suite A
 13:00-14:00 Lunch BreakChair: IEEE CSR Chairs
Tower Foyer
TRACK114:00-15:40 CSR 5Chair: Sven Glatzer
University of Portsmouth
Tower Suite A
 14:00-14:20Navigating (in)security Of Ai-generated Code
Sri Haritha Ambati, University of Saskatchewan, Norah Ridley, University of Saskatchewan, Enrico Branca, University of Saskatchewan, Natalia Stakhanova, University of Saskatchewan
 14:20-14:40Enabling Cyber Threat Intelligence Sharing For Resource Constrained Iot
August Karlsson, RISE Research Institutes of Sweden AB, Rikard Hoglund, RISE Research Institutes of Sweden AB, Han Wang, RISE Research Institutes of Sweden AB, Alfonso Iacovazzi, RISE Research Institutes of Sweden AB, Shahid Raza, RISE Research Institutes of Sweden AB
 14:40-15:00Unraveling The Threat Landscape Of Cps: Modbus Tcp Vulnerabilities In The Era Of I4.0
Georgios Lazaridis, CERTH & IHU, Anastasios Drosou, Centre for Research and Technology Hellas, Periklis Chatzimisios, International Hellenic University & University of New Mexico - USA, Dimitrios Tzovaras, Centre for Research and Technology Hellas
 15:00-15:20Zero To Trust? Bringing Application-level Intelligence At Scale To Detection Engineering
Fatih Gey, SAP SE, Cedric Hebert, Holger Mack
 15:20-15:40Novel Approach To Tor User De-anonymization: Client-side Generated Watermark
Natalija Vlajic, York University, Daniel Brown, York University
TRACK114:00-15:40 CSR 6Chair: Soraya Harding
University of Portsmouth
Tower Suite C
 14:00-14:20Deep Graph Learning For Ddos Detection And Multi-class Classification Ids
Braden Saunders, Brock University, Robson E. De Grande, Brock University, Glaucio Carvalho, Brock University, Isaac Woungang, Toronto Metropolitan University
 14:20-14:40Use Of Visibility Graphs For The Early Detection Of Dos Attacks
João Lopes, Instituto Politecnico de Viana do Castelo, Pedro Pinto, Instituto Politecnico de Viana do Castelo, Alberto Partida, Data, Complex Networks and Cybersecurity Sciences Technological Institute, Rey Juan Carlos University, Antonio Pinto, CIICESI, ESTG, Instituto Politecnico do Porto
 14:40-15:00A2hd: Adaptive Adversarial Training For Hyperdimensional Computing-based Intrusion Detection Against Adversarial Attacks
Onat Gungor, University of California, San Diego, Tajana Rosing, University of California, San Diego, Baris Aksanli, San Diego State University
 15:00-15:20Emerging Trends In 5g Malicious Traffic Analysis: Enhancing Incremental Learning Intrusion Detection Strategies
Zihao Wang, Singapore Technologies Engineering Cybersecurity Strategic Technology Centre, Kar Wai Fok, Singapore Technologies Engineering Cybersecurity Strategic Technology Centre, Vrizlynn Thing, Singapore Technologies Engineering Cybersecurity Strategic Technology Centre
 15:20-15:40Multi-blockchain Model For Iot Devices Forensic Investigations On Spidernet
Soraya Harding, University of Portsmouth
TRACK214:00-15:40 SPARCChair: Neetesh Saxena
Cardiff University (UK)
More London Suite
 14:00-14:20Active Honeyfiles For Ransomware Encryption Mitigation
Ioannis Stamelos, Technical University of Crete, George Hatzivasilis, Technical University of Crete, Sotiris Ioannidis, Technical University of Crete
 14:20-14:40Adversarial Attacks In Intrusion Detection Systems: Triggering False Alarms In Connected And Autonomous Vehicles
Fatimah Aloraini, Cardiff University, Amir Javed, Cardiff University
 14:40-15:00Towards Developing An Asset-criticality Identification Framework In Smart Grids
Yazeed Alrowaili, Cardiff University, UK, Neetesh Saxena, Cardiff University, UK, Pete Burnap, Cardiff University, UK
 15:00-15:20Foundations For Modelling Conscientious Attacking In Electromagnetic Cyberspace
Nigel Davies, Bournemouth University, Huseyin Dogan, Bournemouth University, Duncan Ki-Aries, Bournemouth University, Nan Jiang, Bournemouth University, Chris Williams, DSTL
 15:20-15:40The Impact Of Gps Interference In The Middle East
Vasilis Ieropoulos, Cardiff University
 15:40-16:00 Coffee BreakChair: IEEE CSR Chairs
Tower Foyer
TRACK116:00-17:20 CSR 7Chair: Utku Budak
Technical University of Munich
Tower Suite A
 16:00-16:20A Forensic Framework For Screen Capture Validation In Legal Contexts
Claudia Greco, Michele Ianni, Giuseppe Seminara, Antonella Guzzo, Giancarlo Fortino
 16:20-16:40A Systematic Review Of Cybersecurity Audit Frameworks For The Internet Of Things
Danielle Hanson, North Dakota State University, Jeremy Straub, North Dakota State University
 16:40-17:00A Survey Of Digital Forensic Tools For Android And Ios Smart Phones
Sthembile Ntshangase, Csir, Norman Nelufule, Csir, David Mulihase, Csir, Mamello Mtshali, CSIR, Chantel Mokoena, CSIR, Palesa Moloi, CSIR
 17:00-17:20Active Learning-based Mobile Malware Detection Utilizing Auto-labeling And Data Drift Detection
Zhe Deng, Tallinn University of Technology, Arthur Hubert, University of Luxembourg, Sadok Ben Yahia, Tallinn University of Technology, Hayretdin Bahsi, Tallinn University of Technology
TRACK116:00-17:20 CSR 8Chair: Alessandro Zamponi
Politecnico di Torino
Tower Suite C
 16:00-16:20Rigorous Evaluation Of Machine Learning-based Intrusion Detection Against Adversarial Attacks
Onat Gungor, University of California San Diego, Elvin Li, University of California San Diego, Zhengli Shang, University of California San Diego, Yutong Guo, University of California San Diego, Jing Chen, University of California San Diego, Johnathan Davis, University of California San Diego, Tajana Rosing, University of California San Diego
 16:20-16:40A Hybrid Anomaly Detection Approach For Obfuscated Malware
Gerard Shu Fuhnwi, Montana State University, Matthew Revelle, Montana State University, Clemente Izurieta, Montana State University
 16:40-17:00Ransomware Detection: Ensemble Machine Learning Models Using Disjoint Data
Charles Michael Ribeiro da Silva, Tecnological Institute of Aeronautics, Paulo Andre Lima de Castro, Tecnological Institute of Aeronautics, Cecilia de Azevedo Castro Cesar, Tecnological Institute of Aeronautics
 17:00-17:20Towards Live Detection Of Ransomware Attacks
Kumar Thummapudi, University of Texas at San Antonio, Rajendra Boppana, University of Texas at San Antonio, Palden Lama, University of Texas at San Antonio
TRACK216:00-17:20 SDGCPChair: Samira Maghool & Faiza Allah Bukhsh
More London Suite
 16:00-16:20Synthetic Data For Identifying Inclusive Language (case Study: Job Descriptions In Italian)
Tommaso Romano', University of Milan, Fatemeh Mohammadi, University of Milan, Paolo Ceravolo, University of Milan
 16:20-16:40Active Learning Methodology In Large Language Models Fine-tuning
Paolo Ceravolo, University of Milan, Fatemeh Mohammadi, University of Milan, Marta Annamaria Tamborini, University of Milan


TUESDAY, 3 SEPTEMBER 2024
TRACK29:00-10:20 CRE 1Chair: Nicholas J. Multari & Rosalie McQuaid
More London Suite
 09:00-09:20Cyber Resilience In Ot: Characteristics And Security Challenges
Marius Cotiga, Terma A/S, Jens Myrup Pedersen, Aalborg University, Edlira Dushku, Aalborg University
 09:20-09:40Framework For Quantitative Evaluation Of Resilience Solutions: An Approach To Determine The Value Of Resilience For A Particular Site
Mark Weimar, Pacific Northwest National Laboratory
 09:40-10:00Pentestai An Llm-powered Multi-agent Framework For Penetration Testing Automation Leveraging Mitre Attack
Stanislas G. Bianou, Independent Researcher, Rodrigue G. Batogna, School of Science University of Namibia
 10:00-10:20Taxonomy Of Cyber Risk Mitigation Cost Benefit Analysis Methods For Energy Infrastructure
Yvonne Kam, University of Plymouth, Kimberly Tam, University of Plymouth, Kevin Jones, University of Plymouth, Robert Rawlinson-Smith, University of Plymouth
TRACK19:00-10:20 CSR 10Chair: Georgios Lazaridis
CERTH-ITI
Tower Suite C
 09:00-09:20Vehicular Network Security Against Rf Jamming: An Lstm Detection System
Mubashir Murshed, Brock University, Afrin Jubaida, Brock University, Robson E. De Grande, Brock University, Glaucio Haroldo Silva de Carvalho, Brock University
 09:20-09:40From Data To Defense: Real-time Detection Of Botnets In Iot Using Lstm Networks
Shadi Sadeghpour, The Citadel, Farhath Zareen, The Citadel, William Johnson, The Citadel
 09:40-10:00Harnessing Ti Feeds For Exploitation Detection
Kajal Patel, Zubair Shafiq, Mateus Nogueira, Daniel Sadoc Menasche, Enrico Lovat, Taimur Kashif, Ashton Woiwood, University of Iowa, Matheus Martins, Siemens
 10:00-10:20Attack-specific Feature Construction To Detect Malicious Tcp Flows
Vasudha Vedula, University of Texas at San Antonio, Rajendra Boppana, University of Texas at San Antonio, Palden Lama, University of Texas at San Antonio
TRACK19:00-10:20 CSR 9Chair: Zhe Deng
Tallinn University of Technology
Tower Suite A
 09:00-09:20Automatic Discovery Of Cyberattacks
Guillaume Hutzler, IBISC, Univ. Evry, Universite Paris-Saclay, Hanna Klaudel, Univ. d’Evry Val d'Essonne, Witold Klaudel, SafeTech Cybernetics / IRT SystemX, Franck Pommereau, IBISC, Univ. Evry, Universite Paris-Saclay, Artur Rataj, IRT SystemX
 09:20-09:40Leveraging Threat Modelling For Effective Penetration Testing In 5g Systems
Luca Chianese, Daniele Granata, University of Campania Luigi Vanvitelli, Paolo Palmiero, University of Campania Luigi Vanvitelli, Massimiliano RAK, University of Campania Luigi Vanvitelli
 09:40-10:00The Danger Within: Insider Threat Modeling Using Business Process Models
Jan von der Assen, Jasmin Hochuli, Thomas Grubl
 10:00-10:20Data Siphoning In Icss: Attack Tree And Role Of Cryptoperiods
Natalija Vlajic, York University, Gabriele Cianfarani, York University, Robert Noce, SAP, Cloud-Native Architecture, Innovation, & Research
 10:20-10:40 Coffee BreakChair: IEEE CSR Chairs
Tower Foyer
TRACK110:40-12:00 CSR 11Chair: Maryam Zahid
Malardalen University
Tower Suite A
 10:40-11:00Defencerank – Ranking Based Attack Graph Analysis And Defence Prioritization
Rajendra Shivaji Patil, KTH Royal Institute of Technology Stockholm, Sweden, Markus Dypbukt Kallman, KTH Royal Institute of Technology Stockholm, Sweden, Viktoria Fodor, KTH Royal Institute of Technology Stockholm, Sweden
 11:00-11:20On The Iso Compliance Of Model-based Risk Assessment For Autonomous Cyber-physical Production Systems
Maryam Zahid, Malardalen University, Alessio Bucaioni, Malardalen University, Francesco Flammini, Malardalen University
 11:20-11:40Empirical Analysis And Practical Assessment Of Ransomware Attacks To Data In Motion
Raul Reinosa Simon, Universitat Politecnica de Valencia, Clara I. Valero, Universitat Politecnica de Valencia, Jose A. Martinez Cadenas, Universitat Politecnica de Valencia, Elisa R. Heymann, University of Wisconsin, Ignacio Lacalle, Universitat Politecnica de Valencia, Barton P. Miller, University of Wisconsin, Carlos E. Palau, Universitat Politecnica de Valencia
 11:40-12:00Investigating The Health State Of X.509 Digital Certificates
Simone Orlando, Politecnico di Milano, Alessandro Barenghi, Politecnico di Milano, Gerardo Pelosi, Politecnico di Milano
TRACK110:40-12:00 CSR 12Chair: Alfonso Iacovazzi
RISE Research Institutes of Sweden AB
Tower Suite A
 10:40-11:00Rot: Retention And Operation Limitation Using Tee
Sumit Paul, D.A Knox
 11:00-11:20Energy-efficient Hardening Of The Sediment Methodology For Scalable Iot Network Security
David Shur, Giovanni DiCrescenzo, Ta Chen, Zahir Patni, YaoJian Lin, Scott Alexander, Benjamin Flin, Rob Levonas
 11:20-11:40Detecting Covert Channels In Cloud Access Control Policies Using Large Language Models
Hrishikesh Karmarkar, TCS Research, Vaibhavi Joshi, TCS Research, R Venkatesh, TCS Research
 11:40-12:00An End-to-end Framework For Cybersecurity Taxonomy And Ontology Generation And Updating
Anna Kougioumtzidou, CERTH - ITI, Angelos Papoutsis, CERTH - ITI, Dimitrios Kavallieros, CERTH - ITI, Thanassis Mavropoulos, CERTH - ITI, Theodora Tsikrika, CERTH - ITI, Stefanos Vrochidis, CERTH - ITI, Ioannis Kompatsiaris, CERTH - ITI
TRACK210:40-12:00 CRE 2Chair: Nicholas J. Multari & Rosalie McQuaid
More London Suite
 10:40-11:00Invited Talk: Engineering Cyber Risk And Resiliency
Paul Nielsen, Software Engineering Institute
 11:00-11:20Invited Talk: How To Enhance The Secure Development And Operations Lifecycle With Ai
Volkmar Lotz, SAP Labs France
 11:20-11:40Invited Talk: Automated Reasoning For High Assurance Systems
Paul Rowe
 11:40-12:00Invited Talk: Osint-based Knowledge Graphs And Link Analysis For Threat Actors Discovery
George Sharkov, Director, European Software Institute – Center Eastern Europe
 12:00-13:00 Keynote Lecture - Strategic Resilience: Safeguarding Critical Infrastructures in a Geostrategic LandscapeChair: Emanuele Bellini
University of Roma Tre
Tower Suite A
 13:00-14:00 Lunch BreakChair: IEEE CSR Chairs
Tower Foyer
TRACK214:00-14:40 CRE 3Chair: Nicholas J. Multari & Rosalie McQuaid
More London Suite
 14:00-14:20Invited Talk: On The Resilience Of Distributed Systems
Marco Carvalho, Florida Institute of Technology
 14:20-14:40Question And Answer Period
Rosalie McQuaid
TRACK114:00-15:40 CSR 13Chair: Fahad Ahmad
University of Portsmouth
Tower Suite A
 14:00-14:20The Need For Cyber-resilience In Complex Systems
Sezen Acur, TNO, Teun Hendriks, TNO
 14:20-14:40A Lightweight Firmware Resilience Engine For Iot Devices Leveraging Minimal Processor Features
Utku Budak, Technical University of Munich (TUM), Fabrizio De Santis, Siemens AG, Corporate Technology, Georg Sigl, Technical University of Munich (TUM)
 14:40-15:00Advancing Security In 5g Core Networks Through Unsupervised Federated Time Series Modeling
Saeid Sheikhi, University of Oulu, Panos Kostakos, University of Oulu
 15:00-15:20Using A Sensor-health-aware Resilient Fusion For Localization In The Presence Of Gps Spoofing Attacks
Samin Moosavi, Texas A&M University, Isabel Moore, Texas A&M University, Swaminathan Gopalswamy, Texas A&M University
TRACK114:00-15:40 CSR 14Chair: Marco Cuoci
Sapienza Universita di Roma
Tower Suite C
 14:00-14:20Application Of Robotic Exploration Principles To The Challenge Of Cybersecurity Penetration Testing
Jeremy Straub, North Dakota State University
 14:20-14:40Leveraging Reinforcement Learning In Red Teaming For Advanced Ransomware Attack Simulations
Cheng Wang, Deloitte & Touche LLP, Christopher Redino, Deloitte & Touche LLP, Ryan Clark, Deloitte & Touche LLP, Abdul Rahman, Deloitte & Touche LLP, Sal Aguinaga, Deloitte & Touche LLP, Sathvik Murli, Deloitte & Touche LLP, Dhruv Nandakumar, Roland Rao, Deloitte & Touche LLP, Lanxiao Huang, Virginia Tech, Daniel Radke, Deloitte & Touche LLP, Edward Bowen, Deloitte & Touche LLP
 14:40-15:00Autonomous Cyberattack With Security-augmented Generative Artificial Intelligence
Jonathan Gregory, Central Michigan University, Qi Liao, Central Michigan University
 15:00-15:20Toward A Unified Security Framework For Digital Twin Architectures
Sani Abdullahi, University of Southern Denmark, Sanja Lazarova-Molnar, University of Southern Denmark & Karlsruhe Institute of Technology, Germany
 15:20-15:40A Looping Process For Cyberattack Mitigation
Daniele Bringhenti, Politecnico di Torino, Francesco Pizzato, Politecnico di Torino, Riccardo Sisto, Politecnico di Torino, Fulvio Valenza, Politecnico di Torino
TRACK214:40-15:40 EPES-SPRChair: Dimitrios Pliatsios
University of Western Macedonia
More London Suite
 14:40-15:00Ai-driven Anomaly And Intrusion Detection In Energy Systems: Current Trends And Future Direction
Georgios Andronikidis, Sidroco Holdings LTD, Charis Eleftheriadis, Sidroco Holdings LTD, Zisis Batzos, Sidroco Holdings LTD, Konstantinos Kyranou, Sidroco Holdings LTD, Panagiotis Radoglou Grammatikis, University of Western Macedonia, Nikolaos Maropoulos, University of Western Macedonia, Gohar Sargsyan, Celesta Advice, Panagiotis Sarigiannidis, University of Western Macedonia
 15:00-15:20Ai4collab: An Ai-based Threat Information Sharing Platform
Christos Dalamagkas, Dimitrios Asimopoulos, Panagiotis Radoglou-Grammatikis, University of Western Macedonia, Nikolaos Maropoulos, Univeristy of Western Macedonia, Thomas Lagkas, Democritus University of Thrace, Vasileios Argyriou, Kingston University London, Gohar Sargsyan, Celesta Advice, Panagiotis Sarigiannidis, University of Western Macedonia
 15:20-15:40Sdn-based Reconfiguration Of Distributed And Cooperative Microgrid Control Systems For Mitigating Synchronization Attacks
Aurelie Kpoze, University of Abomey Calavi, Institute of Mathematics and Physical Science (IMSP), Abdelkader Lahmadi, University of Lorraine, French National Institute for Research in Digital Science and Technology (INRIA), Isabelle Chrisment, University of Lorraine, French National Institute for Research in Digital Science and Technology (INRIA), Jules Degila, University of Abomey Calavi, Institute of Mathematics and Physical Science (IMSP)
 15:40-16:00 Coffee BreakChair: IEEE CSR Chairs
Tower Foyer
TRACK216:00-16:40 DR-DCHEChair: Emanuele Bellini
University of Rome Tre (IT)
More London Suite
 16:00-16:20Towards A Reputational-based Trustworthy Archaeological Information System
Emanuele Bellini, University of Roma Tre, Margherita Bottoni, University of Roma Tre, Emeri Farinetti, University of Roma Tre
 16:20-16:40Transitioning Ssh European Research Infrastructures To Critical Infrastructure Through Resilience
Emanuele Bellini, Emiliano Innocenti, CNR-OVI
TRACK116:00-17:20 CSR 15Chair: Norbert Tihanyi
Technology Innovation Institute
Tower Suite A
 16:00-16:20Structural Generalization In Autonomous Cyber Incident Response With Message-passing Neural Networks And Reinforcement Learning
Jakob Nyberg, KTH Royal Institute of Technology, Pontus Johnson, KTH Royal Institute of Technology
 16:20-16:40Ineffectiveness Of Digital Transformations For Detecting Adversarial Attacks Against Quantized And Approximate Cnns
Salvatore Della Torca, University of Napoli Federico II, Salvatore Barone, University of Napoli Federico II, Valentina Casola, University of Napoli Federico II
 16:40-17:00Cybermetric: A Benchmark Dataset Based On Retrieval-augmented Generation For Evaluating Llms In Cybersecurity Knowledge
Norbert Tihanyi, Technology Innovation Institute, Mohamed Amine Ferrag, Technology Innovation Institute, Ridhi Jain, Technology Innovation Institute, Tamas Bisztray, University of Oslo, Merouane Debbah Debbah, Khalifa University
 17:00-17:20Secure Ai/ml-based Control In Intent-based Management System
Leyli Karaçay, Ericsson Araştirma Geliştirme ve Bilişim Hizmetleri A.Ş, Ahmet Cihat Baktir, Ericsson Araştirma Geliştirme ve Bilişim Hizmetleri A.Ş, Ramin Fuladi, Ericsson Araştirma Geliştirme ve Bilişim Hizmetleri A.Ş, Elham Dehghan Biyar, Ericsson Araştirma Geliştirme ve Bilişim Hizmetleri A.Ş, Ömer Faruk Tuna, Ericsson Araştirma Geliştirme ve Bilişim Hizmetleri A.Ş, IPEK Arikan, Ericsson Araştirma Geliştirme ve Bilişim Hizmetleri A.Ş
TRACK116:00-17:20 CSR 16Chair: Kushal Srivastava
Fraunhofer Institute for High-Speed Dynamics
Tower Suite C
 16:00-16:20Identifying Novelty In Network Traffic
Joshua Sylvester, University of Kent, Rogerio de Lemos, University of Kent
 16:20-16:40A Time-series And Density-based Filter For Dns Log Reduction And Analysis
Taylor Perkins, Deloitte Canada, Brian Lachine, Royal Military College of Canada
 16:40-17:00A Security Analysis Of A Deterministic Key Generation Scheme
Dennis Song, Yuping Yan, Geroge Shao, Feida Zhu, Mason Song
 17:00-17:20Detecting Cryptographic Functions For String Obfuscation
pierre mondon, University of kent, Rogerio De Lemos
TRACK216:40-17:20 ACSICSChair: Christopher Rouff
Johns Hopkins University (US)
More London Suite
 16:40-17:00Sok: Autonomic Computing Based Methods For Ics/scada And Iiot Security
Christopher Rouff, Johns Hopkins University Applied Physics Laboratory, Ali Tekeoglu, Leidos & Johns Hopkins University Whiting School of Engineering
 17:00-17:20Autonomic Passive It-ot Device Classification In Ics/scada Networks
Benny Rubin, Cornell University, Ali Tekeoglu, Leidos & Johns Hopkins University, Christopher Rouff, Johns Hopkins University Applied Physics Laboratory
 19:20-20:00 AwardsChair: IEEE CSR Chairs
Tower Suite
 20:00-22:00 Gala DinnerChair: IEEE CSR Chairs
Tower Suite


WEDNESDAY, 4 SEPTEMBER 2024
TRACK29:00-10:20 IOSEC 1Chair: Kostas Lampropoulos & Vasileios Mavroeidis
More London Suite
 09:00-09:20Developing A Robust Communication Infrastructure For A Distributed Smart Grid Ids
Verena Menzel, University of Twente, Jan Speckamp, Anne Remke
 09:20-09:40Secureexecutor: An Automated Way To Leverage Scone To Enhance Application Security
Christos Spyridakis, Technical University of Crete, Angeliki Aktypi, Technical University of Crete, Thomas Kyriakakis, Technical University of Crete, Sotiris Ioannidis, Technical University of Crete
 09:40-10:00Composite Inspection And Certification (cic) System For Cybersecuity Assessment Of Ict Products, Services, And Processes
Spyridon Papastergiou, Research and Innovation Maggiolli SPA,, Shareeful Islam, Department of Computing and Information Science, Anglia Ruskin University, Eleni Maria Kalogeraki, Security Lab Consulting
 10:00-10:20A Deep Learning Framework For Safety Monitoring Of A Railway Section
Fatima Chriki, Universitat Politecnica de Catalunya, Ester Simo, Universitat Politecnica de Catalunya, Francesc Aguilo, Universitat Politecnica de Catalunya, Ignasi Garcia-Mila, Worldsensing, Barcelona, Xavier Masip, Universitat Politecnica de Catalunya
TRACK19:00-10:20 CSR 18Chair: Alkistis-Aikaterini Sigourou
IHP GmbH - Leibniz Institute for High Performance Microelectronics
Tower Suite C
 09:00-09:20Identifying Android Banking Malware Through Measurement Of User Interface Complexity
Sean McElroy, Dakota State University
 09:20-09:40Forensic Analysis Of Android Notifications’ History
Evangelos Dragonas, University of Piraeus Research Center, EL090037284, Costas Lambrinoudakis, Department of Digital Systems, University of Piraeus, Attica, Greece
 09:40-10:00Building A Secure Cross-device Communication Channel For Smart Devices Based On App Accounts
Lanlan Pan, University of Science and Technology of China, Ruonan Qiu, Guangdong OPPO Mobile Telecommunications Corp. Ltd., Chuan Zhang, Guangdong OPPO Mobile Telecommunications Corp. Ltd., Minghui Yang, Guangdong OPPO Mobile Telecommunications Corp. Ltd.
 10:00-10:20A Privacy-preserving And Secure Scheme For Online Payment In The Realm Of Mobile Commerce
Mohammad Rasool Momeni, Concordia University, Abdollah Jabbari, Concordia University, Carol Fung, Concordia University
TRACK19:00-10:20 CSR 17Chair: Alessandro Zamponi
Politecnico di Torino
Tower Suite A
 09:00-09:20Dynamic Security Provisioning For Cloud-native Networks: An Intent-based Approach
Francesco Settanni, Politecnico di Torino, Alessandro Zamponi, Politecnico di Torino, Cataldo Basile, Politecnico di Torino
 09:20-09:40Enhancing Atm Security Management In The Post-quantum Era With Quantum Key Distribution
Fahad Ahmad, University of Portsmouth, Aikaterini Kanta, University of Portsmouth, Stavros Shiaeles, University of Portsmouth, Afia Naeem, Kinnaird College for Women, Zarnab Khalid, Kinnaird College for Women, Kainaat Mahboob, Kinnaird College for Women
 09:40-10:00Peer-to-peer Meets Onion: The Veilid Framework
Sven Glatzer, University of Portsmouth, Stavros Shiaeles, Rinat Khusainov, Rahim Taheri
 10:00-10:20Understanding & Mitigating The Challenges Of Securing Jupyter Notebooks Online
Adrian Ramsingh, Sia Fusion Ltd, Pradeep Verma, Sia Fusion Ltd
 10:20-10:40 Coffee BreakChair: IEEE CSR Chairs
Tower Foyer
TRACK110:40-12:00 CSR 19Chair: Amalia Damianou
CERTH-ITI
Tower Suite A
 10:40-11:00Safety Analysis For Cyber-physical Systems Under Cyber Attacks Using Digital Twin
Ruizhe Wang, University of Bristol, Sarad Venugopalan, University of Bristol, Sridhar Adepu, University of Bristol
 11:00-11:20Dionysus: Leveraging Digital-twin Deception Networks For The Cybersecurity Of Physical Protection Systems
Cyprien De La Vergne De Cerval, Institut de Radioprotection et de Surete Nucleaire, William Stout, Sandia National Laboratories, Eric Perret, Institut de Radioprotection et de Surete Nucleaire, Jonathan Sarrazin, Institut de Radioprotection et de Surete Nucleaire, Olivier Fichot, Institut de Radioprotection et de Surete Nucleaire, Vincent Urias, Sandia National Laboratories, Shadya Maldonado Rosado, Sandia National Laboratories
 11:20-11:40Enhancing Cyber-physical Security: Integrating Virtual Fences Within Digital Twins
Ali Aghazadeh Ardebili, HSPI - Roma, Antonella Longo, University of Salento, Antonio Ficarella, University of Salento
 11:40-12:00Situational Awareness Scoring System In Cyber Range Platforms
Amalia Damianou, CERTH-ITI, Mariana S. Mazi, CERTH-ITI, Georgios Rizos, CERTH-ITI, Antonios Voulgaridis, CERTH-ITI, Konstantinos Votis, CERTH-ITI
TRACK110:40-12:00 CSR 20Chair: Daniel Spiekermann
FH Dortmund
Tower Suite C
 10:40-11:00Ipv6 Connection Shuffling For Moving Target Defense (mtd) In Sdn
Nicholas Mayone, Zurich University of Applied Sciences (ZHAW), Pascal Kunz, Zurich University of Applied Sciences (ZHAW), Beytullah Yigit, Bogazici University, Wissem Soussi, Zurich University of Applied Sciences (ZHAW), Burkhard Stiller, University of Zurich (UZH), Gurkan Gur, Zurich University of Applied Sciences (ZHAW)
 11:00-11:20Evaluating Few-shot Learning Generative Honeypots In A Live Deployment
Jarrod Ragsdale, University of Texas at San Antonio, Rajendra Boppana, University of Texas at San Antonio
 11:20-11:40A Modular Generative Honeypot Shell
Saul Johnson, NHL Stenden University of Applied Sciences, Remco Hassing, NHL Stenden University of Applied Sciences, Jeroen Pijpker, NHL Stenden University of Applied Sciences, Rob Loves, NHL Stenden University of Applied Sciences
 11:40-12:00Can A Llama Be A Watchdog? Exploring Llama 3 And Code Llama For Static Application Security Testing
Claudio Curto, Universita degli studi di Catania, Daniela Giordano, Universita degli studi di Catania, Daniel Gustav Indelicato, Darwin Technologies S.r.l., Vladimiro Patatu, EHT S.c.p.A.
TRACK210:40-12:00 IOSEC 2Chair: Kostas Lampropoulos & Vasileios Mavroeidis
More London Suite
 10:40-11:00Quantifying The Odds In Real World Attack Scenarios
Paul Tavolato, University of Vienna, Sebastian Eresheim, University of Vienna, Robert Luh, University of Applied Science St. Polten, Simon Gmeiner, University of Vienna, Sebastian Schrittwieser, Universitat Wien: Universitat Wien
 11:00-11:20Ontohunt - A Semantic Reasoning Approach To Cyber Threat Hunting With Indicators Of Behaviour
Robert Chetwyn, University Of Oslo, Martin Eian, mnemonic AS, Audun Josang, University of Oslo
 11:20-11:40Uncovering Hidden Threats: Automated, Machine Learning-based Discovery & Extraction Of Cyber Threat Intelligence From Online Sources
Rafail A. Ellinitakis, Sphynx Hellas S.A., Konstantinos Fysarakis, Sphynx Analytics Ltd, Panagiotis Bountakas, Sphynx Technology Solutions AG, Georgios Spanoudakis, Sphynx Hellas S.A.
 11:40-12:00Did:ring: Ring Signatures Using Decentralised Identifiers For Privacy-aware Identity Proof
Dimitrios Kasimatis, Edinburgh Napier University, Sam Grierson, Edinburgh Napier University, William J. Buchanan, Edinburgh Napier University, Chris Eckl, Condatis Group Limited, Pavlos Papadopoulos, Edinburgh Napier University, Nikolaos Pitropakis, Edinburgh Napier University, Christos Chrysoulas, Edinburgh Napier University, Craig Thomson, Edinburgh Napier University, Baraq Ghaleb, Edinburgh Napier University
 12:00-13:00 Keynote Lecture - Cybersecurity as a Backbone for SustainabilityChair: Nikolas Kolokotronis
University of Peloponnese
Tower Suite A
 13:00-14:00 Lunch BreakChair: IEEE CSR Chairs
Tower Foyer
TRACK214:00-14:40 CFATIChair: Chris Lane, Preeti Patel, Ahmed Elmesiry
London Metropolitan University (UK)
More London Suite
 14:00-14:20Challenges Of Digital Investigations In Nowadays Communication Networks
Daniel Spiekermann, FH Dortmund, Jorg Keller, Fernuniversitat in Hagen
 14:20-14:40Forensic Communication Analysis: Challenges And Opportunities
Jian Xi, University of Applied Sciences Mittweida, Lukas Jaeckel, University of Applied Sciences Mittweida, Michael Spranger, University of Applied Sciences Mittweida, Melanie Siegel, University of Applied Sciences Darmstadt, Dirk Labudde, University of Applied Sciences Mittweida
TRACK114:00-15:40 CSR 21Chair: Norman Nelufule
CSIR
Tower Suite A
 14:00-14:20Lightweight Testbed For Iec61162-450-related Cyber Security Research
Gabor Visky, Tallinn University of Technology, Sokratis Katsikas, Norwegian University of Science and Technology, Maennel Olaf, The University of Adelaide, School of Computer and Mathematical Sciences
 14:20-14:40Hybrid Cybersecurity Research And Education Environment For Maritime Sector
Gabor Visky, Tallinn University of Technology, Aleksei Siganov, Tallinn University of Technology, Ur Rehman Muaan, Tallinn University of Technology, Risto Vaarandi, Tallinn University of Technology, Hayretdin Bahsi, Tallinn University of Technology, Leonidas Tsiopoulos, Tallinn University of Technology
 14:40-15:00Assessment Of The Impact Of Cyber-attacks And Security Breaches In Diagnostic Systems On The Healthcare Sector
Kushal Srivastava, Fraunhofer Institute for High-Speed Dynamics, Ernst-Mach-Institut, EMI, Katja Faist, Fraunhofer Institute for High-Speed Dynamics, Ernst-Mach-Institut, EMI, Benjamin Lickert, Fraunhofer Institute for High-Speed Dynamics, Ernst-Mach-Institut, EMI, Karen Neville, University College Cork, Nora McCarthy, University College Cork, Mirjam Fehling-Kaschek, Fraunhofer Institute for High-Speed Dynamics, Ernst-Mach-Institut, EMI, Alexander Stolz, Albert-Ludwig-Universitat
 15:00-15:20A Sdr-based Framework For Cybersecurity Assessment Of Vehicle-to-everything (v2x) Systems.
Muhammad Saad Sohail, University of Genoa, Fabio Patrone, University of Genoa, Giancarlo Portomauro, University of Genoa, Mario Marchese Marchese, University of Genoa
TRACK114:00-15:40 CSR 22Chair: Saeid Sheikhi
University of Oulu
Tower Suite C
 14:00-14:20Video-based Abnormal Human Behaviour Detection For Video Forensics.
Intissar Ziani, MISC Laboratory, Department of Computer Science and its Applications, Faculty of NTIC, University of Constantine 2 - Abdelhamid Mehri, Constantine 25000, Algeria, Gueltoum Bendiab, LIRE laboratory, Department of Electronics, University of Freres Mentouri, Constantine 25000, Algeria, Mourad Bouzenada, MISC Laboratory, Department of Computer Science and its Applications, Faculty of NTIC, University of Constantine 2 - Abdelhamid Mehri, Constantine 25000, Algeria, Stavros Shiaeles, Cyber Security Research Group, University of Portsmouth, PO1 2UP, Portsmouth, UK sshiaele
 14:20-14:40On Impact Of Video Motion On Image Encryption/decryption. Comparative Results.
Mourad Oussalah, University of Oulu, Anastasiia Voitenko, University of Oulu, Faculty of Information Technology and Electrical Engineering, Centre for Machine Vision and Signal Processing, 90014 OULU, FINLAND
 14:40-15:00The Affordability Of Cybersecurity Costs In Developing Countries: A Systematic Review
Chinazunwa Uwaoma, CGU, Ayush Enkhtaivan, CGU
 15:00-15:20The Effect Of Privacy Concerns, Interaction, Trust, Age, And Gender On Self-disclosure Behaviours On Social Networking Sites
Alexis Coca , School of Computing University of Portsmouth Portsmouth, UK, Fudong Li, Bournemouth University, Stavros Shiaeles, University of Portsmouth, Dehao Wu, Bournemouth University, Fan Liu, Cyber Security Division, Morgan Stanley Asia
 15:20-15:40Strengthening The Digital Ecosystem: Effects Of The Cyber Resilience Act (cra) On Open-source Software
Matija Kikelj, University North, Ivan Sabic, University North
TRACK214:40-15:40 HACS 1Chair: Nicolas Sklavos
University of Patras (GR)
More London Suite
 14:40-15:00Static Power Consumption As A New Side-channel Analysis Threat To Elliptic Curve Cryptography Implementations
Ievgen Kabin, IHP GmbH - Leibniz Institute for High Performance Microelectronics, Zoya Dyka, IHP GmbH - Leibniz Institute for High Performance Microelectronics, Alkistis-Aikaterini Sigourou, IHP GmbH - Leibniz Institute for High Performance Microelectronics, Peter Langendoerfer, IHP GmbH - Leibniz Institute for High Performance Microelectronics
 15:00-15:20Communication Architecture Under Siege: An In-depth Analysis Of Fault Attack Vulnerabilities And Countermeasures
Hongwei Zhao, Univ. Bretagne Sud, UMR 6285, Lab-STICC, Lorient, France, Vianney Lapotre, Univ. Bretagne Sud, UMR 6285, Lab-STICC, Lorient, France, Guy Gogniat, Univ. Bretagne Sud, UMR 6285, Lab-STICC, Lorient, France
 15:20-15:40On-line Anomaly Detection And Qualification Of Random Bit Streams
Cesare Caratozzolo, Valeria Rossi, Kamil Witek, AGH University of Krakow, Alberto Trombetta, uninsubria, Massimo Caccia, uninsubria
 15:40-16:00 Coffee BreakChair: IEEE CSR Chairs
Tower Foyer
TRACK116:00-17:20 CSR 23Chair: Adrian Ramsingh
Sia Fusion Ltd
Tower Suite A
 16:00-16:20Static Detection Of Missing Validations In Solidity Smart Contracts
Sundas Munir, Halmstad University, Walid Taha, Halmstad University, Mirza Sanam Iqbal Baig, Eagle Games Sweden AB
 16:20-16:40Designing Trustworthy Decentralized Cross-chain Marketplaces: A 6g Network Of Networks Perspective
Lalita Jagadeesan, Nokia Bell Labs, Shushu Liu, Nokia Bell Labs, Lizette Velazquez, Nokia Cloud and Network Services
 16:40-17:00Strengthening Cybersecurity Certifications Through Robust Chain Of Custody Practices
Jasmin Cosic, DEKRA SE, Admir Jukan, AEGIS Research, Miroslav Baca, University of North
 17:00-17:20Seaguard: A Blockchain-based Security Framework For Iot Maritime Transportation Systems
Panagiotis Leonis, University of the Peloponnese, Konstantinos Ntouros, University of the Peloponnese, Antonio I. Mazilu, University of the Peloponnese, Sotirios Brotsis, University of the Peloponnese, Nicholas Kolokotronis, University of the Peloponnese
TRACK116:00-17:20 CSR 24Chair: Viet Anh Phan
Brno University of Technology
Tower Suite C
 16:00-16:20Investigating Cyber Risks In A Surgical Process For Healthcare Cyber Resilience
Mahdad Pourmadadkar, Marianna Lezzi, Ali Aghazedeh Ardebili
 16:20-16:40Renyi Differential Privacy Analysis Of Skellam Under Federated Learning In Internet Of Health Things
Mohamed Amjath, Atlantic Technological University, Shagufta Henna, Atlantic Technological University
 16:40-17:00Cybersecurity For Safety: Risk Assessment Of Autonomous Cyber-physical Systems
Stefano Perone, Luca Faramondi, Simone Guarino, Roberto Setola, Martina Nobili, Francesco Flammini, Franca Corradini
 17:00-17:20Software Security Testing Lifecycle For Automotive Products
Anupriya Pandey, Kamal Singh, Bharg Cybersecurity Private Limited
TRACK216:00-17:20 HACS 2Chair: Nicolas Sklavos
University of Patras (GR)
More London Suite
 16:00-16:20Stealth Attacks On Pcbs: An Experimental Plausibility Analysis
Ievgen Kabin, IHP GmbH - Leibniz Institute for High Performance Microelectronics, Jan Schaeffner, IHP GmbH - Leibniz Institute for High Performance Microelectronics, Alkistis Sigourou, IHP GmbH - Leibniz Institute for High Performance Microelectronics, Dmytro Petryk, IHP GmbH - Leibniz Institute for High Performance Microelectronics, Zoya Dyka, IHP GmbH - Leibniz Institute for High Performance Microelectronics, Dominik Klein, Bundesamt fur Sicherheit in der Informationstechnik, Sven Freud, Bundesamt fur Sicherheit in der Informationstechnik, Peter Langendoerfer, IHP GmbH - Leibniz Institute for High Performance Microelectronics
 16:20-16:40Fpga-based Cloud Security For 5g Networks
Marios Papadopoulos, University of the Peloponnese, Kostas Lampropoulos, University of Patras, Paris Kitsos, University of Patras - University of the Peloponnese
 16:40-17:00Minimizing Area Footprint Of Uav Communication Security Using Fpgas
Evangelia Konstantopoulou, u-blox Athens S.A. & University of Patras, George Athanasiou, u-blox Athens S.A., Nicolas Sklavos, University of Patras

 


Copyright © 2024 SUMMIT-TEC GROUP LTD