5G-NS 2020
Distributed Packet Inspection for Network Security Purposes in Software-Defined Networking Environments
Piotr Nowakowski, Piotr Żórawski, Krzysztof Cabaj, Marcin Gregorczyk, Maciej Purski and Wojciech Mazurczyk (Warsaw University of Technology, Poland)
A Device Identification Method Based on LED Fingerprint for Visible Light Communication System
Dayu Shi, Xun Zhang, Andrei Vladimirescu, Lina Shi, Yanqi Huang and Yourong Liu (Institut supérieur d’électronique de Paris, France)
watch the video here: https://vimeo.com/444178811
INSPIRE-5Gplus : Intelligent Security and Pervasive Trust for 5G and Beyond Networks
Jordi Ortiz, Ramon Sanchez-Iborra, Jorge Bernal, Antonio Skarmeta Gomez (Universidad de Murcia, Spain), Chafika Benzaid, Tarik Taleb (University of Aalto, Finland), Pol Alemany, Raul Muñoz, Ricard Vilalta (Centre Tecnològic de Telecomunicacions de Catalunya (CTTC/CERCA), Spain), Chrystel Gaber, Jean-Philippe Wary (Orange, France), Dhouha Ayed, Pascal Bisson (Thales Group, France), Maria Christopoulou, George Xilouris (NCSR Demokritos, Greece), Edgardo Montes de Oca (Montimage, France), Gürkan Gür (Zhaw Zurich University of Applied Sciences, Switzerland), Gianni Santinelli, Vincent Lefebvre (Solidshild, France), Antonio Pastor and Diego Lopez (Telefonica, Spain)
Watch the video here: https://vimeo.com/444484613
Post-quantum MACsec Key Agreement for Ethernet Networks
Joo Yeon Cho (ADVA Optical Networking SE, Germany) and Andrew Sergeev (ADVA Optical Networking Israel Ltd., Israel)
Watch the video here: https://vimeo.com/444484627
CSA 2020
SoK: Linking Information Security Metrics to Management Success Factors
Rainer Diesch (fortiss GmbH, Germany) and Helmut Krcmar (Technical University of Munich, Germany)
CYSAS-S3: A novel dataset for validating cyber situational awareness related tool for supporting military operations
Roumen Daton Medenou (Universidad Internacional de La Rioja (UNIR), INDRA, Spain), Victor Manuel Calzado Mayo, Miriam Garcia Balufo, Miguel Páramo Castrillo, Francisco José González Garrido(INDRA, Spain), Alvaro Morais Fernandez (Universidad Politecnica de Madrid (UPM), INDRA, Spain), David Nevado Catalán (Universidad Carlos III de Madrid (UC3M), INDRA, Spain), Ao Hu (INDRA, Spain), David Sandoval Rodríguez-Bermejo (Universidad Carlos III de Madrid (UC3M), INDRA, Spain), Jorge Maestre Vidal, Gerardo Ramis Pasqual De Riquelme INDRA, Spain), Antonio Berardi, Paolo De Santis, Francesco Torelli (Leonardo-Finmeccanica, Italy) and Salvador Llopis Sanchez (European Defence Agency (EDA), Belgium)
Watch the video here: https://vimeo.com/448893096
Evaluation Methodology for Mission-Centric Cyber Situational Awareness capabilities
David Sandoval Rodríguez-Bermejo (Universidad Carlos III de Madrid / Indra, Spain), Roumen Daton Medenou (UNIR / Indra, Spain), Gerardo Ramis Pasqual de Riquelme, Jorge Maestre Vidal(Indra, Spain), Francesco Torelli (Leonardo-Finmeccanica, Italy) and Salvador Llopis Sánchez (Universidad Politécnica de Valencia / EDA, Spain)
Watch the video here: https://vimeo.com/446741322
Dynamic Risk Management Architecture Based on Heterogeneous Data Sources for Enhancing the Cyber Situational Awareness in Organizations
Xavier Larriva-Novo, Mario Vega-Barbas, Víctor A Villagrá, Diego Rivera, Mario Sanz and Manuel Álvarez-Campana (Universidat Politécnica de Madrid, Spain)
A novel automatic discovery system of critical assets in cyberspace-oriented military missions
Alvaro Luis Martinez (Universidad Politécnica de Madrid and Indra, Spain) and Víctor A. Villagrá González (Universidad Politécnica de Madrid, Spain)
Watch the video here: https://vimeo.com/444488563
Denial of Sustainability on military Tactical Clouds
Jorge Maestre Vidal (Indra, Spain) and Marco Antonio Sotelo Monge (Universidad de Murcia, Spain)
RelaxationTime in Complex Network
Dmytro Lande (Institute for data recording NAS of Ukraine, Ukraine), Andrii Snarskii (National Technical University «Igor Sikorsky Kyiv Polytechnic Institute», Ukraine), Oleh Dmytrenko (Institute for data recording NAS of Ukraine, Ukraine) and Igor Subach (National Technical University «Igor Sikorsky Kyiv Polytechnic Institute», Ukraine)
watch the video here: https://vimeo.com/444488544
CUING 2020
To Tweet or Not to Tweet: Covertly Manipulating a Twitter Debate on Vaccines Using Malware-Induced Misperceptions
Filipo Sharevski ((DePaul University, College of Computing and Digital Media, Divergent Design Lab, Chicago, IL, USA), Peter Jachim and Kevin Florek (DePaul University, Divergent Design Lab, Chicago, IL, USA)
Watch the video here: https://vimeo.com/443282613
Leveraging eBPF to preserve user privacy for DNS, DoT, and DoH queries
Sean Rivera (University of Luxembourg, Luxembourg), Vijay Gurbani (Illinois Institute of Technology, United States), Sofiane Lagraa, Antonio Ken Iannillo and Radu State (University of Luxembourg, Luxembourg)
Watch the video here: https://vimeo.com/443290052
Critical Traffic Analysis on the Tor Network
Florian Platzer (Fraunhofer SIT, Germany), Marcel Schäfer (Frauhofer USA CESE, United States) and Martin Steinebach (Fraunhofer SIT, Germany)
Stegomalware Detection Through Structural Analysis of Media Files
Damian Puchalski (ITTI Sp. z o.o., Poland), Luca Caviglione (National Research Council of Italy, Italy), Rafal Kozik (ITTI Sp. z o.o., Poland), Adrian Marzecki, Slawomir Krawczyk (Orange Polska, Poland) and Michal Choras (FernUniversitat in Hagen, Germany & UTP Bydgoszcz, Poland)
Covert Storage Caches using the NTP Protocol
Tobias Schmidbauer (University of Hagen, Germany) and Steffen Wendzel (Worms University of Applied Sciences, Germany)
Exploiting Minification for Data Hiding Purposes
Pawel Rajba (University of Wroclaw, Poland) and Wojciech Mazurczyk (Warsaw University of Technology, Poland)
Watch the video here: https://vimeo.com/444571210
Mixed-code text analysis for the detection of online hidden propaganda
Andrea Tundis, Gaurav Mukherjee and Max Mühlhäuser (Technische Universität Darmstadt, Germany)
Design and Performance Evaluation of Reversible Network Covert Channels
Przemysław Szary, Wojciech Mazurczyk (Warsaw University of Technology, Poland), Luca Caviglione (CNR – IMATI, Italy) and Steffen Wendzel (Worms University of Applied Sciences and Fraunhofer FKIE, Germany)
Exploring Data Leakage in Encrypted Payload Using Supervised Machine Learning
Amir Khaleghi Moghaddam and Nur Zincir-Heywood (Dalhousie University, Canada)
Watch the video here: https://vimeo.com/444180920
Network Covert Channels Detection using Data Mining and Hierarchical Organisation of Frequent Sets: an Initial Study
Piotr Nowakowski, Piotr Żórawski, Krzysztof Cabaj and Wojciech Mazurczyk (Warsaw University of Technology, Poland)
An Investigation on the Feasibility of the Bluetooth Frequency Hopping Mechanism for the Use as a Covert Channel Technique
Daniel Vogel, Ulugbek Akhmedjanov, Marc Ohm (University of Bonn, Germany) and Michael Meier (University of Bonn, Fraunhofer FKIE, Germany)
Watch the video here: https://vimeo.com/447063440
Non-Blind Steganalysis
Niklas Bunzel, Martin Steinebach and Huajian Liu (Fraunhofer SIT, Germany)
CyberTIM 2020
Making Use of NXt to Nothing: The Effect of Class Imbalances on DGA Detection Classifiers
Arthur Drichel, Ulrike Meyer (RWTH Aachen University, Germany), Samuel Schüppen and Dominik Teubert (Siemens CERT, Germany)
Watch the video here: https://vimeo.com/444171738
CyberWolf in Wall Street: Assessing Vulnerabilities of ICT-Intensive Financial Markets
Andrea Calesso (Aequo S.r.L., University of Padova, Italy) , Mauro Conti (Department of Mathematics, University of Padova, Italy) and Martino Grasselli (University of Padova – Department of Mathematics; Léonard de Vinci Pôle Universitaire, Research Center, Italy)
DoH Insight: Detecting DNS over HTTPS by Machine Learning
Dmitrii Vekshin (FIT CTU, Czechia), Karel Hynek (FIT CTU & CESNET a.l.e., Czechia) and Tomas Cejka (CESNET a.l.e., Czechia)
EPESEC 2020
Cyber-Risk Identification for a Digital Substation
Athar Khodabakhsh, Sule Yildirim Yayilgan, Mohamed Abomhara (Norwegian University of Science and Technology, NTNU, Norway), Maren Istad (SINTEF Energy Research, Norway) and Nargis Hurzuk (Statnett, Norway)
Watch the video here: https://vimeo.com/444176540
Data Visualisation in Internet of Things: Tools, Methodologies, and Challenges
Antonis Protopsaltis, Panagiotis Sarigiannidis (University of Western Macedonia, Greece), Dimitrios Margounakis and Anastasios Lytos (Sidroco Holdings Ltd, Cyprus)
Watch the video here: https://vimeo.com/444178785
Threat Landscape for Smart Grid Systems
Christos-Minas Mathas, Konstantinos-Panagiotis Grammatikakis, Costas Vassilakis, Nicholas Kolokotronis (University of the Peloponnese, Greece), Vasiliki-Georgia Bilali and Dimitris Kavallieros (KEMEA Center for Security Studies, Greece)
Building a testing environment for SDN networks analysis for electrical grid applications
Toni Cantero-Gubert, Alba Colet, Pol Paradell and J. L. Domínguez-García (IREC, Spain)
Watch the video here: https://vimeo.com/447057882
Advanced Metering Infrastructures: Security Risks and Mitigations
Gueltoum Bendiab (University of Portsmouth, UK), Konstantinos-Panagiotis Grammatikakis, Ioannis Koufos, Nicholas Kolokotronis (University of the Peloponnese, Greece) & Stavros Shiaeles (University of Portsmouth, UK)
On the Importance of cyber-security training for multi-vector energy distribution system operators
Dimitrios Vozikis (University of Strathclyde, UK), Eleni Darra (KEMEA-Center for Security Studies Athens, Greece), Tanel Kuusk (CybExer Technologies Tallinn, Estonia), Dimitris Kavallieros (Center for Security Studies Athens & University of the Peloponnese, Greece), Aare Reintam (CybExer Technologies Tallinn, Estonia) & Xavier Bellekens (University of Strathclyde, UK)
DIDEROT: An Intrusion Detection and Prevention System for DNP3-based SCADA Systems
Panagiotis Radoglou-Grammatikis, Panagiotis Sarigiannidis (University of Western Macedonia, Greece), George Efstathopoulos (0infinity Limited, UK), Paris-Alexandros Karypidis & Antonios Sarigiannidis (SIDROCO HOLDINGS Ltd, Cyprus)
Factors affecting the market adoption of cyber-security products in Energy and Electrical systems: The case of SPEAR
Theodoros Rokkas, Ioannis Neokosmidis (inCITES Consulting, Luxembourg)
FARES 2020
Investigation into the Security and Privacy of iOS VPN Applications
Jack Wilson, David McLuskie and Ethan Bayne (Abertay University, UK)
Watch the video here: https://vimeo.com/446730517
Negative Filtering of CCTV Content -Forensic Video Analysis Framework
Franck Jeveme Panta, André Péninou and Florence Sedes (Université Toulouse III – Paul Sabatier, France)
Refining the evaluation of the degree of security of a system built using security patterns
Olga Villagran-Velasco (Universidad Nac. Autonoma de Mexico,Mexico), Eduardo B. Fernandez (Florida Atlantic University, USA )and Jorge Ortega-Arjona (Universidad Nac. Autonoma de Mexico, Mexico)
Watch the video here: https://vimeo.com/444165204
Adversarial Machine Learning for Spam Filters
Bhargav Kuchipudi, Ravi Teja Nannapaneni and Qi Liao (Central Michigan University, United States)
An Empirical Study on the Impact of GDPR and Right to be Forgotten on Data Privacy
Vincenzo Mangini, Irina Tal and Arghir-Nicolae Moldovan (School of Computing, National College of Ireland, Dublin, Ireland)
Watch the video here: https://vimeo.com/447062999
Automated Modelling of Security Incidents to represent Logging Requirements in Software Systems
Fanny Rivera-Ortiz and Liliana Pasquale (University College Dublin & Lero, Dublin, Ireland)
Watch the video here: https://vimeo.com/444178804
IoT-SECFOR 2020
An IoT Bricking Ransomware Proof of Concept
Calvin Brierley, Jamie Pont, Budi Arief, David Barnes and Julio Hernandez-Castro (School of Computing, University of Kent, UK)
Watch the video here: https://vimeo.com/443286591
Taxonomy and Challenges in Machine Learning-based Approaches to Detect Attacks in the Internet of Things
Omair Faraj, David Megías-Jiménez (Universitat Oberta de Catalunya, CYBERCAT-Center for Cybersecurity Research of Catalonia, Spain), Abdel Mehsen-Ahmad (Lebanese International University (LIU), The International University of Beirut (BIU), Lebanon) and Joaquin Garcia-Alfaro (Institut Polytechnique de Paris, SAMOVAR, Telecom SudPar”, France)
Watch the video here: https://vimeo.com/447416136
Privacy threats in low-cost people counting devices
Niccolò Maltoni, Antonio Magnani and Luca Calderoni (University of Bologna, Italy)
Clust-IT: Clustering-Based Intrusion Detection in IoT Environments
Robert Markiewicz and Daniele Sgandurra (Royal Holloway, University of London (S3Lab, Information Security Group, United Kingdom)
iPAT 2020
A Silver Bullet? A Comparison of Accountants and Developers Mental Models in the Raise of Blockchain
Rose Esmander (École Supérieure de Commerce de Paris (ESCP) & Be-Studys, Be-Ys group, France), Pascal Lafourcade (Université Clermont Auvergne, LIMOS, France), Marius Lombard-Platet (DIENS, École normale supérieure, CNRS, PSL Research University,& Be-Studys, Be-Ys group, France) and Claudia Negri Ribalta (CRI, Université Paris-1 Pantheon-Sorbonn & Be-Studys, Be-Ys group, France)
Balancing Trust and Privacy in Computer-Mediated Introduction
Angela Borchert, Nicolás Emilio Díaz Ferreyra and Maritta Heisel (University of Duisburg-Essen, Germany)
Watch the video here: https://vimeo.com/444176559
IWCC 2020
A comparison of stream mining algorithms on botnet detection
Guilherme Henrique Ribeiro Elaine Ribeiro de Faria and Rodrigo Sanches Miani (Federal University of Uberlândia, Brazil)
Watch the video here: https://vimeo.com/444158688
Cyberspace threats: not only hackers and criminals. Raising the awareness of selected unusual cyberspace actors – cybersecurity researchers’ perspective
Pawlicka Aleksandra (ITTI Sp. z o.o. Poznań, Poland), Michal Choras (UTP University of Science and Technology Bydgoszcz Poland, FernUniversität in Hagen, Germany) and Marek Pawlicki (UTP University of Science and Technology Bydgoszcz, ITTI Sp. z o.o. Poznań, Poland)
Watch the video here: https://vimeo.com/447413640
A privacy-aware digital forensics investigation in enterprises
Ludwig Englbrecht (Department of Information Systems, University of Regensburg, Germany) and Günther Pernul (Department of Information Systems, University of Regensburg, Germany)
Watch the video here: https://vimeo.com/444165151
Real-Time Stream Processing Tool for Detecting Suspicious Network Patterns Using Machine Learning
Mikolaj Komisarek (UTP University of Science and Technology Bydgoszcz, ITTI Sp. z o.o. Poznań, Poland), Michal Choras (FernUniversitat in Hagen, Germany & UTP Bydgoszcz, Poland), Rafal Kozik) and Marek Pawlicki (UTP University of Science and Technology Bydgoszcz, ITTI Sp. z o.o. Poznań, Poland)
Ransomware 2.0: To sell, or not to sell. A Game-theoretical Model of Data-selling Ransomware
Zhen Li (Albion College, United States) and Qi Liao (Central Michigan University, United States)
Detection and classification of Slow DoS Attacks targeting network servers
Enrico Cambiaso, Maurizio Aiello and Ivan Vaccari (Consiglio Nazionale delle Ricerche (CNR), Italy)
Locality Sensitive Hashing for Tampering Detection in Automotive Systems
Roland Bolboacă, Teri Lenard, Bela Genge and Piroska Haller (University of Medicine, Pharmacy, Science and Technology of Targu Mures, Romania)
Watch the video here: https://vimeo.com/444176531
Privacy-Enhanced Robust Image Hashing with Bloom Filters
Uwe Breidenbach (Technische Universität Darmstadt, Germany), Martin Steinebach and Huajian Liu (Fraunhofer Institute for Secure Information Technology SIT, Germany)
Watch the video here: https://vimeo.com/444178774
IWSMA 2020
Towards the performance evaluation of a Clustering and Trust based Security mechanism for VANET
Amira Kchaou, Ryma Abassi and Sihem Guemara (Higher school of communications of Tunis, Tunisia)
Memory Corruption Attacks within Android TEEs: A Case Study Based on OP-TEE
Fabian Fleischer, Marcel Busch and Phillip Kuhrt (IT Security Infrastructures Lab, Department of Computer Science Friedrich-Alexander University Erlangen-Nürnberg (FAU), Germany)
Watch the video here: https://vimeo.com/444169237
VisualDroid: Automatic Triage and Detection of Android Repackaged Applications
Rosangela Casolare (University of Molise, Italy), Francesco Mercaldo (University of Molise & IIT-CNR, Italy), Carlo De Dominicis(University of Molise, Italy), Fabio Martinelli (IIT-CNR, Italy), Antonella Santone(University of Molise, Italy)
Watch the video here: https://vimeo.com/444173522
ASAINT: A Spy App Identification System based on Network Traffic
Mauro Conti (University of Padua, Italy), Giulio Rigoni (University of Florence, Italy) and Flavio Toffalini (Singapore University of Technology and Design,
Singapore)
Watch the video here: https://vimeo.com/444173540
A hardware implementation of the Device Identifier Composition Engine
Lukas Jäger and Richard Petri (Fraunhofer Institute for Secure Information Technology, Germany)
Watch the video here: https://vimeo.com/443282646
IWSMR 2020
An Overview of Limitations and Approaches in Identity Management
Daniela Pöhn (Universität der Bundeswehr München, Research Institute CODE, Germany) and Wolfgang Hommel (Universität der Bundeswehr München, Research Institute CODE, Germany)
A Framework for Automated Evaluation of Security Metrics
Matthew Zaber and Suku Nair (SMU AT&T Center for Virtualization, United States)
Generalizing the Phishing Principle – Analyzing User Behavior in Response to Controlled Stimuli for IT Security Awareness Assessment
Arnold Sykosch (University of Bonn, Germany), Christian Doll (Fraunhofer FKIE, Germany), Matthias Wübbeling and Michael Meier (University of Bonn, Germany)
Watch the video here: https://vimeo.com/447438182
LPW 2020
Anonymization of geosocial network data by the (k,l)-degree method with location entropy edge selection
Jana Medková (Faculty of Informatics and Management, University of Hradec Kralove, Czechia)
Watch the video here: https://vimeo.com/444169228
A note on blind contact tracing at scale with applications to the COVID-19 pandemic
Jack Fitzsimons (Oblivious Software Ltd, Ireland), Atul Mantri (University of Maryland, United States), Robert Pisarczyk (University of Oxford, United Kingdom & National University of Singapore, Singapore), Tom Rainforth (University of Oxford, United Kingdom) and Zhikuan Zhao (ETH Zurich, Switzerland)
SSE 2020
AntiPatterns Regarding the Application of Cryptographic Primitives by the Example of Ransomware
Michael P. Heinl, Alexander Giehl (Fraunhofer AISEC, Germany) and Lukas Graif (Technical University of Munich & Fraunhofer AISEC, Germany)
Towards Detection of Software Supply Chain Attacks by Forensic Artifacts
Marc Ohm (University of Bonn, Germany), Arnold Sykosch and Michael Meier (University of Bonn, Fraunhofer FKIE, Germany)
Watch the video here: https://vimeo.com/444165227
Contract-based design patterns: A Design by Contract Approach to Specify Security Patterns
Caine Silva, Sylvain Guérin, Raul Mazo and Joel Champeau (ENSTA Bretagne, France)
Security Impacts of Sub-Optimal DevSecOps Implementations in a Highly Regulated Environment
Jose Morales, Thomas Scanlon, Aaron Volkmann, Joseph Yankel and Hasan Yasar (Carnegie Mellon University, United States)
WISI 2020
AndroPRINT: Analysing the Fingerprintability of the Android API
Gerald Palfinger (Secure Information Technology Center – Austria (A-SIT), Austria)
and Bernd Prünster (Institute of Applied Information Processing and Communications (IAIK), Graz University of Technology, Austria)
A Semi-Supervised Approach for Network Intrusion Detection
Radoslava Švihrová and Christian Lettner (Software Competence Center Hagenberg, Austria)
Watch the video here: https://vimeo.com/444169250
RESCURE: A security solution for IoT life cycle
Georgios Selimis, Rui Wang, Roel Maes, Geert-Jan Schrijen (Intrinsic ID, Eindhoven Netherlands), Mario Munzer, Stefan Ilic (Technikon, Villach Austria9, Frans Willems and Lieneke Kusters (Technical University Eindhoven, Netherlands)
Improving security in Industry 4.0 by extending OPC-UA with Usage Control
Oleksii Osliak, Andrea Saracino, Fabio Martinelli and Paolo Mori (Istituto di Informatica e Telematica, Consiglio Nazionale delle Ricerche, Italy)
Watch the video here: https://vimeo.com/446734152
Automated Security Test Generation for MQTT Using Attack Patterns
Hannes Sochor, Flavio Ferrarotti and Rudolf Ramler (Software Competence Center Hagenberg, Austria)
WSDF 2020
DFS3: Automated Distributed File System Storage State Reconstruction
Edward Harshany, Ryan Benton, David Bourrie, Michael Black (University of South Alabama, US) and William Glisson (Sam Houston State University, US)
SoK: Exploring the State of the Art and the Future Potential of Artificial Intelligence in Digital Forensic Investigation
Xiaoyu Du (University College Dublin, Ireland), Chris Hargreaves (University of Oxford, United Kingdom), John Sheppard (Waterford Institute of Technology, Ireland), Felix Anda, Asanka Sayakkara, Nhien An Le Khac and Mark Scanlon (University College Dublin, Ireland)
Cosmic Rays: a Neglected Potential Threat to Evidential Integrity in Digital Forensic Investigations?
Richard E Overill (King’s College London, United Kingdom)
Watch the video here: https://vimeo.com/444571183
TAVeer – An Interpretable Topic-Agnostic Authorship Verification Method
Oren Halvani, Lukas Graner and Roey Regev (Fraunhofer Institute for Secure Information Technology, Germany)
Watch the video here: https://vimeo.com/444171758
Blockchain-based Chain of Custody: Towards Real-time Tamper-proof Evidence Management
Liza Ahmad, Salam Khanji, Farkhund Iqbal (Zayed University, United Arab Emirates) and Faouzi Kamoun (ESPRIT School of Engineering, Tunisia)
Detecting Double Compression and Splicing using Benfords First Digit Law
Raphael Antonius Frick, Huajian Liu and Martin Steinebach (Fraunhofer Institute for Secure Information Technology SIT Darmstadt, Germany)
Watch the video here: https://vimeo.com/444174996
SysGen: System State Corpus Generator
Ben Lenard, Alexander Rasin DePaul University, United States), James Wagner (University of New Orleans, United States) and Jonathan Grier (Grier Forensics, United States)
Watch the video here: https://vimeo.com/444175024
Post-mortem digital forensic artifacts of TikTok Android App
Patricio Domingues, Ruben Nogueira, José Carlos Francisco and Miguel Frade (ESTG – Polytechnic of Leiriad, Portugal)
Watch the video here: https://vimeo.com/444175033
4P Based Forensics Investigation Framework for Smart Connected Toys
Benjamin Yankson (University at Albany – SUNY, United Stated), Farkhund Iqbal (Zayed University, United Arab Emirates) and Patrick C. K. Hung (OntarioTech University, Canada)
NG-SOC 2020
The SOCCRATES Project: Overview and Objectives
Frank Fransen (TNO, The Netherlands)
Watch the video here: https://vimeo.com/447119596
The SAPPAN Project: Overview and Objectives
Avikarsha Mandal (Fraunhofer FIT, Germany)
Watch the video here: https://vimeo.com/447119510
Monitoring Malicious Infrastructures to Produce Threat Intelligence
Piotr Kijewski (Shadowserver, the Netherlands)
Pipeline development for Automatically Generated Domain detection
Irina Chiscop (TNO, the Netherlands)
Watch the video here: https://vimeo.com/447119526
Leveraging Machine Learning for DGA Detection
Arthur Drichel (RWTH Aachen University, Germany)
Watch the video here: https://vimeo.com/447119496
Knowledge Management and Anonymization Techniques in Cyber-Threat Intelligence
Lasse Nitz, Mehdi Akbari Gurabi (Fraunhofer FIT, Germany)
Watch the video here: https://vimeo.com/447119633
Reputation Management Techniques for IP addresses, domains, and mail
Mischa Obrecht, Jeroen van Meeuwen (DreamLab,Switzerland)
Host and Application Behaviour Modelling
Tomas Jirsik (Masaryk University, Czechia), Sebastian Schäfer (RWTH Aachen University, Germany)
Watch the video here: https://vimeo.com/447119624
L-ADS: Live Anomaly Detection System
Alejandro Garcia Bedoya (ATOS, Spain)
Watch the video here: https://vimeo.com/447119485
Adversarial Examples against Intrusion Detection Systems
Ewa Piatkowska (AIT, Austria)
Watch the video here: https://vimeo.com/447119582
Fast and Scalable Cybersecurity Data Processing
Gabriela Aumayr (HPE, Ireland)
Attack Analysis with Attack Defence Graphs
Erik Ringdahl (Foreseeti, Sweden)
Watch the video here: https://vimeo.com/447119568
Attack Graph-based Courses of Action for Defense
Wojciech Widel (KTH, Sweden)
Watch the video here: https://vimeo.com/447436972
Visual Analytics for Cyber Security Data
Christoph Müller and Franziska Becker (University of Stuttgart, Germany)
An anomaly detection approach to analysis of security monitoring data from endpoints.
Dmitry Komashinskiy, David Karpuk, Samuel Marshal, Alexey Kirichenko (Fsecure, Finland)