Accepted Workshop Papers/Talks

5G-NS 2020

Distributed Packet Inspection for Network Security Purposes in Software-Defined Networking Environments
Piotr Nowakowski, Piotr Żórawski, Krzysztof Cabaj, Marcin Gregorczyk, Maciej Purski and Wojciech Mazurczyk (Warsaw University of Technology, Poland)

A Device Identification Method Based on LED Fingerprint for Visible Light Communication System
Dayu Shi, Xun Zhang, Andrei Vladimirescu, Lina Shi, Yanqi Huang and Yourong Liu (Institut supérieur d’électronique de Paris, France)

watch the video here: https://vimeo.com/444178811

INSPIRE-5Gplus : Intelligent Security and Pervasive Trust for 5G and Beyond Networks
Jordi Ortiz, Ramon Sanchez-Iborra, Jorge Bernal, Antonio Skarmeta Gomez (Universidad de Murcia, Spain), Chafika Benzaid, Tarik Taleb (University of Aalto, Finland), Pol Alemany, Raul Muñoz, Ricard Vilalta (Centre Tecnològic de Telecomunicacions de Catalunya (CTTC/CERCA), Spain), Chrystel Gaber, Jean-Philippe Wary (Orange, France), Dhouha Ayed, Pascal Bisson (Thales Group, France), Maria Christopoulou, George Xilouris (NCSR Demokritos, Greece), Edgardo Montes de Oca (Montimage, France), Gürkan Gür (Zhaw Zurich University of Applied Sciences, Switzerland), Gianni Santinelli, Vincent Lefebvre (Solidshild, France), Antonio Pastor and Diego Lopez (Telefonica, Spain)

Watch the video here: https://vimeo.com/444484613

Post-quantum MACsec Key Agreement for Ethernet Networks
Joo Yeon Cho (ADVA Optical Networking SE, Germany) and Andrew Sergeev (ADVA Optical Networking Israel Ltd., Israel)

Watch the video here: https://vimeo.com/444484627

CSA 2020

SoK: Linking Information Security Metrics to Management Success Factors
Rainer Diesch (fortiss GmbH, Germany) and Helmut Krcmar (Technical University of Munich, Germany)

CYSAS-S3: A novel dataset for validating cyber situational awareness related tool for supporting military operations
Roumen Daton Medenou (Universidad Internacional de La Rioja (UNIR), INDRA, Spain), Victor Manuel Calzado Mayo, Miriam Garcia Balufo, Miguel Páramo Castrillo, Francisco José González Garrido(INDRA, Spain), Alvaro Morais Fernandez (Universidad Politecnica de Madrid (UPM), INDRA, Spain), David Nevado Catalán (Universidad Carlos III de Madrid (UC3M), INDRA, Spain), Ao Hu (INDRA, Spain), David Sandoval Rodríguez-Bermejo (Universidad Carlos III de Madrid (UC3M), INDRA, Spain), Jorge Maestre Vidal, Gerardo Ramis Pasqual De Riquelme INDRA, Spain), Antonio Berardi, Paolo De Santis, Francesco Torelli (Leonardo-Finmeccanica, Italy) and Salvador Llopis Sanchez (European Defence Agency (EDA), Belgium)

Watch the video here: https://vimeo.com/448893096

Evaluation Methodology for Mission-Centric Cyber Situational Awareness capabilities
David Sandoval Rodríguez-Bermejo (Universidad Carlos III de Madrid / Indra, Spain), Roumen Daton Medenou (UNIR / Indra, Spain), Gerardo Ramis Pasqual de Riquelme, Jorge Maestre Vidal(Indra, Spain), Francesco Torelli (Leonardo-Finmeccanica, Italy) and Salvador Llopis Sánchez (Universidad Politécnica de Valencia / EDA, Spain)

Watch the video here: https://vimeo.com/446741322

Dynamic Risk Management Architecture Based on Heterogeneous Data Sources for Enhancing the Cyber Situational Awareness in Organizations
Xavier Larriva-Novo, Mario Vega-Barbas, Víctor A Villagrá, Diego Rivera, Mario Sanz and Manuel Álvarez-Campana (Universidat Politécnica de Madrid, Spain)

A novel automatic discovery system of critical assets in cyberspace-oriented military missions
Alvaro Luis Martinez (Universidad Politécnica de Madrid and Indra, Spain) and Víctor A. Villagrá González (Universidad Politécnica de Madrid, Spain)

Watch the video here: https://vimeo.com/444488563

Denial of Sustainability on military Tactical Clouds
Jorge Maestre Vidal (Indra, Spain) and Marco Antonio Sotelo Monge (Universidad de Murcia, Spain)

RelaxationTime in Complex Network
Dmytro Lande (Institute for data recording NAS of Ukraine, Ukraine), Andrii Snarskii (National Technical University «Igor Sikorsky Kyiv Polytechnic Institute», Ukraine), Oleh Dmytrenko (Institute for data recording NAS of Ukraine, Ukraine) and Igor Subach (National Technical University «Igor Sikorsky Kyiv Polytechnic Institute», Ukraine)

watch the video here: https://vimeo.com/444488544

CUING 2020

To Tweet or Not to Tweet: Covertly Manipulating a Twitter Debate on Vaccines Using Malware-Induced Misperceptions
Filipo Sharevski ((DePaul University, College of Computing and Digital Media, Divergent Design Lab, Chicago, IL, USA), Peter Jachim and Kevin Florek (DePaul University, Divergent Design Lab, Chicago, IL, USA)

Watch the video here: https://vimeo.com/443282613

Leveraging eBPF to preserve user privacy for DNS, DoT, and DoH queries
Sean Rivera (University of Luxembourg, Luxembourg), Vijay Gurbani (Illinois Institute of Technology, United States), Sofiane Lagraa, Antonio Ken Iannillo and Radu State (University of Luxembourg, Luxembourg)

Watch the video here: https://vimeo.com/443290052

Critical Traffic Analysis on the Tor Network
Florian Platzer (Fraunhofer SIT, Germany), Marcel Schäfer (Frauhofer USA CESE, United States) and Martin Steinebach (Fraunhofer SIT, Germany)

Stegomalware Detection Through Structural Analysis of Media Files
Damian Puchalski (ITTI Sp. z o.o., Poland), Luca Caviglione (National Research Council of Italy, Italy), Rafal Kozik (ITTI Sp. z o.o., Poland), Adrian Marzecki, Slawomir Krawczyk (Orange Polska, Poland) and Michal Choras (FernUniversitat in Hagen, Germany & UTP Bydgoszcz, Poland)

Covert Storage Caches using the NTP Protocol
Tobias Schmidbauer (University of Hagen, Germany) and Steffen Wendzel (Worms University of Applied Sciences, Germany)

Exploiting Minification for Data Hiding Purposes
Pawel Rajba (University of Wroclaw, Poland) and Wojciech Mazurczyk (Warsaw University of Technology, Poland)

Watch the video here: https://vimeo.com/444571210

Mixed-code text analysis for the detection of online hidden propaganda
Andrea Tundis, Gaurav Mukherjee and Max Mühlhäuser (Technische Universität Darmstadt, Germany)

Design and Performance Evaluation of Reversible Network Covert Channels
Przemysław Szary, Wojciech Mazurczyk (Warsaw University of Technology, Poland), Luca Caviglione (CNR – IMATI, Italy) and Steffen Wendzel (Worms University of Applied Sciences and Fraunhofer FKIE, Germany)

Exploring Data Leakage in Encrypted Payload Using Supervised Machine Learning
Amir Khaleghi Moghaddam and Nur Zincir-Heywood (Dalhousie University, Canada)

Watch the video here: https://vimeo.com/444180920

Network Covert Channels Detection using Data Mining and Hierarchical Organisation of Frequent Sets: an Initial Study
Piotr Nowakowski, Piotr Żórawski, Krzysztof Cabaj and Wojciech Mazurczyk (Warsaw University of Technology, Poland)

An Investigation on the Feasibility of the Bluetooth Frequency Hopping Mechanism for the Use as a Covert Channel Technique
Daniel Vogel, Ulugbek Akhmedjanov, Marc Ohm (University of Bonn, Germany) and Michael Meier (University of Bonn, Fraunhofer FKIE, Germany)

Watch the video here: https://vimeo.com/447063440

Non-Blind Steganalysis
Niklas Bunzel, Martin Steinebach and Huajian Liu (Fraunhofer SIT, Germany)

CyberTIM 2020

Making Use of NXt to Nothing: The Effect of Class Imbalances on DGA Detection Classifiers
Arthur Drichel, Ulrike Meyer (RWTH Aachen University, Germany), Samuel Schüppen and Dominik Teubert (Siemens CERT, Germany)

Watch the video here: https://vimeo.com/444171738

CyberWolf in Wall Street: Assessing Vulnerabilities of ICT-Intensive Financial Markets
Andrea Calesso (Aequo S.r.L., University of Padova, Italy) , Mauro Conti (Department of Mathematics, University of Padova, Italy) and Martino Grasselli (University of Padova – Department of Mathematics; Léonard de Vinci Pôle Universitaire, Research Center, Italy)

DoH Insight: Detecting DNS over HTTPS by Machine Learning
Dmitrii Vekshin (FIT CTU, Czechia), Karel Hynek (FIT CTU & CESNET a.l.e., Czechia) and Tomas Cejka (CESNET a.l.e., Czechia)

EPESEC 2020

Cyber-Risk Identification for a Digital Substation
Athar Khodabakhsh, Sule Yildirim Yayilgan, Mohamed Abomhara (Norwegian University of Science and Technology, NTNU, Norway), Maren Istad (SINTEF Energy Research, Norway) and Nargis Hurzuk (Statnett, Norway)

Watch the video here: https://vimeo.com/444176540

Data Visualisation in Internet of Things: Tools, Methodologies, and Challenges
Antonis Protopsaltis, Panagiotis Sarigiannidis (University of Western Macedonia, Greece), Dimitrios Margounakis and Anastasios Lytos (Sidroco Holdings Ltd, Cyprus)

Watch the video here: https://vimeo.com/444178785

Threat Landscape for Smart Grid Systems
Christos-Minas Mathas, Konstantinos-Panagiotis Grammatikakis, Costas Vassilakis, Nicholas Kolokotronis (University of the Peloponnese, Greece), Vasiliki-Georgia Bilali and Dimitris Kavallieros (KEMEA Center for Security Studies, Greece)

Building a testing environment for SDN networks analysis for electrical grid applications
Toni Cantero-Gubert, Alba Colet, Pol Paradell and J. L. Domínguez-García (IREC, Spain)

Watch the video here: https://vimeo.com/447057882

Advanced Metering Infrastructures: Security Risks and Mitigations
Gueltoum Bendiab (University of Portsmouth, UK), Konstantinos-Panagiotis Grammatikakis, Ioannis Koufos, Nicholas Kolokotronis (University of the Peloponnese, Greece) & Stavros Shiaeles (University of Portsmouth, UK)

On the Importance of cyber-security training for multi-vector energy distribution system operators
Dimitrios Vozikis (University of Strathclyde, UK), Eleni Darra (KEMEA-Center for Security Studies Athens, Greece), Tanel Kuusk (CybExer Technologies Tallinn, Estonia), Dimitris Kavallieros (Center for Security Studies Athens & University of the Peloponnese, Greece), Aare Reintam (CybExer Technologies Tallinn, Estonia) & Xavier Bellekens (University of Strathclyde, UK)

DIDEROT: An Intrusion Detection and Prevention System for DNP3-based SCADA Systems
Panagiotis Radoglou-Grammatikis, Panagiotis Sarigiannidis (University of Western Macedonia, Greece), George Efstathopoulos (0infinity Limited, UK), Paris-Alexandros Karypidis & Antonios Sarigiannidis (SIDROCO HOLDINGS Ltd, Cyprus)

Factors affecting the market adoption of cyber-security products in Energy and Electrical systems: The case of SPEAR
Theodoros Rokkas, Ioannis Neokosmidis (inCITES Consulting, Luxembourg)

FARES 2020

Investigation into the Security and Privacy of iOS VPN Applications
Jack Wilson, David McLuskie and Ethan Bayne (Abertay University, UK)

Watch the video here: https://vimeo.com/446730517

Negative Filtering of CCTV Content -Forensic Video Analysis Framework
Franck Jeveme Panta, André Péninou and Florence Sedes (Université Toulouse III – Paul Sabatier, France)

Refining the evaluation of the degree of security of a system built using security patterns
Olga Villagran-Velasco (Universidad Nac. Autonoma de Mexico,Mexico), Eduardo B. Fernandez (Florida Atlantic University, USA )and Jorge Ortega-Arjona (Universidad Nac. Autonoma de Mexico, Mexico)

Watch the video here: https://vimeo.com/444165204

Adversarial Machine Learning for Spam Filters
Bhargav Kuchipudi, Ravi Teja Nannapaneni and Qi Liao (Central Michigan University, United States)

An Empirical Study on the Impact of GDPR and Right to be Forgotten on Data Privacy
Vincenzo Mangini, Irina Tal and Arghir-Nicolae Moldovan (School of Computing, National College of Ireland, Dublin, Ireland)

Watch the video here: https://vimeo.com/447062999

Automated Modelling of Security Incidents to represent Logging Requirements in Software Systems
Fanny Rivera-Ortiz and Liliana Pasquale (University College Dublin & Lero, Dublin, Ireland)

Watch the video here: https://vimeo.com/444178804

IoT-SECFOR 2020

An IoT Bricking Ransomware Proof of Concept
Calvin Brierley, Jamie Pont, Budi Arief, David Barnes and Julio Hernandez-Castro (School of Computing, University of Kent, UK)

Watch the video here: https://vimeo.com/443286591

Taxonomy and Challenges in Machine Learning-based Approaches to Detect Attacks in the Internet of Things
Omair Faraj, David Megías-Jiménez (Universitat Oberta de Catalunya, CYBERCAT-Center for Cybersecurity Research of Catalonia, Spain), Abdel Mehsen-Ahmad (Lebanese International University (LIU), The International University of Beirut (BIU), Lebanon) and Joaquin Garcia-Alfaro (Institut Polytechnique de Paris, SAMOVAR, Telecom SudPar”, France)

Watch the video here: https://vimeo.com/447416136

Privacy threats in low-cost people counting devices
Niccolò Maltoni, Antonio Magnani and Luca Calderoni (University of Bologna, Italy)

Clust-IT: Clustering-Based Intrusion Detection in IoT Environments
Robert Markiewicz and Daniele Sgandurra (Royal Holloway, University of London (S3Lab, Information Security Group, United Kingdom)

iPAT 2020

A Silver Bullet? A Comparison of Accountants and Developers Mental Models in the Raise of Blockchain
Rose Esmander (École Supérieure de Commerce de Paris (ESCP) & Be-Studys, Be-Ys group, France), Pascal Lafourcade (Université Clermont Auvergne, LIMOS, France), Marius Lombard-Platet (DIENS, École normale supérieure, CNRS, PSL Research University,& Be-Studys, Be-Ys group, France) and Claudia Negri Ribalta (CRI, Université Paris-1 Pantheon-Sorbonn & Be-Studys, Be-Ys group, France)

Balancing Trust and Privacy in Computer-Mediated Introduction
Angela Borchert, Nicolás Emilio Díaz Ferreyra and Maritta Heisel (University of Duisburg-Essen, Germany)

Watch the video here: https://vimeo.com/444176559

IWCC 2020

A comparison of stream mining algorithms on botnet detection
Guilherme Henrique Ribeiro Elaine Ribeiro de Faria and Rodrigo Sanches Miani (Federal University of Uberlândia, Brazil)

Watch the video here: https://vimeo.com/444158688

Cyberspace threats: not only hackers and criminals. Raising the awareness of selected unusual cyberspace actors – cybersecurity researchers’ perspective
Pawlicka Aleksandra (ITTI Sp. z o.o. Poznań, Poland), Michal Choras (UTP University of Science and Technology Bydgoszcz Poland, FernUniversität in Hagen, Germany) and Marek Pawlicki (UTP University of Science and Technology Bydgoszcz, ITTI Sp. z o.o. Poznań, Poland)

Watch the video here: https://vimeo.com/447413640

A privacy-aware digital forensics investigation in enterprises
Ludwig Englbrecht (Department of Information Systems, University of Regensburg, Germany) and Günther Pernul (Department of Information Systems, University of Regensburg, Germany)

Watch the video here: https://vimeo.com/444165151

Real-Time Stream Processing Tool for Detecting Suspicious Network Patterns Using Machine Learning
Mikolaj Komisarek (UTP University of Science and Technology Bydgoszcz, ITTI Sp. z o.o. Poznań, Poland), Michal Choras (FernUniversitat in Hagen, Germany & UTP Bydgoszcz, Poland), Rafal Kozik) and Marek Pawlicki (UTP University of Science and Technology Bydgoszcz, ITTI Sp. z o.o. Poznań, Poland)

Ransomware 2.0: To sell, or not to sell. A Game-theoretical Model of Data-selling Ransomware
Zhen Li (Albion College, United States) and Qi Liao (Central Michigan University, United States)

Detection and classification of Slow DoS Attacks targeting network servers
Enrico Cambiaso, Maurizio Aiello and Ivan Vaccari (Consiglio Nazionale delle Ricerche (CNR), Italy)

Locality Sensitive Hashing for Tampering Detection in Automotive Systems
Roland Bolboacă, Teri Lenard, Bela Genge and Piroska Haller (University of Medicine, Pharmacy, Science and Technology of Targu Mures, Romania)

Watch the video here: https://vimeo.com/444176531

Privacy-Enhanced Robust Image Hashing with Bloom Filters
Uwe Breidenbach (Technische Universität Darmstadt, Germany), Martin Steinebach and Huajian Liu (Fraunhofer Institute for Secure Information Technology SIT, Germany)

Watch the video here: https://vimeo.com/444178774

IWSMA 2020

Towards the performance evaluation of a Clustering and Trust based Security mechanism for VANET
Amira Kchaou, Ryma Abassi and Sihem Guemara (Higher school of communications of Tunis, Tunisia)

Memory Corruption Attacks within Android TEEs: A Case Study Based on OP-TEE
Fabian Fleischer, Marcel Busch and Phillip Kuhrt (IT Security Infrastructures Lab, Department of Computer Science Friedrich-Alexander University Erlangen-Nürnberg (FAU), Germany)

Watch the video here: https://vimeo.com/444169237

VisualDroid: Automatic Triage and Detection of Android Repackaged Applications
Rosangela Casolare (University of Molise, Italy), Francesco Mercaldo (University of Molise & IIT-CNR, Italy), Carlo De Dominicis(University of Molise, Italy), Fabio Martinelli (IIT-CNR, Italy), Antonella Santone(University of Molise, Italy)

Watch the video here: https://vimeo.com/444173522

ASAINT: A Spy App Identification System based on Network Traffic
Mauro Conti (University of Padua, Italy), Giulio Rigoni (University of Florence, Italy) and Flavio Toffalini (Singapore University of Technology and Design,
Singapore)

Watch the video here: https://vimeo.com/444173540

A hardware implementation of the Device Identifier Composition Engine
Lukas Jäger and Richard Petri (Fraunhofer Institute for Secure Information Technology, Germany)

Watch the video here: https://vimeo.com/443282646

IWSMR 2020

An Overview of Limitations and Approaches in Identity Management
Daniela Pöhn (Universität der Bundeswehr München, Research Institute CODE, Germany) and Wolfgang Hommel (Universität der Bundeswehr München, Research Institute CODE, Germany)

A Framework for Automated Evaluation of Security Metrics
Matthew Zaber and Suku Nair (SMU AT&T Center for Virtualization, United States)

Generalizing the Phishing Principle – Analyzing User Behavior in Response to Controlled Stimuli for IT Security Awareness Assessment
Arnold Sykosch (University of Bonn, Germany), Christian Doll (Fraunhofer FKIE, Germany), Matthias Wübbeling and Michael Meier (University of Bonn, Germany)

Watch the video here: https://vimeo.com/447438182

LPW 2020

Anonymization of geosocial network data by the (k,l)-degree method with location entropy edge selection
Jana Medková (Faculty of Informatics and Management, University of Hradec Kralove, Czechia)

Watch the video here: https://vimeo.com/444169228

A note on blind contact tracing at scale with applications to the COVID-19 pandemic
Jack Fitzsimons (Oblivious Software Ltd, Ireland), Atul Mantri (University of Maryland, United States), Robert Pisarczyk (University of Oxford, United Kingdom & National University of Singapore, Singapore), Tom Rainforth (University of Oxford, United Kingdom) and Zhikuan Zhao (ETH Zurich, Switzerland)

SSE 2020

AntiPatterns Regarding the Application of Cryptographic Primitives by the Example of Ransomware
Michael P. Heinl, Alexander Giehl (Fraunhofer AISEC, Germany) and Lukas Graif (Technical University of Munich & Fraunhofer AISEC, Germany)

Towards Detection of Software Supply Chain Attacks by Forensic Artifacts
Marc Ohm (University of Bonn, Germany), Arnold Sykosch and Michael Meier (University of Bonn, Fraunhofer FKIE, Germany)

Watch the video here: https://vimeo.com/444165227

Contract-based design patterns: A Design by Contract Approach to Specify Security Patterns
Caine Silva, Sylvain Guérin, Raul Mazo and Joel Champeau (ENSTA Bretagne, France)

Security Impacts of Sub-Optimal DevSecOps Implementations in a Highly Regulated Environment
Jose Morales, Thomas Scanlon, Aaron Volkmann, Joseph Yankel and Hasan Yasar (Carnegie Mellon University, United States)

WISI 2020

AndroPRINT: Analysing the Fingerprintability of the Android API
Gerald Palfinger (Secure Information Technology Center – Austria (A-SIT), Austria)
and Bernd Prünster (Institute of Applied Information Processing and Communications (IAIK), Graz University of Technology, Austria)

A Semi-Supervised Approach for Network Intrusion Detection
Radoslava Švihrová and Christian Lettner (Software Competence Center Hagenberg, Austria)

Watch the video here: https://vimeo.com/444169250

RESCURE: A security solution for IoT life cycle
Georgios Selimis, Rui Wang, Roel Maes, Geert-Jan Schrijen (Intrinsic ID, Eindhoven Netherlands), Mario Munzer, Stefan Ilic (Technikon, Villach Austria9, Frans Willems and Lieneke Kusters (Technical University Eindhoven, Netherlands)

Improving security in Industry 4.0 by extending OPC-UA with Usage Control
Oleksii Osliak, Andrea Saracino, Fabio Martinelli and Paolo Mori (Istituto di Informatica e Telematica, Consiglio Nazionale delle Ricerche, Italy)

Watch the video here: https://vimeo.com/446734152

Automated Security Test Generation for MQTT Using Attack Patterns
Hannes Sochor, Flavio Ferrarotti and Rudolf Ramler (Software Competence Center Hagenberg, Austria)

WSDF 2020

DFS3: Automated Distributed File System Storage State Reconstruction
Edward Harshany, Ryan Benton, David Bourrie, Michael Black (University of South Alabama, US) and William Glisson (Sam Houston State University, US)

SoK: Exploring the State of the Art and the Future Potential of Artificial Intelligence in Digital Forensic Investigation
Xiaoyu Du (University College Dublin, Ireland), Chris Hargreaves (University of Oxford, United Kingdom), John Sheppard (Waterford Institute of Technology, Ireland), Felix Anda, Asanka Sayakkara, Nhien An Le Khac and Mark Scanlon (University College Dublin, Ireland)

Cosmic Rays: a Neglected Potential Threat to Evidential Integrity in Digital Forensic Investigations?
Richard E Overill (King’s College London, United Kingdom)

Watch the video here: https://vimeo.com/444571183

TAVeer – An Interpretable Topic-Agnostic Authorship Verification Method
Oren Halvani, Lukas Graner and Roey Regev (Fraunhofer Institute for Secure Information Technology, Germany)

Watch the video here: https://vimeo.com/444171758

Blockchain-based Chain of Custody: Towards Real-time Tamper-proof Evidence Management
Liza Ahmad, Salam Khanji, Farkhund Iqbal (Zayed University, United Arab Emirates) and Faouzi Kamoun (ESPRIT School of Engineering, Tunisia)

Detecting Double Compression and Splicing using Benfords First Digit Law
Raphael Antonius Frick, Huajian Liu and Martin Steinebach (Fraunhofer Institute for Secure Information Technology SIT Darmstadt, Germany)

Watch the video here: https://vimeo.com/444174996

SysGen: System State Corpus Generator
Ben Lenard, Alexander Rasin DePaul University, United States), James Wagner (University of New Orleans, United States) and Jonathan Grier (Grier Forensics, United States)

Watch the video here: https://vimeo.com/444175024

Post-mortem digital forensic artifacts of TikTok Android App
Patricio Domingues, Ruben Nogueira, José Carlos Francisco and Miguel Frade (ESTG – Polytechnic of Leiriad, Portugal)

Watch the video here: https://vimeo.com/444175033

4P Based Forensics Investigation Framework for Smart Connected Toys
Benjamin Yankson (University at Albany – SUNY, United Stated), Farkhund Iqbal (Zayed University, United Arab Emirates) and Patrick C. K. Hung (OntarioTech University, Canada)

NG-SOC 2020

The SOCCRATES Project: Overview and Objectives
Frank Fransen (TNO, The Netherlands)

Watch the video here: https://vimeo.com/447119596

The SAPPAN Project: Overview and Objectives
Avikarsha Mandal (Fraunhofer FIT, Germany)

Watch the video here: https://vimeo.com/447119510

Monitoring Malicious Infrastructures to Produce Threat Intelligence
Piotr Kijewski (Shadowserver, the Netherlands)

Pipeline development for Automatically Generated Domain detection
Irina Chiscop (TNO, the Netherlands)

Watch the video here: https://vimeo.com/447119526

Leveraging Machine Learning for DGA Detection
Arthur Drichel (RWTH Aachen University, Germany)

Watch the video here: https://vimeo.com/447119496

Knowledge Management and Anonymization Techniques in Cyber-Threat Intelligence
Lasse Nitz, Mehdi Akbari Gurabi (Fraunhofer FIT, Germany)

Watch the video here: https://vimeo.com/447119633

Reputation Management Techniques for IP addresses, domains, and mail
Mischa Obrecht, Jeroen van Meeuwen (DreamLab,Switzerland)

Host and Application Behaviour Modelling
Tomas Jirsik (Masaryk University, Czechia), Sebastian Schäfer (RWTH Aachen University, Germany)

Watch the video here: https://vimeo.com/447119624

L-ADS: Live Anomaly Detection System
Alejandro Garcia Bedoya (ATOS, Spain)

Watch the video here: https://vimeo.com/447119485

Adversarial Examples against Intrusion Detection Systems
Ewa Piatkowska (AIT, Austria)

Watch the video here: https://vimeo.com/447119582

Fast and Scalable Cybersecurity Data Processing
Gabriela Aumayr (HPE, Ireland)

Attack Analysis with Attack Defence Graphs
Erik Ringdahl (Foreseeti, Sweden)

Watch the video here: https://vimeo.com/447119568

Attack Graph-based Courses of Action for Defense
Wojciech Widel (KTH, Sweden)

Watch the video here: https://vimeo.com/447436972

Visual Analytics for Cyber Security Data
Christoph Müller and Franziska Becker (University of Stuttgart, Germany)

An anomaly detection approach to analysis of security monitoring data from endpoints.
Dmitry Komashinskiy, David Karpuk, Samuel Marshal, Alexey Kirichenko (Fsecure, Finland)