Program

8:30 am - 9:00 am

Registration

9:00 am - 9:30 am

Opening Session

Prof. Sanjay Goel, SUNY Albany

Prof. Imrich Chlamtac, President of European Alliance for Innovation

Prof. Dragan Perakovic, University of Zagreb

9:30 am - 10:15 am

Keynote Talk

Prof. Ivan Martinovic, Oxford University

Prof. Ivan Martinovic Prof. Ivan Martinovic
10:15 am - 10:30 am

Coffee Break

10:30 am - 12:30 pm

Session 1: Artificial Intelligence & Security

Toward Forensic Friendly AI Integrating Blockchain with Federated Learning to Enhance AI Trustworthiness - Safiia Mohammed (University of Windsor)

Multi-tool Approach for Advanced Quantum Key Distribution Network Modeling - Ivan Cvitic (Faculty of Transport and Traffic Sciences, University of Zagreb); Dragan Peraković (University of Zagreb); Josip Vladava (University of Zagreb); Karlo Gavrilović (University of Zagreb)

Deep Learning Methods for Intrusion Detection Systems on the CSE-CIC-IDS2018 Dataset: A Review - Erdal BAŞARAN (Agri Ibrahim Cecen University); Sanjay Goel (Information Security and Digital Forensics University at Albany); Yuksel Celik (University at Albany)

CTIMiner: Cyber Threat Intelligence Mining Using Adaptive Multi-Task Adversarial Active Learning - Chunyan Ma (Chinese Academy of Sciences); Zhengwei Jiang (Chinese Academy of Sciences); Kai Zhang (Chinese Academy of Sciences); Jun Jiang (Chinese Academy of Sciences); Peian Yang (Chinese Academy of Sciences); Bo Xu (People's Public Security University of China); Huamin Feng (Beijing Electronic Science and Technology Institute)

12:00 pm - 1:30 pm

Lunch

1:00 pm - 2:30 pm

Session 2: Multimedia Forensics

Hacking Mobile Biometrics with the Photograph of a Fingerprint - Sarah Dill (Rochester Institute of Technology); Joseph Hommel (Rochester Institute of Technology); Justin Kennedy (Rochester Institute of Technology); Vaughn Woerpel (Rochester Institute of Technology); Justin Pelletier (Rochester Institute of Technology)

The Hidden Realms of Router Apps: Forensic Analysis of TP-Link Tether and ASUS Router - Akif Ozer (Purdue University); Umit Karabiyik (Purdue University)

ENF Match with Masking: a new method for searching with sparse signal - Nicola Landro (European Commission - Joint Research Centre); Lorenzo Schiavone (European Commission - Joint Research Centre); Anselmo Castelo Branco Ferreira (European Commission - Joint Research Centre); Laurent Beslay (European Commission - Joint Research Centre)

Lightweight Multi-Tier IDS for UAV Security: Enhancing UAV Zero-Day Attacks with Honeypot Threat Intelligence - Abdul Majid Jamil (Wuhan University); Yue Cao (Wuhan University); Hassan Jalil Hadi (Wuhan University); Naveed Ahmad (Prince Sultan University); Aduwati Sali (University Putra Malaysia); Mohammed Ali Alshare (Prince Sultan University); Long Chen (BEIJING UNIVERSITY OF CHEMICAL TECHNOLOGY)

2:30 pm - 4:00 pm

Session 3: Intrusion Detection

Reducing False Positives in Intrusion Detection System Alerts: A Novel Aggregation and Correlation Model -Hassan Jalil Hadi (Wuhan University); Yue Cao (Wuhan University); Faisal Bashir Hussain (Bahria University); Naveed Ahamad (Prince Sultan University); Mohammed ali Alshara (Prince Sultan University); Insaf Ullah (University of Essex); Yasir Javed (Prince Sultan University); Yinglong He (University of Surrey)

APTChaser: Cyber Threat Attribution via Attack Technique Modeling - Zhang Yiming (Chinese Academy of Sciences); Yang Peian (Chinese Academy of Sciences); Jiang Zhengwei (Chinese Academy of Sciences); Ma Chunyan (Chinese Academy of Sciences); Cui Mengjiao (Chinese Academy of Sciences); You Yizhe (Chinese Academy of Sciences)

What Do We Know About the Psychology of Insider Threats? - Jukka Ruohonen (University of Southern Denmark); Mubashrah Saddiqa (University of Southern Denmark)

A Digital Profiling Triage Model for Industrial Espionage - Jieun Dokko (Texas Tech University); Michael Shin (Texas Tech University)

4:00 pm - 4:15 am

Coffee Break

4:15 pm - 5:30 pm

Session 4: Intrusion and Fraud Detection

Uncovering Fraudulent Patterns in USDT Transactions on the TRON Blockchain with EDA and Machine Learning - Yi Anson Lam (The University of Hong Kong); Kam Pui Chow (The University of Hong Kong); Siu Ming Yiu (The University of Hong Kong)

Sky-Eye: Detect Multi-Stage Cyber Attacks at the Bigger Picture - Pengcheng Bi (University of Chinese Academy of Sciences); Qi Wang (National Computer Network Emergency Response Technical Team Coordination Center of China); Zhuohang Lv (National Computer Network Emergency Response Technical Team Coordination Center of China); Xiaochun Yun (Zhongguancun National Laboratory); Tianning Zang (Chinese Academy of Sciences)

ATKHunter: Towards Automated Attack Detection by Behavior Pattern Learning - Yuedong Pan (Institute of Information Engineering, Chinese Academy of Sciences); Lixin Zhao (Institute of Information Engineering, Chinese Academy of Sciences); Chaofei Li (Institute of Information Engineering,Chinese Academy of Sciences); Tao Leng (Institute of Information Engineering, Chinese Academy of Sciences); Aimin Yu (Institute of Information Engineering, Chinese Academy of Sciences); Lijun Cai (Institute of Information Engineering, Chinese Academy of Sciences); Dan Meng (Institute of Information Engineering, Chinese Academy of Sciences);

CTIMiner: Cyber Threat Intelligence Mining Using Adaptive Multi-Task Adversarial Active Learning - Chunyan Ma (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Zhengwei Jiang (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Kai Zhang (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Jun Jiang (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China) Peian Yang (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Bo Xu (People's Public Security University of China, Beijing, China); Huamin Feng (Beijing Electronic Science and Technology Institute, Beijing, China)

5:30 pm - 7:30 pm

Social Program - Cruise around Dubrovnik

9:00 am - 9:45 am

Keynote Talk by Prof. Srdjan Capkun, ETH Zurich

Prof. Srdjan Capkun Prof. Srdjan Capkun
9:45 am - 10:20 am

Keynote Talk by Prof. Enes Sukić, University Union- Nikola Tesla, Belgrade, Serbia

10:20 am - 11:00 am

Industry Presentations

INsig2 Croatia, DCSO Germany, Ventura ERM Brazil

11:00 am - 11:15 am

Coffee Break

11:15 am - 12:15 pm

Session 5: Large Language Models, Advances in Security and Forensics

Investigating the Effectiveness of Bayesian Spam Filters in Detecting LLM-modified Spam Mails - Malte Josten (University of Duisburg-Essen); Torben Weis (University of Duisburg-Essen)

SecureSem: Sensitive Text Classification based on Semantic Feature Optimization -Kangyuan Qin (Institute of Information Engineering, Chinese Academy of Sciences); Ran Liu (Institute of Information Engineering, Chinese Academy of Sciences); Min Yu (Institute of Information Engineering, Chinese Academy of Sciences); Gang Li (School of Information Technology, Deakin University); Mingqi Liu (Institute of Information Engineering, Chinese Academy of Sciences); Jiangyuan Li (Department of Computer Science, Beijing Technology and Business University); Weiqing Huang (Institute of Information Engineering, Chinese Academy of Sciences); Jianguo Jiang (Institute of Information Engineering, Chinese Academy of Sciences)

The Hidden Dangers of Publicly Accessible LLMs: A Case Study on Gab AI - Lakshika Vaishnav (University at Albany)

12:15 pm - 1:00 pm

Session 6: Advances in Security and Fotrensics

Biologically Sustainable Cyber-Physical Spaces: a Systematic Literature Review - Mirella Sangiovanni (Tilburg University, Jads); George Manias (Tilburg University, Jads); Willem-Jan J.A.M. van den Heuvel (Tilburg University,Jads)

Detecting Criminal Networks via Non-Content Communication Data Analysis Techniques from the TRACY Project - Pradeep Rangappa (Idiap Research Institute); Amanda Muscat (Idiap Research Institute); Alejandra Sanchez Lara (Idiap Research Institute); Petr Motlicek (Idiap Research Institute); Michaela Antonopoulou (Performance Technologies, Anonymos Etairia Pliroforikis, Athens, Greece); Ioannis Fourfouris (Performance Technologies, Anonymos Etairia Pliroforikis, Athens, Greece); Antonios Skarlatos (Performance Technologies, Anonymos Etairia Pliroforikis, Athens, Greece); Nikos Avgerinos (Performance Technologies, Anonymos Etairia Pliroforikis, Athens, Greece); Manolis Tsangaris (Performance Technologies, Anonymos Etairia Pliroforikis, Athens, Greece)

1:00 pm - 2:00 pm

Lunch

2:00 pm - 4:00 pm

Online Session: Security Analytics, Threat Intelligence,Multimedia Forensics

Assessing Threats: Security Boundary and Side-channel Attack Detection in the Metaverse - Ruiyuan Yang (Xidian University); Guohao Li (Xidian University); Li Yang (Xidian University); Hao Zhang (Xidian University); Jiangyu Wang (Xidian University); Anyuan Sang (Xidian University)

EG-SAN: Evolving Graph Self-Attention Networks for Detecting Illicit Activities in Cryptocurrency - Bo Cui (Inner Mongolia University); Jia Zhang (Inner Mongolia University)

Auto-TFCE: Automatic Traffic Feature Code Extraction Method and Its Application in Cyber Security - Junjiang He (Sichuan University); Jiayan Wang (Sichuan University); Jiangchuan Chen (Sichuan University); Wenbo Fang (Sichuan University); Lei Zhang (Sichuan University); Tao Li (Sichuan University)

Improved Federated Learning Model Against Poisoning Attacks by Using Iterative Blockchain Validators - Song Ding (Nanjing University of Information Science and Technology); Fuya Xu (Nanjing University of Information Science and Technology); Peiyun Zhang (Nanjing University of Information Science and Technology); Zhangjie Fu (Nanjing University of Information Science and Technology); Kezhong Lu (Chizhou University)

ThreatResponder: Dynamic Markov-based Defense Mechanism for Real-time Cyber Threats - Zhiling Zhu (Zhejiang University of Technology); Tieming Chen (Zhejiang University of Technology); Qijie Song (Zhejiang University of Technology); Yiheng Lu (Zhejiang University of Technology); Yulin Zheng (Zhejiang University of Technology)

Social Media Threat Intelligence: A Framework for Collecting and Categorizing Threat-Related Data - Ikuesan, Richard Adeyemi (Zayed University); Obojo, Victor (Cyber Threat Intelligence Division, CyberDome); Galadima, Haula (Cyber Threat Intelligence Division, CyberDome)

A Comprehensive Survey on Basic Safety Message Attacks and Their Detection - Mohamed, Ahmed (University of Tennessee at Chattanooga); Xie, Mengjun (University of Tennessee at Chattanooga)

BGETC: An Encrypted Traffic Classification Method Based on BERT and GRU - Yang, Xiaotong (Xinjiang University); Luktarhan, Nurbol (Xinjiang University); Meng, Yi (Xinjiang University); Mei, Yihe (Xinjiang University); Zhao, Guodong (xinjiang university)

AnGSL: Graph-Based Android Malware Detection Method - Zhao, Guodong (Xinjiang University); Luktarhan, Nurbol (Xinjiang University); Mei, Yihe (Xinjiang University); Meng, Yi (Xinjiang University); Yang, Xiaotong (Xinjiang University)

Auto-TFCE: Automatic Traffic Feature Code Extraction Method and Its Application in Cyber Security - He, Junjiang (Sichuan University); Wang, Jiayan (Sichuan University); Chen, Jiangchuan (Sichuan University); Fang, Wenbo (Sichuan University); Zhang, Lei (Sichuan University); Li, Tao (Sichuan University)

MSP: A Zero-latency Lightweight Website Fingerprinting Defense for Tor Network - Lu, Tianbo (Beijing University of Posts and Telecommunications); Tao, Xiaohan (Beijing University of Posts and Telecommunications); Li, Yanfang (Beijing University of Posts and Telecommunications); Shang, Jiaze (Beijing University of Posts and Telecommunications)

An IP Anti-Geolocation Method Based on Constructed Landmarks - Lu, Enshang (Information Engineering University); Ding, Shichang (Henan Key Laboratory of Cyberspace Situation Awareness); Yang, Chunfang (Information Engineering University); Gong, Daofu (Information Engineering University); Li, Ruixiang (Henan Key Laboratory of Cyberspace Situation Awareness); Zhu, Kaijie (Zhongguancun Laboratory); Luo, Xiangyang (Information Engineering University)

Burst Sequence Based Graph Neural Network for Video Traffic Identification - xiong, jian (university of jinan/Shandong Provincial Key Laboratory of Network Based Intelligent Computing); bao, yingshuo (University of Jinan/ Shandong Provincial Key Laboratory of Network Based Intelligent Computing); peng, lizhi (Quancheng Laboratory/University of Jinan); li, shengbao (School of Cyber Security, University of Chinese Academy of Sciences/Shandong Branch of National Computer Network Emergency Response Technical Team/Coordination Center of China); zhao, kun (Inspur Computer Technology Co., Ltd)

KP-WF: Cross-domain Few-shot Website Fingerprinting - Liu, Lin (College of Computer, National University of Defense Technology, Changsha, China); Wei, Ziling (College of Computer, National University of Defense Technology, Changsha, China); Chen, Shuhui (College of Computer, National University of Defense Technology, Changsha, China); su, jinshu (College of Computer, National University of Defense Technology, Changsha, China); Yuan, Yong (College of Computer, National University of Defense Technology, Changsha, China)

4:00 pm - 4:15 pm

Coffee Break

4:30 pm - 6:00 pm

Online Session: Generative AI, Emerging Threats

Pixel-level Face Correction Task for More Generalized Deepfake Detection - Li, Xiang (Beijing University of Posts and Telecommunications); You, Weike (Beijing University of Posts and Telecommunications); Lin, Qingran (Beijing University of Posts and Telecommunications); Zhou, Linna (Beijing University of Posts and Telecommunications)

Securing Social Relationships: An Algorithm for Privacy Preservation Targeting Vulnerable Nodes of Social Networks - Shen, Jiawei (Hebei University); Tian, Junfeng (Hebei University); Wang, Ziyuan (Hebei University)

Evaluating and Extending Techniques for Fine-Grained Text-Topic Prediction for Digital Forensic Data - Farabi, Khan Mohammad Al (University of Georgia); Agrawal, Gagan (University of Georgia); Dorai, Gokila (Augusta University); Bardhan, Rajon (Augusta University); Maleki, Hoda (Augusta University); Kadri, Thomas E. (University of Georgia)

Driven to Evidence: The Digital Forensic Trail of Vehicles - McKay, Catherine (University College Dublin); Le-Khac, Nhien-An (University College Dublin)

Autonomous Driving System Configuration Defect Detection Method Based on Fuzzing - Liu, Jinzhao (Shandong University of Technology); Yu, Xiao (Shandong University of Technology); Zhang, Li (Communication University of Zhejiang); Zhang, Yanqiu (Shandong University of Technology); Li, YuanZhang (Beijing Institute of Technology); Tan, Kun (Shandong Institute of Information Technology Industry Development); Tan, Yuan (Beijing Institute of Technology)

Research on Minimum Receptive Field of Convolutional Neural Networks for Energy Analysis Attack - Jin, Jifang (Beijing Electronic Science and Technology Institute); nie, ziran (Beijing Electronic Science and Technology Institute); Wang, Yuting (Beijing Electronic Science and Technology Institute); Xie, Bingqi (Beijing Electronic Science and Technology Institute); Huang, Xiaobing (Qianghua Times (Chengdu) Technology Co., Ltd); duan, xiaoyi (Beijing Electronic Science and Technology Institute)

Heaker: Exfiltrating Data from Air-Gapped Computers via Thermal Signals - Jin, Jifang (Beijing Electronic Science and Technology Institute); su, yonghua (beijing electronic science and technology institute); Wang, Zunyang (Beijing Electronic Science and Technology Institude); li, Pengyu (Beijing Electronic Science and Technology Institute); Huang, Zhan (Beijing Electronic Science and Technology Institute); duan, xiaoyi (Beijing Electronic Science and Technology Institute)

7:00 pm -

Conference Gala Dinner in Dubrovnik Old Town+ Best Paper Award