Program of the Workshop 2020
Time (EST) |
Time (CET) |
Title of the talk |
Presenter/Author |
09:00-09:05 |
15:00-15:05 |
Opening Remarks and Welcome |
Andrii Shalaginov |
09:05-09:15 |
15:05-15:15 |
S08216: Modern Cybercrime Investigation: technological advancement of Smart Devices and legal aspects of corresponding digital transformation |
Andrii Shalaginov, Marina Shalaginova, Aleksandar Jevremovic, Marko Krstic |
09:15-09:30 |
15:15-15:30 |
S08203: Towards verifiable evidence generation in forensic-ready systems |
Lukas Daubner, Martin Macak, Barbora Buhnova, and Tomas Pitner |
09:30-09:55 |
15:30-15:55 |
S08205: Intensive Image Malware Analysis and Least Significant Bit Matching Steganalysis |
Yogesh Kulkarni and Anurag Gorkar |
09:55-10:20 |
15:55-16:20 |
S08214: Detection of Previously Unseen Malware using Memory Access Patterns Recorded Before the Entry Point |
Sergii Banin and Geir Olav Dyrkolbotn |
10:20-10:45 |
16:20-16:45 |
S08204: Cyber Espionage: Reloaded |
Keynote speaker: Ashwin Ram Check Point Software Technologies, Australia |
10:45-11:10 |
16:45-17:10 |
S08213: Real-Time Detection of Fake-Shops through Machine Learning |
Louise Beltzung, Andrew Lindley, Olivia Dinica, Nadin Hermann, and Raphaela Lindner |
11:10-11:30 |
17:10-17:30 |
Coffee Break |
|
11:30-11:55 |
17:30-17:55 |
S08215: CTI-Twitter: Gathering Cyber Threat Intelligence from Twitter using Integrated Supervised and Unsupervised Learning |
Linn-Mari Kristiansen, Vinti Agarwal, Katrin Franke, and Raj Sanjay Shah |
11:55-12:10 |
17:55-18:10 |
S08211: Smart Home Forensics: An Exploratory Study on Smart Plug Forensic Analysis |
Asif Iqbal, Johannes Olegård, Ranjana Ghimire, Shirin Jamshir, and Andrii Shalaginov |
12:10-12:35 |
18:10-18:35 |
S08212: Never-Ending Learner for Malware Analysis (NELMA) |
Moumita Kamal and Douglas Talbert |
12:35-13:00 |
18:35-19:00 |
Live: Using AI to protect children from online threats |
Keynote speaker: Aleksandar Jevremovic Singidunum University, Serbia |
13:00-13:45 |
19:00-19:45 |
Lunch break |
|
13:45-14:10 |
19:45-20:10 |
S08210: Centrality and Scalability Analysis on Distributed Graph of Large-Scale E-mail Dataset for Digital Forensics |
Selim Ozcan, Merve Astekin, Narasimha Karpoor Shashidhar, and Bing Zhou |
14:10-14:35 |
20:10-20:35 |
S08209: Exploring Open Source Information for Cyber Threat Intelligence |
Victor Adewopo, Bilal Gonen, and Festus Adewopo |
14:35-15:00 |
20:35-21:00 |
S08202: Machine Learning Methods for Anomaly Detection in Industrial Control Systems |
Johnathan Tai, Izzat Alsmadi, Yunpeng Zhang, and Fengxiang Qiao |
15:00-15:20 |
21:00-21:20 |
Coffee Break |
|
15:20-15:35 |
21:20-21:35 |
S08201: National Security Intelligence through Social Network Data Mining |
Nnaemeka Ekwunife |
15:35-15:50 |
21:35-21:50 |
S08206:Financial Fraud Detection using Deep Support Vector Data Description |
Masoud Erfani, Farzaneh Shoeleh, and Ali A. Ghorbani |
15:50-15:55 |
21:50-21:55 |
Closing Remarks |
Andrii Shalaginov |
Program v. 24.11.2020 (timeslotes are in EST and CET timezones)