The Third Intelligent Cybersecurity Conference (ICSC2023)

23–25 October, 2023 | San Antonio, USA.

(Technically Co-Sponsored by IEEE and IEEE Systems Council)

Detailed Program

Technical Sessions and Keynotes Location: Business Library Hall (Rooms: 134, 152, 266, 362) .

Time zone: Central Time Zone (GMT-05:00)

Monday
October 23th, 2023
08:00-09:00 AM
Registration
08:45-09:00 AM
Opening Session
09:00-10:00 AM
Keynote 1: Dr. Ibrahim (Abe) Baggili, Louisiana State University, Baton Rouge, LA, USA
Title: Who You Gonna Call? Unmasking AI Investigations through AI Forensics
Meeting Link
Passcode: 724330
10:00 -10:30 AM
Coffee Break
10:30 AM-12:00 PM
IoTSMS Technical Session 1
Chair: Cihan Tunc
Meeting Link
Passcode: 916419
  • Warren Williams and Raahul Pathak
    Edge Analytics Solution for Online Monitoring of Building Operations Data
  • An Adaptive Flow-based NIDS for Smart Home Networks Against Malware Behavior Using XGBoost combined with Rough Set Theory
    Nasser Alsabilah and Danda B. Rawat
  • Exploring the Vulnerabilities of IoT Devices: A Comprehensive Analysis of Mirai and Bashlite Attack Vectors
    Seth Barrett, Bradley Boswell and Gokila Dorai
  • Phoenix: Trust Evaluation in Internet of Things Using Game Theory with a Second Chance Protocol
    Himan Namdari, Cihan Tunc and Ram Dantu
10:30 AM-12:00 PM
SDS Technical Session 1
Chair: Pradeeban Kathiravelu
Meeting Link
  • An Intelligent Mobile Application for helping Alzheimer Patients
    Kahkashan Tabassum and Rand Alharthi
  • Natural Language-Based Model-Checking Framework for Move Smart Contracts
    Keerthi Nelaturu, Eric Keilty and Andreas Veneris
  • Software Engineering Approaches Adopted By Blockchain Developers
    Shawal Khalid and Chris Brown
  • Network Measurements and Optimizations for Telehealth in Internet's Remote Regions
    Pradeeban Kathiravelu, Ananth Reddy Bhimireddy and Judy Wawira Gichoya
10:30 AM-12:00 PM
ICSC Technical Session 1
Chair: Mohamad Nassar
Meeting Link
  • Revisiting Attack Trees for Modeling Machine Pwning in Training Environments
    Khouloud Samrouth, Mohamad Nassar and Hussein Harb
  • Why Cyber Threat Modeling Needs Human Factors Expansion: A Position Paper
    Stephanie Travis, Denis Gracanin and Erin Lanus
  • Adversarial Text Perturbation Generation and Analysis
    Jesus Guerrero, Gongbo Liang and Izzat Alsmadi
  • Implementation of Server-Based Intrusion Detection Software Framework in Bluetooth Networks
    Youjun Han
12:00 -1:00 PM
Lunch Break
1:00-2:00 PM
Keynote 2: Prof. Jaime Lloret, Universitat Politecnica de Valencia, Spain.
Title: Artificial Intelligence applied to real-time IoT data delivery
Meeting Link
Passcode: 913037
2:00-3:00 PM
IoTSMS Technical Session 2
Chair: Ahmad Al-Omari
Meeting Link
Passcode: 916419
  • Reducing the travel time of passengers between bus stations in the city by using the smart subsystem of road side unit (RSU) in the high traffic intersections of Zanjan city.
    Vahid Ghaffari
  • An IoT-based Smart Bathroom for Healthy Life
    Yu-Hsien Wei, You-Xian Huang, You-Ching Chen and Der-Lor Way
  • Federated Deep Learning-based Intrusion Detection Approach for Enhancing Privacy in Fog-IoT Networks
    Bensaid Radjaa, Labraoui Nabila and Haythem Bany Salameh
2:00-3:00 PM
SDS Technical Session 2
Chair: Yuvaraj Munian
Meeting Link
  • Permissioned Blockchain-based Techniques for Refining the Data Security in Commercial Aviation
    Khondker Shajadul Hasan, Zakir M. Yusuf and Shezad Rouf Khondker
  • A Blockchain based Fund Management System for Construction Projects--A Comprehensive Case Study in Xiong'an New Area China
    Cong Tang
  • A Lightweight Drone Simulator
    Evan Blake Putnam, Dylan Nihal Senarath, Giselle Ramirez Urquijo, Cihan Tunc and Renee Bryce
2:00-3:00 PM
ICSC Technical Session 2
Chair: Charles Barone
Meeting Link
  • Anomaly Detection in Crypto Currency
    Ahmad Al-Omari, Izzat Alsmadi and John Dendy
  • Deep Neural Networks in Social Media Forensics: Unveiling Suspicious Patterns and Advancing Investigations on Twitter
    Yousef Sharrab, Dimah Al-Fraihat and Mohammad Alsmirat
  • Gargoyle Guard: Enhancing Cybersecurity with Artificial Intelligence Techniques
    Charles Barone, Mehdi Mekni and Mohamad Nassar
3:00-3:30 PM
Coffee Break
3:30-5:30 PM
IoTSMS Technical Session 3
Chair: Jaime Lloret
Meeting Link
Passcode: 916419
  • Self-Supervised Image Anomaly Detection and Localization with Synthetic Anomalies
    Min-Chun Tsai and Sheng-De Wang
  • Automated Security Audit Testbed for Ip-Based IoT Devices Without Physical Access
    Ashutosh Kumar, Brijesh Peshvani, S Venkatesan, Manish Kumar, Suneel Yadav and Sandeep Kumar Shukla
  • Zero-Knowledge Proofs Based Delegation Authentication for Industrial Internet of Things in Certificateless Proxy Signatures
    Rafiq Ullah, Amjad Mehmood, Muhammad Altaf Khan, Carsten Maple and Jaime Lloret
  • A New Image Processing System to Diagnose the Orange Fruit Disease
    Arman Foroughi, Jose Miguel Jimenez and Jaime Lloret
  • Image to Text Recognition for Detecting Human and Machine Altered News in Social Media
    Abdullah Kamal, Zaid Jamal, Gabriel Rosales, Brian Robinson, Zach Sotny and Heena Rathore
3:30-5:30 PM
SDS Technical Session 3
Chair: Fadi Wedyan
Meeting Link
  • Regression-Based Approach for Proactive Predictive Modeling of Efficient Cloud Cost Estimation
    Mustafa Daraghmeh, Anjali Agarwal and Yaser Jararweh
  • Empirical Evaluation of Maintainability Index Accuracy for Measuring Maintainability of Python Programs
    Rachael Morrison, Fadi Wedyan and Osama Abuomar
  • Integration and Unit Testing of Software Energy Consumption
    Fadi Wedyan, Rachael Morrison and Sam Abuomar
3:30-5:30 PM
ICSC Technical Session 3
Chair: Yousef Sharrab
Meeting Link
  • Measuring the Effects of Document Size on RAM Artifacts: A Memory Forensics Approach
    Ziad Al-Sharif, Reema Al-Senjalawi and Omar Alzoubi
  • Phishing Detection Based on Webpage Content: Static and Dynamic Analysis
    Alexander O'Mara, Izzat Alsmadi, Ahmed Aleroud and Dalal Alharthi
  • Fingerprint Identification from Digital Images Using Deep Learning
    M Moneb Khaled, Aghyad Al Sayadi, Mohammad Alsmirat and Mahmoud Al-Ayyoub

Tuesday
October 24th, 2023
08:30-09:00 AM
Registration
09:00-10:00 AM
Keynote 3: Prof.Abdallah Khreishah, New Jersey Institute of Technology, USA
Title: Beyond securing networks and storage: emerging attacks and defenses to machine intelligence
Meeting Link
Passcode: 111334
10:00 -10:30 AM
Coffee Break
10:30 AM-12:00 PM
IoTSMS Technical Session 4
Chair: Hisham A. Kholidy
Meeting Link
Password: 164316
  • Memory Extraction of an Emulated STM-32 Blue Pill for Anomaly Detection
    Diana Gutierrez, Alexander Perez-Pons, William Ocampo and Adriaan Jansen
  • Secure and Scalable Permissioned Blockchain using LDE-P2P Networks
    Saydul Akbar Murad and Nick Rahimi
  • Enhancing IoT Device Security: Predicting and Analyzing Reconnaissance Attacks Using Flags and Time-Based Attributes
    Nazia Sharmin and Christopher Kiekintveld
  • Q-SECURE: A Quantum Resistant Security for Resource Constraint IoT Device Encryption
    Maurice Ngouen, Mohammad Rahman, Nagarajan Prabakar, Selcuk Uluagac and Laurent Njilla
  • A Smart Network Slicing Provisioning Framework for 5G-based IoT Networks
    Hisham A. Kholidy
10:30 AM-12:00 PM
SDS Technical Session 4
Chair: Elhadj Benkhelifa
Meeting Link
  • Pathway to Coherent Phase Acquisition in Multi-channel USRP SDRs for Direction of Arrival Estimation
    Alda Xhafa, Fran Fabra, José A. López-Salcedo, Gonzalo Seco-Granados and Ivan Lapin
  • Towards the Utilization of Parallel Programming to Speed up RAM Forensics
    Ziad Al-Sharif, Rahaf Alhamouri and Yaser Jararweh
  • Load Balancing Algorithms for Software-Defined Networks
    Zina Houhamdi and Belkacem Athamena
10:30 AM-12:00 PM
ICSC Technical Session 4
Chair: Izzat Alsmadi
Meeting Link
  • Enhancing Cybersecurity in SCADA IoT Systems: A Novel Machine Learning-Based Approach for Man-in-the-Middle Attack Detecti
    Ala Mughaid, Mohammad Aljamal, Issa Al-Aiash, Mahmoud Aljamal, Rabee Alquran, Shadi Alzu'Bi and Ala A. Abutabanjeh
  • Distributed pseudorandom generation protocol based on VRF algorithm
    Ivan Velichko, Sergey Vanurin, Alexandra Afanasyeva, Sergey Bezzateev, Mikhail Sayfullin and Konstantin Zhidanov
  • Twitter Account Analysis for Drug Involvement Detection
    Demetrios Petrou, Victor Martinez-Gil, Francisco Castillo, Cihan Tunc and Renee Bryce
12:00 -1:00 PM
Lunch Break
1:00-2:00 AM
Keynote 4: Vinay Tripathi, Production Network Engineer @ Google, USA
Title: AI/ML Applications in Computer Networks
Meeting Link
Passcode: 196865
2:00 PM-3:00 PM
IoTSMS Technical Session 5
Chair: Cihan Tunc
Meeting Link
Password: 164316
  • Automated Hardware Auditing Testbed for UART and SPI based IoT Devices
    Shivam Mishra, Aditya Ray, Manpreet Singh, S. Venkatesan and Anshu S. Anand
  • AI-Enabled Plastic Pollution Monitoring System for Toronto Waterways
    Benjamin Kelly, Shengkai Cheng, Eric Pengyu Zhou and Maher Elshakankiri
  • Four-layer Architecture for IoT Security in Fog Network
    Zahra Youssef, Hamza Gharsellaoui and Walid Barhoumi
2:00 PM-3:00 PM
SDS Technical Session 5
Chair: Yuvaraj Munian
Meeting Link
  • Integration of Blockchain in Computer Networking: Overview, Applications, and Future Perspectives for Software-defined Networking (SDN), Network Security and Protocols
    Md Jobair Hossain Faruk and Jerry Q. Cheng
  • A Reinforcement Learning Approach to Optimize Cache Prefetcher Aggressiveness at Run-Time
    Matthew Adiletta, Farah Fargo, Mitchell Diamond, Jack Adiletta, Olivier Franza and Simon C Steely Jr.
  • Enhancing Intrusion Detection Systems Accuracy Using Machine Learning
    mohammad Sh daoud, Bayan Abu Shawar, Mohammad Alyafeai, Amro Essam, Mohammed Ghassan and Nahyan Alzaabi
2:00 PM-3:00 PM
ICSC Technical Session 5
Chair: Izzat Smadi
Meeting Link
  • Privacy-Preserving Genomic Analysis via PSO-Driven Federated Learning on Blockchain
    Reza Nourmohammadi, Iman Behravan and Kaiwen Zhang
  • Monitoring Privacy-Preserving Constraints in Microservices Architecture Through Parameter Formalisation
    Elena Troubitsyna
  • Suppressing Clutter and Jammer Interference in UAS Radar Sensors Using Space-Time Adaptive Processing
    Issam Boukabou, Dulana Rupanetti and Naima Kaabouch
3:00-3:30 PM
Coffee Break
3:30-5:30 PM
IoTSMS Technical Session 6
Chair: Cihan Tunc
Meeting Link
Password: 164316
  • An Intrusion Detection Cyber Model for 5G Enabled IoT Networks
    Asma Alnajjar, Mohammad Salman, Ala Mughaid, Yaser Jararweh and Shadi Alzubi
  • IoT Based Smart Gate Access Control System
    Muhammad Zeeshan Ansari and Imran Khan
  • SIoTSim: Simulator for Social Internet of Things
    Meriem Chiraz zouzou, mohamed shahawy, Elhadj Benkhelifa and Hisham Kholidy
  • Bolstering the Mobile Cloud: Addressing Emerging Threats and Strengthening Multi-Layered Defenses for Robust Mobile Security
    Sriram Vamsi Ilapakurthy
  • A Survey on the Cybersecurity of IoT From The Perspective of SoC
    Xianping Wang, Hao Qiu, Jiayue Shen and Weiru Chen
3:30-5:30 PM
SDS Technical Session 6
Chair: Pradeeban Kathiravelu
Meeting Link
  • A Survey on Trust Management in Flying Ad Hoc Networks: Challenges, Classifications and Analysis
    Sihem Benfriha, Nabila Labraoui, Haythem Bany Salameh and Hafida Saidi
  • Leveraging SDN for Real World Windfarm Process Automation Architectures
    Soufiane hamadache, Elhadj Benkhelifa, Hisham kholidy, Pradeeban Kathiravelu and Brij B Gupta
  • Vehicles Charging Using on the Go Wireless Power Transmission for Modern Cities
    Bassam Harb, Omar Al Samahei, Abdullah Hussein, Mohammed Al Saafeen and Tariq Wasfi
  • Routing in FD-enabled Cognitive Radio Networks with Minimum Time-sharing for Improved Performance
    Ahmed Musa, Rami Halloush, Haythem Bany Salameh, Rami Bani Awwad, Sharhabeel Alnabelsi and Elhadj Benkhelifa
3:30-5:30 PM
ICSC Technical Session 6
Chair: Yousef Sharrab
Meeting Link
  • Design & development of virtual reality empowered cyber-security training testbed for IoT systems
    Nikitha Donekal Chandrashekar, Kenneth King, Denis Gracanin and Mohamed Azab
  • Enhancing Network Security Through Proactive Anomaly Detection: A Comparative Study of Auto-encoder Models and K-Nearest Neighbours Algorithm
    Patrick Ansah, Sumit Kumar Tetarave, Ezhil Kalaimannan, Bibhuti Bhusan Dash and Caroline John
  • Integrating Artificial Intelligence and Blockchain Technology for Enhanced US Homeland Security
    Mayur Rele, Dipti Patil and Younes Boujoudar
  • Examining Anticipated Massive MIMO 5G Network Attacks through Adversarial Examples
    Dulana Rupanetti, Issam Boukabou and Naima Kaabouch
  • Addressing the Public Health Misinformation Challenge with Real-time Data Fusion
    Anoud Bani Hani, Haleama Alsabbah, Munir Majdalawieh, and Nawel Bessadet
6:30-09:00 PM
Gala Dinner and Closing Ceremony
Resturent: Zocca Cuisine D Italia

October 25th, 2023
9:00 AM to 12:30 PM
Experiencing the City.