Time zone: CEST (Central European Summer Time) UTC/GMT +2 hours
Tuesday |
|
|||
08:00 - |
|
|
||
09:00 - |
|
|
||
|
||||
09:10 - |
|
|
||
10:10 - |
|
|
||
10:30 - |
|
|
|
|
• Finding
Biases and Backdoors in an NVIDIA Morpheus Spam Detection Model |
|
|||
12:10 - |
|
|
||
13:15 - 15:00 |
|
|
|
|
• Blockchain
Support for Verifiable Split Learning • Autonomous
and adaptive cyber-defense: application of game theory in 5G security
architectures • Unsupervised
Insider Threat Detection Using Multi-Head Self-Attention Mechanisms • Accessing the
Power of Machine Learning to Detect Fake News |
|
|||
15:00 - |
|
|
||
15:30 - 16:30 |
|
|
||
16:30-18:00 |
|
|
|
|
• Exploring the
Potential Implications of AI-generated Content in Social Engineering Attacks |
|
|||
18:00 - 19:30 |
|
|
||
|
|
|||
Wednesday |
|
|||
08:00 - |
|
|
||
09:00 - |
|
|
||
|
||||
09:10 -10:10 |
Keynote Session 3:Peter Richtarik,
KAUST, KSA |
|
||
10:10 - |
|
|
||
10:30 - |
|
|
|
|
• Keystroke
dynamics as challenge-response pair for attribute-based authentication using FaR Hash Token • Detecting
Free-Riders in Federated Learning using an Ensemble of Similarity Distance
Metrics •
Brain-Computer Interface Security: Vulnerabilities of the Capsule Network
Model • Generative AI
for Advanced Malware Detection |
|
|||
12:10 - |
|
|
||
13:15 - 14:30 |
|
|
|
|
• A Model for
Adaptive Bug Bounty Programs and Responsible Disclosure in E-Government
Vulnerability Management |
|
|||
14:30 - |
|
|
||
14:30 - 15:30 |
|
|
||
15:30 - 18:00 |
|
|
||
16:30-18:00 |
ICSC Session 4 (online) |
Chair: Yaser
Jararweh |
|
|
• Linking
Threat Agents to Targeted Organizations: A Pipeline for Enhanced
Cybersecurity Risk Metrics |
|
|||
16:30-18:00 |
|
|
|
|
• Investigating
the Impact of Perceived Usefulness, Technological Factors, and Big Data on
Digital Marketing Adoption and Tourists' Purchase Intentions(Case
Study) Ahmad Aljumah, Mohammed. T. Nuseir,
Ghaleb Elrefae and Amer Qasim • Shaping the
Future Classroom: Preservice Teachers' Attitudes Toward the Use of Social
Media Platforms Hanan Almarashdi, Dima Farhat, Khaleel Alarabi,
Azhar Shater and Hamza Saleh • Exploring
Intellectual Property Rights in the Multimedia Advertising Campaign under UAE
Law Ramzi Madi and
Nart Madi |
|
|||
19:00 - 21:30 |
|
|
||
|
|
|||
Thursday |
|
|||
08:00 - 09:00 |
|
|
||
09:00 - 09:10 |
|
|
||
|
||||
09:10 - 10:10 |
|
|
||
10:10 - 10:30 |
|
|
||
10:30 - 12:10 |
|
Chair: Muhammad
Fahad Zia and Sara Aboukadri |
|
|
• Privacy
Analysis in Mobile Apps and Social Networks using AI Techniques • Boosted-3R:
Towards a novel framework for inferring ABAC policies |
|
|||
12:10 - 13:15 |
|
|
||
13:15 - 14:10 |
|
|
||
13:15 - 14:15 |
|
|
|
|
• A Novel
Approximate Computing Method for the Efficient Search in Satellite Remote
Sensing Products Ala Mughaid,
Ruba Ibrahim, Mahmoud Aljamal and Issa Al-Aiash • Exploiting
Machine Learning for Osteoporosis Risk Prediction and
Early Intervention Mohammad Jararweh, Mustafa
Daraghmeh and Mostafa Z. Ali |
|
|||
14:15 - 14:30 |
|
|
||
14:30 - 17:00 |
|
Chair: Mohammad
Alsmirat |
|
|
• Enhancing
MQTT Fault Tolerance and Resilience Against Broker Failures and DoS attacks
with Decentralized Blockchain Architecture • Context-Aware
Security and Post Quantum Cryptography applied to IoT networks • Category
Prediction of Financial Fraud Related Posts in Telegram Group Chats |
|
|||
17:00 - 18:00 |
|
Chair: Yaser
Jararweh |
|
|
• Latent
states: model-based machine learning perspectives on cyber resilience • Enhancing
Network Security Through Deep Learning: Mitigating Feature Engineering and
Zero-Day Attacks • Hybrid Deep
Learning Models with Adversarial Defense Mechanisms for Secure Beamforming
Prediction |
|
|||
18:00 - 18:15 |
|
|