The Fifth Intelligent Cybersecurity Conference (ICSC2025)

19-22 May, 2025 | Tampa, Florida, USA

(Technically Co-Sponsored by IEEE Florida West Coast Section)

Detailed Program

Time zone: Tampa Time (GMT-4)

Keynotes Location for May 19th: Vaughn Center Crescent Club

Technical Sessions and Keynotes Location: Plant Hall, the Fletcher Lounge.

Monday, May 19th, 2025
08:00-09:00
Registration & Breakfast
09:00-09:15
Opening
09:15-10:00
Keynote 1: Roger Grimes
Title: Taming the Hacker Storm: A Way to Defeat Cybercriminals and Malware
10:00-11:00
Keynote 2: Michael Esola
Title: Catching 'Em All: Navigating Data Privacy and Cybersecurity in Augmented Reality Games
11:00 -11:15
Break
11:15 - 12:30 Technical Session 1 Chair: Mohan Gurusamy and John Acken
  • Time Series Based Network Intrusion Detection using MTF-Aided Transformer
    Poorvi Joshi and Mohan Gurusamy
  • Relationship-based Distributed and Variable Trust Metrics for Secure Computing
    John Acken, Naresh Sehgal, Sonali Fernando, Divya Bansal and Robert Bass
  • CRICE: Cyber Range Infrastructure for Cybersecurity Education
    Sajal Bhatia, Irfan Ahmed and Nitin Talreja
12:30 -13:30
Lunch Break
13:30 - 15:30 Technical Session 2 Chair: Francesco Bergadano and Collin Connors
  • Keyed randomization with adversarial failure curves and moving target defense
    Francesco Bergadano, Sandeep Gupta and Bruno Crispo
  • Tailored Large Language Models for Spam Detection: From Model Customization to Benchmarking Effectiveness
    Amani Shatnawi, Anas Alsobeh, Izzat Alsmadi and Bilal Al-Ahmad
  • Privacy-Preserving Training and Interference of CNNs: A Medical Performance Case Study
    Thomas Prantl, Louis Schneider, Simon Engel, Lukas Horn, Vanessa Borst, Christian Krupitzer, Samuel Kounev and Rafael Bonilla.
  • Web3 Architecture's Inherent Cybersecurity Through Data and Information Safeguards
    Collin Connors and Dilip Sarkar.
  • Highlight to explain: a case study on explainable AI for pattern discovery in code
    Mohamad Nassar and Jacques Bou Abdo.
15:30 -16:00
Coffee Break
16:00 - 17:45 Technical Session 3 (Online) Chair: Mohammed El-Hajj and Fahed Alkhabbas
  • Consensus-driven Intrusion Detection Systems: Enhancing Performance and Fault-tolerance using Approximate Consensus
    Kritee Neupane, Lewis Tseng and Moayad Aloqaily.
  • Privacy-Preserving Mitigation of Poisoning Attacks in Three-Tier Federated Learning
    Ming Liu and Wensheng Zhang.
  • AI-Powered Threat Detection and Response: Leveraging Machine Learning for Real-Time Intrusion Detection Systems (IDS) Using Network Traffic Data
    Mohammed El-Hajj
  • Lightweight Post-Quantum Cryptographic Solutions for IoT: A Practical Approach
    Mohammed El-Hajj
  • Safeguarding the Artificial Pancreas: A Review of Security and Reliability Gaps and AI Driven Resilience
    Venkata Sai Abhinav Piratla, Sahaj Saxena, Sajal Bhatia and Navin Kumar
18:00 -20:00
Welcome Dinner @ Petra Restaurant

Tuesday, May 20th, 2025
08:00-17:00
Registration
09:00-10:00
Keynote 3: Prof. Abdelsalam (Sumi) Helal
Title: IoTility: Unleashing the Utility of Internet of Things through Microservices Architectural Extensions
10:00 -10:30
Coffee Break
10:30 - 12:30 Technical Session 4 Chair: Anyi Liu and Ala Jararweh
  • Mitigating Ransomware Attacks in Internet of Medical Things Networks
    Yasir Malik, Usman Tariq and Fehmi Jaafar
  • DeepTrAnS: Mixer-based Unsupervised Time Series Anomaly Detection for Servers
    Muhammad Anas Raza, Mohammad Wardat and Anyi Liu
  • LLaVul: A Multimodal LLM for Interpretable Vulnerability Reasoning about Source Code
    Ala Jararweh, Michael Adams, Avinash Sahu, Abdullah Mueen and Afsah Anwar
  • SecureLLM: Leveraging Large Language Models for Fault Detection in Connected Vehicles
    Rakesh Das, Henry Griffith and Heena Rathore.
12:30 -13:30
Lunch Break
13:30 - 15:30 Technical Session 5 Chair: Junaid Shuja and Yaser Jararweh
  • From Transaction to Transformation: AI and Machine Learning in FinTech
    Yazan Al Ahmed, Abdulla Osman, Abrar Ahmed, Dina Salem and Yanal Al Ahmad
  • Blockchain for Critical Infrastructure Security: Applications and Challenges
    Udit Gulati and Mahesh Narayanan
  • A Lightweight and Efficient Intrusion Detection System for Drone Networks
    Fawaz Alruwaili and Cihan Tunc.
  • ProSoccerTrainer: An AI-powered Penalty Detection and Performance Recommendation System
    Kushagra Nagar and Upendra Singh
15:30 -16:00
Coffee Break
16:00 - 18:00 Technical Session 6 (Online) Chair: Fahed Alkhabbas and Johnny Reynaga
  • Deep Learning-Driven Automated Data Generation for Enhanced Anomaly Detection in Cybersecurity
    Michael Gough, Ali Dewan and Harris Wang
  • From Abstract Prompts to Cybersecurity Labs: Automating Virtual Environment Design and Deployment with Multi-Agent Systems and LLM-Driven Orchestration
    Ziad Miniesy, Ali Eissa, Yaseen Ahmed, Mohamed Sherif, Omar Miniesy, Omar Harb and Amr El Mougy
  • Adaptive Cyber Attack Projection through Context-Driven Model Selection: Combining Graph Attention Networks and Reinforcement Learning
    Mouhamadou Lamine Diakhame, Chérif Diallo and Mohamed Mejri
  • Mining Intrusion Analysis Diamonds from Security Information and Events Logs
    Mahmoud Al-Maani and Mohammed Alsaleh
  • Technology Platforms for Cybersecurity: A Comparative Analysis
    Carlos Quispe, Johnny Reynaga and José Santisteban.
  • Advanced Document Processing Using LLM and RAG: An Innovative Approach to Efficiency and Privacy
    Mateusz Plonka, Krzysztof Kocot, Krzysztof Daniec and Aleksander Nawrat.
19:00-22:00
Gala Dinner
Columbia Restaurant @ 2117 E. 7th Avenue, Tampa, Florida 33605

Wednesday, May 21st, 2025
08:00-17:00
Registration
09:00-10:00
Keynote 4: Bryson Bort
Title: From Cyber Threats to National Security: Turning Adversarial Weaknesses into Resilient Defenses
10:00 -10:30
Coffee Break
10:30 - 12:30 Technical Session 7 Chair: Raghavan Krishnasamy and Yaser Jararweh
  • DeFeAt: Explanable TinyML-based Framework for Anomaly Detection in Nano-Sensor Traffic in 6G-Enabled Smart Grid
    Shreya Bhatia, Dharma Trivedi, Shivanshi Bhatt, Lakshin Pathak, Krisha Shastri, Karm Vyas, Dev Mehta, Rajesh Gupta and Dr. Sudeep Tanwar
  • Towards Holistic Evaluation of Intrusion Detection Systems: Insights into Latency and Detection Metrics
    Sandhyarani Dash, John Acken and Ruimin Dai
  • Holistic Ethical Commons: A Dynamic Framework for Ethical Decision Making in Multi-Agent AI Systems
    Raghavan Krishnasamy Lakshmana Perumal
  • API Security Framework for Multi-Controller Architecture in Software-Defined Networking
    Sumit Badotra and Mohan Gurusamy
12:30 -13:30
Lunch Break
13:30 - 15:30 Technical Session 8 (Short Papers) Chair: Cihan Tunc and Khalaf Tahat
  • Rule-Based Hybrid Adaptive Encryption Model for Autonomous Flight to Secure UAS Data Streams in Real-Time
    Fadjimata Issoufou Anaroua, Yongxin Liu and Hong Liu
  • Formulation of a Contingent and Resilient Response to Cyber Security Threats Jordanian Government Digital Services
    Razan Almomany, Mohammed Habes, Dina Tahat, Khalaf M. Tahat and Makrem Ziani
  • Enhancing error-minimizing noises using data augmentations
    Long Dang, Thushari Hapuarachchi and Kaiqi Xiong.
  • Investigating UXSS Vulnerabilities in Modern Web Browsers
    Hrishikesh Dahale
  • Quantum-Assisted XAI-Driven DL Framework for FDI Detection in Connected Autonomous Electric Vehicles Underlying 6G
    Dev Mehta, Vrutik Soni, Param Desai, Dharma Trivedi, Lakshin Pathak, Rajesh Gupta and Dr. Sudeep Tanwar
13:30 - 15:30 Technical Session 9 (online) Chair: Rolph Abraham Yao and William Kandolo
  • Optimizing DDoS Attacks Detection in SDN using Machine learning
    Rolph Abraham Yao and Ferdinand Tonguim Guinko
  • Intelligent Anomaly Detection in Database Security: A Triple Loop Learning Approach
    William Kandolo
  • Reward Hacking in Reinforcement Learning and RLHF: A Multidisciplinary Examination of Vulnerabilities, Mitigation Strategies, and Alignment Challenges
    Tiechuan Hu, Wenbo Zhu and Yuqi Yan
  • Real-Time Anomaly Detection: A Hybrid Approach Combining Streaming SQL and Hardware Acceleration
    Sudheer Kumar Lagisetty and Anil Kumar Moka
  • AI-Enhanced Telehealth Platforms: A Comprehensive Analysis of Automated Triage and Personalized Care Systems
    Sudheer Kumar Lagisetty, Priya Devarajulu and Anil Kumar Moka
  • BPMN to Smart Contract by Business Analyst
    Chris Liu, Peter Bodorik and Dawn Jutla
15:30 -16:00
Coffee Break
16:00 - 18:00 Technical Session 10 (Online) Chair: Chaitanya Rahalkar and Alexander Lawall
  • Securing Wireless SDN Controller from Jamming Attackn
    Chandan Kumar and Md. Sarfaraj Alam Ansari
  • Impact of Target Network-Specific Data on the Performance of Machine-Learning-Based Intrusion Detection System Models
    Alexander Lawall and Thomas Zöller
  • Detection of Fileless Malware
    Bhaskar Pal, Hitesh Reddy, Saurav S and Vasudevan Ar
  • Revisiting Fidelity in Explainable AI: Unpacking Cognitive Biases and Deceptive Transparency in Model Interpretations
    Akshar Patel.
  • Evaluating Privacy-Preserving Strategies in Bitcoin and Beyond
    Chaitanya Rahalkar and Anushka Virgaonkar
  • Evolution of the Tor Network: An Empirical Analysis of Usage Patterns and Infrastructure
    Chaitanya Rahalkar and Anushka Virgaonkar
16:00 - 18:00 Technical Session 11 (Online) Chair: Mustafa Daraghmeh and Iram Bibi
  • Blocking Fake News Propagation exploiting OSNs Users Interests and Connections
    Farwa Batool, Giuseppe Lo Re, Marco Morana and Giuseppe Rizzo
  • Enhancing IoT Attack Classification through Domain Generalization
    Iram Bibi, Tanir Ozcelebi and Nirvana Meratnia
  • AI-Driven Adaptive Gait Biometrics: Pioneering Real-Time Continuous Authentication for Enhanced Security
    Mehdi Mekni, Emmanuel O. Ogunwobi, Shannon C. Russell, Mohamad Nassar, Adwoa Donyina
  • Anomaly Detection and Clustering for Resource Usage Segmentation in Cloud Data Centers
    Mustafa Daraghmeh, Fadi Alzhouri, Anjali Agarwal and Yaser Jararweh
  • CATCH: A Tool to Automatic Deploy Decoys and Breadcrumbs Based on Network Analysis
    Pushpinder Chouhan, Maurizio Colombo, Rasool Asal and Zhan Cui
  • Neuro-Symbolic Approaches for Cybersecurity Policy Enforcemen
    Srikanta Datta Prasad Tumkur Narahari Datta, Vinoth Ganesh Umamageswari Asokan

Thursday, May 22nd, 2025
9:00 to 12:00
The Federated Learning Workshops
12:30 to 14:00
Lunch