Abstract is missing.
- Keynote Speaker 6: Intrusion detection systems using machine learning for the security of autonomous vehiclesAbdelouahid Derhab. 1 [doi]
- A User-Centric Fuzzy AHP-based Method for Medical Devices Security AssessmentSondes Ksibi, Faouzi Jaïdi, Adel Bouhoula. 1-7 [doi]
- Social Behaviour Identification relying on Device Fingerprint AnalysisElías Grande. 1-8 [doi]
- A Secure Design Pattern Approach Toward Tackling Lateral-Injection AttacksChidera Biringa, Gökhan Kul. 1-4 [doi]
- Blockchain for the electronic voting system: case study: student representative vote in Tunisian instituteLotfi Ezzeddini, Jalel Ktari, Iheb Zouaoui, Amira Talha, Nizar Jarray, Tarek Frikha. 1-7 [doi]
- Formal Methods for the Verification of Smart Contracts: A ReviewMoez Krichen, Mariam Lahami, Qasem Abu Al-Haija. 1-8 [doi]
- Evolution of macro VBA obfuscation techniquesSilviu Constantin Vitel, Marilena Lupascu, Dragos Teodor Gavrilut, Henri Luchian. 1-8 [doi]
- Improving detection of malicious samples by using state-of-the-art adversarial machine learning algorithmsCiprian-Alin Simion, Gheorghe Balan, Dragos Teodor Gavrilut. 1-8 [doi]
- A Trust Based DNS System to Prevent Eclipse Attack on Blockchain NetworksAli Kerem Yildiz, Aykut Atmaca, Ali Özgür Solak, Yekta Can Tursun, Serif Bahtiyar. 1-8 [doi]
- Keynote Speaker 4: Introducing Homomorphic Encryption in Blockchain-enabled ApplicationsMohamed Hamdi. 1 [doi]
- Keynote Speaker 3: Scaling BlockchainsAbdelhakim Senhaji Hafidh. 1 [doi]
- A Study of Permission-based Malware Detection Using Machine LearningRatun Rahman, Md. Rafid Islam, Akib Ahmed, Md Kamrul Hasan, Hasan Mahmud. 1-6 [doi]
- Towards a Better Understanding of Impersonation RisksAnne Bumiller, Olivier Barais, Nicolas Aillery, Gael Le Lan. 1-8 [doi]
- Robust grayscale image watermarking approach using DCT and DWTAbdelhamid Saighi, Salim Chitroub. 1-6 [doi]
- Topology for Preserving Feature Correlation in Tabular Synthetic DataMurshedul Arifeen, Andrei Petrovski 0001. 1-6 [doi]
- Keynote Speaker 5: Cyber Security Threat Landscape in the Context of Industry 4.0Haider Abbas. 1 [doi]
- Artificial Intelligence for SDN Security: Analysis, Challenges and Approach ProposalAmina Sahbi, Faouzi Jaïdi, Adel Bouhoula. 1-7 [doi]
- Multi-Phase Algorithmic Framework to Prevent SQL Injection Attacks using Improved Machine learning and Deep learning to Enhance Database security in Real-timeAhmed Abadulla Ashlam, Atta Badii, Frederic T. Stahl. 1-4 [doi]
- Approach to Physical Access Management, Control and Analytics Using Multimodal and Heterogeneous DataDmitriy Levonevskiy, Anna I. Motienko, Mikhail Vinogradov. 1-4 [doi]
- Combined Modeling Techniques for Safety and Security in Industrial Automation: A Case StudySiegfried Hollerer, Marta Chabrová, Thilo Sauter, Wolfgang Kastner. 1-4 [doi]
- SWAF: A Smart Web Application Firewall Based on Convolutional Neural NetworkInes Jemal, Mohamed Amine Haddar, Omar Cheikhrouhou, Adel Mahfoudhi. 1-6 [doi]
- Review of Authentication with Privacy-preserving Schemes for 5G-enabled Vehicular NetworksMays A. Hamdan, Amel Meddeb-Makhlouf, Hassène Mnif. 1-6 [doi]
- PrefaceOmar Cheikhrouhou, Atilla Elçi. 1-2 [doi]
- Challenges on prioritizing software patchingThiago Figueiredo Costa, Mateus Tymburibá. 1-8 [doi]
- Intrusion Detection System for IoMT through Blockchain-based Federated LearningBessem Zaabar, Omar Cheikhrouhou, Mohamed Abid. 1-8 [doi]
- Keynote Speaker 2: Cybersecurity of connected VehiculesMohamed Mosbah 0001. 1 [doi]
- Blockchain Application for Parking ManagementSabrine Bhiri, Kais Loukil, Faten Chaabane, Tarek Frikha. 1-5 [doi]
- Intrusion Detection in Industrial IoTOmar Cheikhrouhou, Ouissem Ben Fredj, Nesrine Atitallah, Salem Hellal. 1-4 [doi]
- Keynote Speaker 1: Random Neural Networks Optimise QoS, Security and Energy ConsumptionErol Gelenbe. 1 [doi]
- A NLP-inspired method to predict multi-step cyberattacksOuissem Ben Fredj. 1-6 [doi]
- A Betweenness Centrality Based Clustering in VANETsMays Kareem Jabbar, Hafedh Trabelsi. 1-4 [doi]
- Analysis of Smart Cities Security: Challenges and AdvancementsMehdi Houichi, Faouzi Jaïdi, Adel Bouhoula. 1-5 [doi]
- Blockchain for IoT-Based Healthcare using secure and privacy-preserving watermarkHedi Choura, Faten Chaabane, Mouna Baklouti, Tarek Frikha. 1-4 [doi]
- Development and Testing of a Core System for Red and Blue Scenario in Cyber Security IncidentsAmelia Chindrus, Constantin Florin Caruntu. 1-7 [doi]
- Leveraging Edge Computing, Blockchain and IPFS for Addressing eHealth Records ChallengesHela Makina, Asma Ben Letaifa, Abderazek Rachedi. 1-4 [doi]
- Towards Comparative Evaluation of DDoS DefencesAndikan Otung, Andrew Martin. 1-10 [doi]
- Homomorphic operations on integers via operations on bitsLiudmila Babenko, Ilya Rusalovsky. 1-4 [doi]
- A Private Smart parking solution based on Blockchain and AIMariem Turki, Bouthaina Damak, Rawya Mars. 1-7 [doi]