Detailed Program

Keynotes Location for May 19th: Vaughn Center Crescent Club

ICSC Technical Sessions and Keynotes Location: Plant Hall, the Fletcher Lounge.

MCNA Technical sessions location: Music Room

All times are in Tampa Time (GMT-4)

Monday, May 19th, 2025

08:00-09:00

Registration & Breakfast

09:00-09:15

Opening

09:15-10:00

Keynote 1: Roger Grimes
Title: Taming the Hacker Storm: A Way to Defeat Cybercriminals and Malware

10:00-11:00

Keynote 2: Michael Esola
Title: Catching 'Em All: Navigating Data Privacy and Cybersecurity in Augmented Reality Games

11:15 - 12:30

ICSC Technical Session 1

Chair: TBA

  • Time Series Based Network Intrusion Detection using MTF-Aided Transformer
    Poorvi Joshi and Mohan Gurusamy
  • Securing Wireless SDN Controller from Jamming Attackn
    Chandan Kumar and Md. Sarfaraj Alam Ansari
  • Relationship-based Distributed and Variable Trust Metrics for Secure Computing
    John Acken, Naresh Sehgal, Sonali Fernando, Divya Bansal and Robert Bass

12:30 -13:30

Lunch Break

13:30 - 15:30

ICSC Technical Session 2

Chair: TBA

  • Keyed randomization with adversarial failure curves and moving target defense
    Francesco Bergadano, Sandeep Gupta and Bruno Crispo
  • Tailored Large Language Models for Spam Detection: From Model Customization to Benchmarking Effectiveness
    Amani Shatnawi, Anas Alsobeh, Izzat Alsmadi and Bilal Al-Ahmad
  • Privacy-Preserving Training and Interference of CNNs: A Medical Performance Case Study
    Thomas Prantl, Louis Schneider, Simon Engel, Lukas Horn, Vanessa Borst, Christian Krupitzer, Samuel Kounev and Rafael Bonilla.
  • Web3 Architecture's Inherent Cybersecurity Through Data and Information Safeguards
    Collin Connors and Dilip Sarkar.
  • Highlight to explain: a case study on explainable AI for pattern discovery in code
    Mohamad Nassar and Jacques Bou Abdo.

13:30 - 15:30

MCNA Technical Session 1

Chair: TBA

  • ClusterViG: Efficient Globally Aware Vision GNNs via Image Partitioning
    Dhruv Parikh, Jacob Fein-Ashley, Tian Ye, Rajgopal Kannan and Viktor Prasanna
  • Deep Learning-Based Prediction of Music's Physiological Effects Using Muse2 Heart Rate, Mind Calm, and Stillness
    Yousef Sharrab, Safa Jbaily, Shifaa Al-Zu'Bi and Mohammad Alsmirat
  • Performance of Vision Transformers in Automated Supervised Deep Learning Based Network for Ideal Image Retargeting
    Shooq Alzarouni, Haya Alsuwaidi, Mohammad Alsmirat and Yousef Sharrab
  • Network effects of charging infrastructure in shaping the penetration of electric vehicles in Indian market
    Kartik Pandey and Uttam Sarkar
  • A Novel Method for Efficient Approximate Join Queries on Big Hyperlocal Geo Data
    Ghaith Jamjoum, Abdalrahman Eltahir, Mohannad Janahi, Sebti Foufou, Isam Al Jawarneh
  • Data Mining for Arabic Text Classification: Methods, Challenges, and Future Directions
    Faeik T Al Rabee, Bilal Zahran and Haythem Bany Salameh
  • Identifying Leading FinTech Adopters in the MENA Region Using Big Data Techniques
    Bayan Abu Shawar, Razan Habrah, Kenan Hassan and Ahmed Almallah

15:30 -16:00

Coffee Break

16:00 - 17:40

ICSC Technical Session 3 (Online)

Chair: TBA

  • Anomaly Detection and Clustering for Resource Usage Segmentation in Cloud Data Centers
    Mustafa Daraghmeh, Fadi Alzhouri, Anjali Agarwal and Yaser Jararweh
  • Consensus-driven Intrusion Detection Systems: Enhancing Performance and Fault-tolerance using Approximate Consensus
    Kritee Neupane, Lewis Tseng and Moayad Aloqaily.
  • Privacy-Preserving Mitigation of Poisoning Attacks in Three-Tier Federated Learning
    Ming Liu and Wensheng Zhang.
  • AI-Powered Threat Detection and Response: Leveraging Machine Learning for Real-Time Intrusion Detection Systems (IDS) Using Network Traffic Data
    Mohammed El-Hajj
  • Lightweight Post-Quantum Cryptographic Solutions for IoT: A Practical Approach
    Mohammed El-Hajj

18:00 -20:00

Welcome Reception (Address to be added).

Tuesday, May 20th, 2025

08:00-09:00

Registration & Breakfast

09:00-10:00

Keynote 3: Prof. Abdelsalam (Sumi) Helal
Title: IoTility: Unleashing the Utility of Internet of Things through Microservices Architectural Extensions

10:00 -10:30

Coffee Break

10:30 - 12:30

ICSC Technical Session 4

Chair: TBA

  • Mitigating Ransomware Attacks in Internet of Medical Things Networks
    Yasir Malik, Usman Tariq and Fehmi Jaafar
  • DeepTrAnS: Mixer-based Unsupervised Time Series Anomaly Detection for Servers
    Muhammad Anas Raza, Mohammad Wardat and Anyi Liu
  • LLaVul: A Multimodal LLM for Interpretable Vulnerability Reasoning about Source Code
    Ala Jararweh, Michael Adams, Avinash Sahu, Abdullah Mueen and Afsah Anwar
  • Enhancing IoT Attack Classification through Domain Generalization
    Iram Bibi, Tanir Ozcelebi and Nirvana Meratnia
  • CATCH: A Tool to Automatic Deploy Decoys and Breadcrumbs Based on Network Analysis
    Pushpinder Chouhan, Maurizio Colombo, Rasool Asal and Zhan Cui

10:30 - 12:30

MCNA Technical Session 2 (ONLINE)

Chair: TBA

Meeting Link: https://meet.google.com/xri-fchj-htx

  • Towards Low-Latency Adaptive Streaming for Event-Based Vision
    Andrew Hamara, Benjamin Kilpatrick, Alex Baratta, Brendon Kofink and Andrew Freeman
  • Efficient Multi-Crop Saliency Partitioning for Automatic Image Cropping
    Andrew Hamara and Andrew Freeman
  • DiabPredictor: A Novel Machine Learning Based Approach to Early Stage Diabetes Detection
    Abhinay Ruddarraju
  • Deforestation Detection in Forêt-des-Pins, Haiti with Otsu Thresholding and U-Net
    Sandro S. Louis and Piou Jean E.
  • An Efficient Framework for Combined Analytics of Big Hyperlocal Georeferenced Air Quality and Mobility Data
    Israa Lulu, Hind Alowais and Isam Al Jawarneh
  • AI-Driven Optimization of 5G Networks: Predicting Congestion and Faults Using Machine Learning Techniques43
    Sachin Singh
  • Performance Assessment of Regression Machine Learning Models for Resource Allocation of 5G Network Optimization
    Sachin Singh
  • A Game-Theoretic Approach for Dynamic Traffic Signal Control at Four-Way Intersections
    Ibtihal Mayouche and Abdellah Azmani

12:30 -13:30

Lunch Break

13:30 - 15:30

ICSC Technical Session 5

Chair: TBA

  • From Transaction to Transformation: AI and Machine Learning in FinTech
    Yazan Al Ahmed, Abdulla Osman, Abrar Ahmed, Dina Salem and Yanal Al Ahmad
  • Blockchain for Critical Infrastructure Security: Applications and Challenges
    Udit Gulati and Mahesh Narayanan
  • A Lightweight and Efficient Intrusion Detection System for Drone Networks
    Fawaz Alruwaili and Cihan Tunc.
  • SecureLLM: Leveraging Large Language Models for Fault Detection in Connected Vehicles
    Rakesh Das, Henry Griffith and Heena Rathore.
  • DeepTrAnS: Mixer-based Unsupervised Time Series Anomaly Detection for Servers
    Muhammad Anas Raza, Mohammad Wardat and Anyi Liu.

15:30 -16:00

Coffee Break

16:00 - 18:00

ICSC Technical Session 6 (Online)

Chair: TBA

  • Deep Learning-Driven Automated Data Generation for Enhanced Anomaly Detection in Cybersecurity
    Michael Gough, Ali Dewan and Harris Wang
  • From Abstract Prompts to Cybersecurity Labs: Automating Virtual Environment Design and Deployment with Multi-Agent Systems and LLM-Driven Orchestration
    Ziad Miniesy, Ali Eissa, Yaseen Ahmed, Mohamed Sherif, Omar Miniesy, Omar Harb and Amr El Mougy
  • Adaptive Cyber Attack Projection through Context-Driven Model Selection: Combining Graph Attention Networks and Reinforcement Learning
    Mouhamadou Lamine Diakhame, Chérif Diallo and Mohamed Mejri
  • Mining Intrusion Analysis Diamonds from Security Information and Events Logs
    Mahmoud Al-Maani and Mohammed Alsaleh
  • Technology Platforms for Cybersecurity: A Comparative Analysis
    Carlos Quispe, Johnny Reynaga and José Santisteban.
  • Advanced Document Processing Using LLM and RAG: An Innovative Approach to Efficiency and Privacy
    Mateusz Plonka, Krzysztof Kocot, Krzysztof Daniec and Aleksander Nawrat.

19:30-22:00

Gala Dinner
Restaurant: TBA

Wednesday, May 21st, 2025

08:00-09:00

Registration & Breakfast

09:00-10:00

Keynote 4: Bryson Bort
Title: From Cyber Threats to National Security: Turning Adversarial Weaknesses into Resilient Defenses

10:00 -10:30

Coffee Break

10:30 - 12:30

ICSC Technical Session 7

Chair: TBA

  • DeFeAt: Explanable TinyML-based Framework for Anomaly Detection in Nano-Sensor Traffic in 6G-Enabled Smart Grid
    Shreya Bhatia, Dharma Trivedi, Shivanshi Bhatt, Lakshin Pathak, Krisha Shastri, Karm Vyas, Dev Mehta, Rajesh Gupta and Dr. Sudeep Tanwar
  • Towards Holistic Evaluation of Intrusion Detection Systems: Insights into Latency and Detection Metrics
    Sandhyarani Dash, John Acken and Ruimin Dai
  • Holistic Ethical Commons: A Dynamic Framework for Ethical Decision Making in Multi-Agent AI Systems
    Raghavan Krishnasamy Lakshmana Perumal
  • API Security Framework for Multi-Controller Architecture in Software-Defined Networking
    Sumit Badotra and Mohan Gurusamy

10:30 - 12:30

MCNA Technical Session 3 (ONLINE)

Chair: TPA

Meeting Link: https://meet.google.com/abk-tksj-hbj

  • Availability-Aware Strategy for Service Upgrade in Cloud Computing Platform
    Yanal Alahmad, Tariq Daradkeh and Yazan Alahmed
  • Return Spillovers in AI-Driven Technology Stocks during Global Crises: Insights into Market Dynamics and Implications
    Umar Kayani, Maaz Khan, Ghaleb A El Rafae and Farrukh Nawaz
  • The Influence of AI on Academic Environment: A Systematic Literature Review
    Suhaib Ahmed Soomro, Asif Nawaz, Enas Abulibdeh, Ghadah Al Murshidi, Ahmed Al Zaabi and Badria Al Murshidi
  • The Impact of Smartphones on Enhancing Environmental Sustainability of AAU Students
    Asma Albreiki, Khaleel Alarabi, Hana Shamsan, Fatima Alhosani and Hassna Alahabi
  • Exploring the  effectiveness of the multisensory strategy in improving the reading skills
    Suha Hamdi Moawad Salah and Abdoulaye Kaba
  • Social Network Analysis of Digital Diplomacy in the Middle East Insights from NodeXL
    Dina Tahat, Sara Almaleki, Khalaf Tahat, Ahmed Mansoori, Said Salloum, Mohammed Habes, Amjed Alkadi and Asma Hussein Malkawi
  • Impact of Maritime Autonomous Surface Ships’ Nationality on Criminal Jurisdiction under UAE Law
    Ramzi Madi and Nart Madi

12:30 -13:30

Lunch Break

13:30 - 15:30

ICSC Technical Session 8 (Short Papers)

Chair: TBA

  • Rule-Based Hybrid Adaptive Encryption Model for Autonomous Flight to Secure UAS Data Streams in Real-Time
    Fadjimata Issoufou Anaroua, Yongxin Liu and Hong Liu
  • Formulation of a Contingent and Resilient Response to Cyber Security Threats Jordanian Government Digital Services
    Razan Almomany, Mohammed Habes, Dina Tahat, Khalaf. M. Tahat and Makrem Ziani
  • Enhancing error-minimizing noises using data augmentations
    Long Dang, Thushari Hapuarachchi and Kaiqi Xiong.
  • CRICE: Cyber Range Infrastructure for Cybersecurity Education
    Sajal Bhatia, Irfan Ahmed and Nitin Talreja
  • Quantum-Assisted XAI-Driven DL Framework for FDI Detection in Connected Autonomous Electric Vehicles Underlying 6G
    Dev Mehta, Vrutik Soni, Param Desai, Dharma Trivedi, Lakshin Pathak, Rajesh Gupta and Dr. Sudeep Tanwar

13:30 - 15:30

ICSC Technical Session 9 (online)

Chair: TBA

  • Optimizing DDoS Attacks Detection in SDN using Machine learning
    Rolph Abraham Yao and Ferdinand Tonguim Guinko
  • Safeguarding the Artificial Pancreas: A Review of Security and Reliability Gaps and AI Driven Resilience
    Venkata Sai Abhinav Piratla, Sahaj Saxena, Sajal Bhatia and Navin Kumar
  • Intelligent Anomaly Detection in Database Security: A Triple Loop Learning Approach
    William Kandolo
  • Reward Hacking in Reinforcement Learning and RLHF: A Multidisciplinary Examination of Vulnerabilities, Mitigation Strategies, and Alignment Challenges
    Tiechuan Hu, Wenbo Zhu and Yuqi Yan
  • Real-Time Anomaly Detection: A Hybrid Approach Combining Streaming SQL and Hardware Acceleration
    Sudheer Kumar Lagisetty and Anil Kumar Moka
  • AI-Enhanced Telehealth Platforms: A Comprehensive Analysis of Automated Triage and Personalized Care Systems
    Sudheer Kumar Lagisetty, Priya Devarajulu and Anil Kumar Moka
  • BPMN to Smart Contract by Business Analyst
    Chris Liu, Peter Bodorik and Dawn Jutla

15:30 -16:00

Coffee Break

16:00 - 18:00

ICSC Technical Session 10 (Online)

Chair: TBA

  • ProSoccerTrainer: An AI-powered Penalty Detection and Performance Recommendation System
    Kushagra Nagar and Upendra Singh
  • Blocking Fake News Propagation exploiting OSNs Users Interests and Connections
    Farwa Batool, Giuseppe Lo Re, Marco Morana and Giuseppe Rizzo
  • Impact of Target Network-Specific Data on the Performance of Machine-Learning-Based Intrusion Detection System Models
    Alexander Lawall and Thomas Zöller
  • Detection of Fileless Malware
    Bhaskar Pal, Hitesh Reddy, Saurav S and Vasudevan Ar
  • Revisiting Fidelity in Explainable AI: Unpacking Cognitive Biases and Deceptive Transparency in Model Interpretations
    Akshar Patel.
  • Evaluating Privacy-Preserving Strategies in Bitcoin and Beyond
    Chaitanya Rahalkar and Anushka Virgaonkar
  • Evolution of the Tor Network: An Empirical Analysis of Usage Patterns and Infrastructure
    Chaitanya Rahalkar and Anushka Virgaonkar


Thursday, May 22nd, 2025

9:00 to 12:30

Experiencing the City.

12:30 to 14:00

Lunch

 

Are you ready to continue your quest?

Submit your paper