Keynotes Location for May
19th: Vaughn Center Crescent Club
ICSC Technical Sessions and
Keynotes Location: Plant Hall, the Fletcher Lounge.
MCNA Technical sessions location: Music Room
All times are in Tampa
Time (GMT-4)
|
Monday, May 19th, 2025
|
08:00-09:00
|
Registration & Breakfast
|
09:00-09:15
|
Opening
|
09:15-10:00
|
Keynote 1: Roger Grimes
Title: Taming the Hacker Storm: A Way to Defeat Cybercriminals and Malware
|
10:00-11:00
|
Keynote 2: Michael Esola
Title: Catching 'Em All: Navigating Data Privacy and Cybersecurity in
Augmented Reality Games
|
11:15 - 12:30
|
ICSC Technical Session 1
|
Chair: TBA
|
- Time
Series Based Network Intrusion Detection using MTF-Aided Transformer
Poorvi Joshi and Mohan Gurusamy
- Securing
Wireless SDN Controller from Jamming Attackn
Chandan Kumar and Md. Sarfaraj Alam Ansari
- Relationship-based
Distributed and Variable Trust Metrics for Secure Computing
John Acken, Naresh Sehgal, Sonali Fernando, Divya Bansal and Robert
Bass
|
12:30 -13:30
|
Lunch Break
|
13:30 - 15:30
|
ICSC Technical Session 2
|
Chair: TBA
|
- Keyed
randomization with adversarial failure curves and moving target defense
Francesco Bergadano, Sandeep Gupta and
Bruno Crispo
- Tailored
Large Language Models for Spam Detection: From Model Customization to
Benchmarking Effectiveness
Amani Shatnawi, Anas Alsobeh, Izzat Alsmadi and Bilal Al-Ahmad
- Privacy-Preserving
Training and Interference of CNNs: A Medical Performance Case Study
Thomas Prantl, Louis Schneider, Simon Engel, Lukas Horn, Vanessa
Borst, Christian Krupitzer, Samuel Kounev and
Rafael Bonilla.
- Web3
Architecture's Inherent Cybersecurity Through Data and Information
Safeguards
Collin Connors and Dilip Sarkar.
- Highlight
to explain: a case study on explainable AI for pattern discovery in code
Mohamad Nassar and Jacques Bou Abdo.
|
13:30 - 15:30
|
MCNA Technical Session 1
|
Chair: TBA
|
- ClusterViG: Efficient Globally Aware Vision GNNs
via Image Partitioning
Dhruv Parikh, Jacob Fein-Ashley, Tian Ye, Rajgopal
Kannan and Viktor Prasanna
- Deep Learning-Based
Prediction of Music's Physiological Effects Using Muse2 Heart Rate, Mind
Calm, and Stillness
Yousef Sharrab, Safa Jbaily, Shifaa Al-Zu'Bi and Mohammad Alsmirat
- Performance
of Vision Transformers in Automated Supervised Deep Learning Based
Network for Ideal Image Retargeting
Shooq Alzarouni, Haya Alsuwaidi,
Mohammad Alsmirat and Yousef Sharrab
- Network
effects of charging infrastructure in shaping the penetration of
electric vehicles in Indian market
Kartik Pandey and Uttam Sarkar
- A Novel
Method for Efficient Approximate Join Queries on Big Hyperlocal Geo Data
Ghaith Jamjoum, Abdalrahman Eltahir,
Mohannad Janahi, Sebti Foufou, Isam Al Jawarneh
- Data
Mining for Arabic Text Classification: Methods, Challenges, and Future
Directions
Faeik T Al Rabee, Bilal Zahran and
Haythem Bany Salameh
- Identifying
Leading FinTech Adopters in the MENA Region Using Big Data Techniques
Bayan Abu Shawar, Razan Habrah, Kenan
Hassan and Ahmed Almallah
|
15:30 -16:00
|
Coffee Break
|
16:00 - 17:40
|
ICSC Technical Session 3 (Online)
|
Chair: TBA
|
- Anomaly
Detection and Clustering for Resource Usage Segmentation in Cloud Data Centers
Mustafa Daraghmeh, Fadi Alzhouri, Anjali
Agarwal and Yaser Jararweh
- Consensus-driven
Intrusion Detection Systems: Enhancing Performance and Fault-tolerance
using Approximate Consensus
Kritee Neupane, Lewis Tseng and
Moayad Aloqaily.
- Privacy-Preserving
Mitigation of Poisoning Attacks in Three-Tier Federated Learning
Ming Liu and Wensheng Zhang.
- AI-Powered
Threat Detection and Response: Leveraging Machine Learning for Real-Time
Intrusion Detection Systems (IDS) Using Network Traffic Data
Mohammed El-Hajj
- Lightweight
Post-Quantum Cryptographic Solutions for IoT: A Practical Approach
Mohammed El-Hajj
|
18:00 -20:00
|
Welcome Reception (Address to be added).
|
Tuesday, May 20th, 2025
|
08:00-09:00
|
Registration & Breakfast
|
09:00-10:00
|
Keynote 3: Prof. Abdelsalam (Sumi) Helal
Title: IoTility: Unleashing the Utility of Internet
of Things through Microservices Architectural Extensions
|
10:00 -10:30
|
Coffee Break
|
10:30 - 12:30
|
ICSC Technical Session 4
|
Chair: TBA
|
- Mitigating
Ransomware Attacks in Internet of Medical Things Networks
Yasir Malik, Usman Tariq and Fehmi Jaafar
- DeepTrAnS: Mixer-based Unsupervised Time Series
Anomaly Detection for Servers
Muhammad Anas Raza, Mohammad Wardat and Anyi Liu
- LLaVul: A Multimodal LLM for Interpretable
Vulnerability Reasoning about Source Code
Ala Jararweh, Michael Adams, Avinash Sahu, Abdullah Mueen and Afsah
Anwar
- Enhancing
IoT Attack Classification through Domain Generalization
Iram Bibi, Tanir Ozcelebi and Nirvana Meratnia
- CATCH: A
Tool to Automatic Deploy Decoys and Breadcrumbs Based on Network
Analysis
Pushpinder Chouhan, Maurizio
Colombo, Rasool Asal and Zhan Cui
|
10:30 - 12:30
|
MCNA Technical Session 2 (ONLINE)
|
Chair: TBA
Meeting Link: https://meet.google.com/xri-fchj-htx
|
- Towards
Low-Latency Adaptive Streaming for Event-Based Vision
Andrew Hamara, Benjamin Kilpatrick, Alex Baratta, Brendon Kofink and Andrew Freeman
- Efficient Multi-Crop
Saliency Partitioning for Automatic Image Cropping
Andrew Hamara and Andrew Freeman
- DiabPredictor: A Novel Machine Learning Based Approach
to Early Stage Diabetes Detection
Abhinay Ruddarraju
- Deforestation
Detection in Forêt-des-Pins, Haiti with Otsu Thresholding and U-Net
Sandro S. Louis and Piou Jean E.
- An
Efficient Framework for Combined Analytics of Big Hyperlocal
Georeferenced Air Quality and Mobility Data
Israa Lulu, Hind Alowais and Isam Al Jawarneh
- AI-Driven
Optimization of 5G Networks: Predicting Congestion and Faults Using
Machine Learning Techniques43
Sachin Singh
- Performance
Assessment of Regression Machine Learning Models for Resource Allocation
of 5G Network Optimization
Sachin Singh
- A
Game-Theoretic Approach for Dynamic Traffic Signal Control at Four-Way
Intersections
Ibtihal Mayouche and Abdellah Azmani
|
12:30 -13:30
|
Lunch Break
|
13:30 - 15:30
|
ICSC Technical Session 5
|
Chair: TBA
|
- From
Transaction to Transformation: AI and Machine Learning in FinTech
Yazan Al Ahmed, Abdulla Osman, Abrar Ahmed, Dina Salem and Yanal Al
Ahmad
- Blockchain
for Critical Infrastructure Security: Applications and Challenges
Udit Gulati and Mahesh Narayanan
- A
Lightweight and Efficient Intrusion Detection System for Drone Networks
Fawaz Alruwaili and Cihan Tunc.
- SecureLLM: Leveraging Large Language Models for
Fault Detection in Connected Vehicles
Rakesh Das, Henry Griffith and Heena Rathore.
- DeepTrAnS: Mixer-based Unsupervised Time Series
Anomaly Detection for Servers
Muhammad Anas Raza, Mohammad Wardat and Anyi Liu.
|
15:30 -16:00
|
Coffee Break
|
16:00 - 18:00
|
ICSC Technical Session 6 (Online)
|
Chair: TBA
|
- Deep
Learning-Driven Automated Data Generation for Enhanced Anomaly Detection
in Cybersecurity
Michael Gough, Ali Dewan and Harris Wang
- From
Abstract Prompts to Cybersecurity Labs: Automating Virtual Environment
Design and Deployment with Multi-Agent Systems and LLM-Driven
Orchestration
Ziad Miniesy, Ali Eissa, Yaseen Ahmed,
Mohamed Sherif, Omar Miniesy, Omar Harb and
Amr El Mougy
- Adaptive
Cyber Attack Projection through Context-Driven Model Selection:
Combining Graph Attention Networks and Reinforcement Learning
Mouhamadou Lamine Diakhame, Chérif Diallo
and Mohamed Mejri
- Mining
Intrusion Analysis Diamonds from Security Information and Events Logs
Mahmoud Al-Maani and Mohammed Alsaleh
- Technology
Platforms for Cybersecurity: A Comparative Analysis
Carlos Quispe, Johnny Reynaga and José Santisteban.
- Advanced
Document Processing Using LLM and RAG: An Innovative Approach to
Efficiency and Privacy
Mateusz Plonka, Krzysztof Kocot, Krzysztof Daniec
and Aleksander Nawrat.
|
19:30-22:00
|
Gala Dinner
Restaurant: TBA
|
Wednesday, May 21st, 2025
|
08:00-09:00
|
Registration & Breakfast
|
09:00-10:00
|
Keynote 4: Bryson Bort
Title: From Cyber Threats to National Security: Turning Adversarial
Weaknesses into Resilient Defenses
|
10:00 -10:30
|
Coffee Break
|
10:30 - 12:30
|
ICSC Technical Session 7
|
Chair: TBA
|
- DeFeAt: Explanable TinyML-based Framework for Anomaly Detection in
Nano-Sensor Traffic in 6G-Enabled Smart Grid
Shreya Bhatia, Dharma Trivedi, Shivanshi Bhatt, Lakshin Pathak,
Krisha Shastri, Karm Vyas, Dev Mehta, Rajesh Gupta and Dr. Sudeep Tanwar
- Towards Holistic
Evaluation of Intrusion Detection Systems: Insights into Latency and
Detection Metrics
Sandhyarani Dash, John Acken and Ruimin Dai
- Holistic
Ethical Commons: A Dynamic Framework for Ethical Decision Making in
Multi-Agent AI Systems
Raghavan Krishnasamy Lakshmana Perumal
- API
Security Framework for Multi-Controller Architecture in Software-Defined
Networking
Sumit Badotra and Mohan Gurusamy
|
10:30 - 12:30
|
MCNA Technical Session 3 (ONLINE)
|
Chair: TPA
Meeting Link: https://meet.google.com/abk-tksj-hbj
|
- Availability-Aware
Strategy for Service Upgrade in Cloud Computing Platform
Yanal Alahmad, Tariq Daradkeh and Yazan Alahmed
- Return Spillovers
in AI-Driven Technology Stocks during Global Crises: Insights into
Market Dynamics and Implications
Umar Kayani, Maaz Khan, Ghaleb A El Rafae and Farrukh Nawaz
- The
Influence of AI on Academic Environment: A Systematic Literature Review
Suhaib Ahmed Soomro, Asif Nawaz, Enas
Abulibdeh, Ghadah Al Murshidi, Ahmed Al Zaabi and Badria
Al Murshidi
- The Impact
of Smartphones on Enhancing Environmental Sustainability of AAU Students
Asma Albreiki, Khaleel Alarabi, Hana
Shamsan, Fatima Alhosani and Hassna Alahabi
- Exploring the effectiveness
of the multisensory strategy in improving the reading skills
Suha Hamdi Moawad Salah and Abdoulaye Kaba
- Social
Network Analysis of Digital Diplomacy in the Middle East Insights from NodeXL
Dina Tahat, Sara Almaleki,
Khalaf Tahat, Ahmed Mansoori, Said Salloum,
Mohammed Habes, Amjed Alkadi and Asma Hussein Malkawi
- Impact of
Maritime Autonomous Surface Ships’ Nationality on Criminal Jurisdiction
under UAE Law
Ramzi Madi and Nart Madi
|
12:30 -13:30
|
Lunch Break
|
13:30 - 15:30
|
ICSC Technical Session 8 (Short Papers)
|
Chair: TBA
|
- Rule-Based
Hybrid Adaptive Encryption Model for Autonomous Flight to Secure UAS
Data Streams in Real-Time
Fadjimata Issoufou Anaroua, Yongxin Liu and
Hong Liu
- Formulation
of a Contingent and Resilient Response to Cyber Security Threats
Jordanian Government Digital Services
Razan Almomany, Mohammed Habes, Dina Tahat, Khalaf.
M. Tahat and Makrem
Ziani
- Enhancing error-minimizing
noises using data augmentations
Long Dang, Thushari Hapuarachchi and Kaiqi Xiong.
- CRICE:
Cyber Range Infrastructure for Cybersecurity Education
Sajal Bhatia, Irfan Ahmed and Nitin Talreja
- Quantum-Assisted
XAI-Driven DL Framework for FDI Detection in Connected Autonomous
Electric Vehicles Underlying 6G
Dev Mehta, Vrutik Soni, Param Desai, Dharma
Trivedi, Lakshin Pathak, Rajesh Gupta and Dr. Sudeep Tanwar
|
13:30 - 15:30
|
ICSC Technical Session 9 (online)
|
Chair: TBA
|
- Optimizing
DDoS Attacks Detection in SDN using Machine learning
Rolph Abraham Yao and Ferdinand Tonguim
Guinko
- Safeguarding
the Artificial Pancreas: A Review of Security and Reliability Gaps and
AI Driven Resilience
Venkata Sai Abhinav Piratla, Sahaj Saxena,
Sajal Bhatia and Navin Kumar
- Intelligent
Anomaly Detection in Database Security: A Triple Loop Learning Approach
William Kandolo
- Reward
Hacking in Reinforcement Learning and RLHF: A Multidisciplinary
Examination of Vulnerabilities, Mitigation Strategies, and Alignment
Challenges
Tiechuan Hu, Wenbo
Zhu and Yuqi Yan
- Real-Time
Anomaly Detection: A Hybrid Approach Combining Streaming SQL and
Hardware Acceleration
Sudheer Kumar Lagisetty and Anil Kumar Moka
- AI-Enhanced
Telehealth Platforms: A Comprehensive Analysis of Automated Triage and
Personalized Care Systems
Sudheer Kumar Lagisetty, Priya Devarajulu and Anil Kumar Moka
- BPMN to
Smart Contract by Business Analyst
Chris Liu, Peter Bodorik and Dawn Jutla
|
15:30 -16:00
|
Coffee Break
|
16:00 - 18:00
|
ICSC Technical Session 10 (Online)
|
Chair: TBA
|
- ProSoccerTrainer: An
AI-powered Penalty Detection and Performance Recommendation System
Kushagra Nagar and Upendra Singh
- Blocking
Fake News Propagation exploiting OSNs Users Interests and Connections
Farwa Batool, Giuseppe Lo Re, Marco Morana and Giuseppe Rizzo
- Impact of
Target Network-Specific Data on the Performance of
Machine-Learning-Based Intrusion Detection System Models
Alexander Lawall and Thomas Zöller
- Detection
of Fileless Malware
Bhaskar Pal, Hitesh Reddy, Saurav S and Vasudevan Ar
- Revisiting
Fidelity in Explainable AI: Unpacking Cognitive Biases and Deceptive
Transparency in Model Interpretations
Akshar Patel.
- Evaluating
Privacy-Preserving Strategies in Bitcoin and Beyond
Chaitanya Rahalkar and Anushka Virgaonkar
- Evolution
of the Tor Network: An Empirical Analysis of Usage Patterns and
Infrastructure
Chaitanya Rahalkar and Anushka Virgaonkar
|
Thursday, May 22nd, 2025
|
9:00 to 12:30
|
Experiencing the City.
|
12:30 to 14:00
|
Lunch
|
|
|
|
|