Business Room (Track 1) (ML & AI aided Security and Privacy) Session A-1 (15 min for each paper) |
Margalla Room (Track 2) (Web & Software Security) Session A-2 (15 min for each paper) |
Diplomat Room (Track 3) (Hardware and Networks Security) Session A-3 (15 min for each paper) |
Shaheen Room (Track 4) (Cryptography, Cryptanalysis & Steganography) Session A-4 (15 min for each paper) |
---|---|---|---|
Paper 1: Application Profiling from Encrypted Traffic | Paper 4: Efficient Identification of Race Condition Vulnerability in C code by Abstract Interpretation and Value Analysis | Paper 7: SSD Forensic: Evidence Generation and Forensic Research on Solid State Drives Using Trim Analysis | Paper 10: Image Steganography using Cryptographic Primitives |
Paper 2: Email Classification using LSTM: A Deep Learning Technique | Paper 5: Reed: An Automated Scalable Multi-language Vulnerability Dataset Generator for Open Source Software | Paper 8: A Privacy-Preserving Cross-domain Network access Services Using Sovrin Identifier | Paper 11:SHA-3 Algorithm based Authentication Scheme for Vehicular Ad-hoc Networks |
Paper 3:A Generic Machine Learning Approach for IoT Device Identification | Paper 6: Secure Internet Voting using Blockchain Technology | Paper 9: Endpoint Detection & Response A Malware Identification Solution for Enterprises | Paper 12: Decoy state HD QKD system for secure optical communication |
Margalla Room (Track 5) (Malware Analysis and Operating Systems Security) Session B-2 (15 min for each paper) |
Diplomat Room (Track 6) (Cyber Physical Systems and Critical Infrastructure Security) Session B-3 (15 min for each paper) |
Shaheen Room (Track 7) (Social Media Analytics and Useable Security) Session B-4 (15 min for each paper) |
---|---|---|
Paper 13: Enhancement in Buffer Overflow (BOF) Detection Capability of Cppcheck Static Analysis Tool | Paper 16: Implementation of Cyber-Physical Systems with Modbus Communication for Security Studies | Paper 20: A Deep Ensemble Model for News Classification on Social Media |
Paper 14: Comparative Analysis of Anti-Virus Evasion Malware Creator Tools of Kali Linux with Obfuscation Model | Paper 17: Modeling and Simulation Challenges for Cyber Physical Systems from Operational Security Perspective | Paper 21:Depression Analysis of social media activists using the Gated Architecture Bi-LSTM |
Paper 15: A Deep Learning based Malware Images Classification | Paper 18:Electromagnetic Pulse (EMP): A Study of General Trends, Simulation Analysis of E1 HEMP Coupling and Protection Strategies | --- |
--- | Paper 19: Physical Layer Authentication Security in Radio Communication- Emerging Trends | --- |