(A face-to-face conference; depending on the current pandemic situation, online participation will be likely)
November 11th – 13th, 2022
Sousse, Tunisia
In succession to the successful annual SIN 2007 - SIN 2021, SIN 2022 provides an international forum for presentation of research and applications of security in information and networks. The SIN 2022 conference will be held in Sousse, Tunisia and accept papers, special sessions, workshops, and tutorials on theory and practice of security of information and networks. The SIN Conference series has been co-organized by prominent institutions and co-hosted by two universities in each of the USA, UK, Russia, Türkiye, India, and Australia since 2007. SIN 2022 is sponsored by the University of Sfax, Tunisia, IEEE Tunisia Section, IEEE Tunisia Computer Chapter, IEEE Council on RFID Tunisia Chapter, ATRS Tunisian Association for Scientific Research, and Hasan Kalyoncu University, Türkiye.
Papers, special sessions, tutorials, and workshops addressing all aspects of security in information and networks are being sought. Researchers and industrial practitioners working on the following and related subjects are especially encouraged. Doctoral students are encouraged to propose papers on ongoing research.
Broad areas of interest in security theory, technology and applications will include, but are not limited to, the following:
The following two paper categories are welcome. Any submission needs to be explicitly marked as “full paper” or “short paper”.
All papers must be original and not simultaneously submitted to another journal or conference. All paper submissions must contain a title, a short abstract, and a list of keywords. All submissions will be subjected to a thorough double‐blind review by at least three reviewers. Submitted papers shall be anonymised and all author names, affiliations, acknowledgements, and obvious traceable references should be eliminated to be eligible for the review process.
Authors are also encouraged to propose position papers on practical studies and experiments, critique of existing work, emerging issues, and novel ideas under development. Enterprises and research centres developing, implementing, or using security tools and frameworks are encouraged to propose application / tool demo.
Submitted manuscripts should represent novel research contributions.
All manuscripts will have to be submitted in anonymised form for double-blind review. In double-blind review, neither the author nor the reviewers are aware of each other's identity. Papers that are not properly anonymised may be rejected without review.
To prepare your manuscript under double-blind review rules:
Submissions should be made according to the IEEE Manuscript Templates for Conference Proceedings (Microsoft Word template, LaTex template, Overleaf). Kindly note that we prefer the use of US English.
All submissions are made through EasyChair. Please only use this link for submission.
The SIN-Conf-2022 will be held at the IBEROSTAR Diar Andalous hotel ★★★★★ in the city of Sousse.
Iberostar Diar andalous Sousse is a 5 star hotel in Sousse.
It sets in an ideal location, just 3 km from Port El Kantaoui and just a short drive away from Monastir airport.
Hotel Contact:
Web site:
https://www.iberostar.com/fr/hotels/sousse/iberostar-diar-el-andalous
Location : Hammam Sousse, 4089 Port el Kantaoui, Tunisia
The main airports to join Sousse are:
Monastir Habib Bourguiba International Airport
Enfidha Hammamat International Airport
Tunis Carthage International Airport
The due dates have been extended for the special sessions. Please consult the CFP of the specific special session.
SINCONF 2022 > Friday, 11th of November |
|||
13:00 - 14:30 |
Registration and Opening |
||
14:30- 14:45
|
Welcome from
the general conference chair
|
||
14:45 - 15:30
|
Keynote
Speech 1: Random Neural Networks Optimise QoS, Security and Energy
Consumption Keynote
Speaker: Erol Gelenbe, Polish Academy of Sciences
|
||
15:30 - 16:00
|
Keynote
Speech 2: Intrusion detection systems
using machine learning for the security of autonomous vehicles Keynote
Speaker : Abdelwahid Derhab, King Saud University, Saudi Arabia
|
||
16 :00-16-30
|
Coffee
Break
|
||
|
Session
1: Mitigating Attacks Session chair: Pr. Atilla
Elci |
||
16:30-16:50 |
Andikan Otung
and Andrew Martin
|
Towards
Comparative Evaluation of DDoS Defences
|
|
16:50-17:10
|
Ouissem Ben Fredj
|
A
NLP-inspired method to predict multi-step cyberattacks
|
|
17:10-17:30
|
Ali Kerem Yıldız, Aykut
Atmaca, Ali Özgür Solak , Yekta Can Tursun and Şerif Bahtiyar
|
A Trust Based
DNS System to Prevent Eclipse Attack on Blockchain Networks
|
|
17:30-17:50 |
Chidera
Biringa and Gokhan Kul
|
A Secure
Design Pattern Approach Toward Tackling Lateral-Injection Attacks
|
|
17:50-18:10 |
Anne Bumiller, Olivier Barais and
Nicolas Aillery
|
Towards a
Better Understanding of Impersonation Risks
|
|
18:10-18:30 |
Moez Krichen,
Mariam Lahami and Qasem Abu Al-Haija
|
Formal
Methods for the Verification of Smart Contracts: A Review
|
|
18:30-18:50 |
Thiago
Figueiredo Costa and Mateus Felipe Tymburibá
|
Challenges on
Prioritizing Software Patching
|
|
SINCONF 2022 > Saturday,
12th of November
|
|||
08:00-08:30
|
Day Opening Remarks
|
||
08:30 - 09:00
|
Keynote speech
3 : Cyber Security Threat Landscape in the Context of Industry 4.0
Keynote Keynote Speaker: Haider Abbas, NCSAEL,
USA
|
||
09:00 - 09:40
|
Keynote
speech 4: Introducing Homomorphic Encryption in Blockchain-enabled
Applications Keynote
Speaker: Mohamed Hamdi, University of Carthage, Tunisia
|
||
|
Session
2: Blockchain Session
chair: Pr.Mohamed Hamdi
|
||
09:40-10:00 |
Bessem
Zaabar, Omar Cheikhrouhou and Mohamed Abid
|
Intrusion
Detecion System for IoMT through Blockchain-based Federated Learning
|
|
10:00-10:20 |
Murshedul
Arifeen and Andrei Petrovski.
|
Topology for
Preserving Feature Correlation in Tabular Synthetic Data
|
|
10:20
- 10:45
|
Coffee Break
|
||
|
Session
3: Security Systems
Session
chair: Habib Youssef
|
||
10:45-11:05 |
Dmitriy
Levonevskiy, Anna Motienko and Mikhail Vinogradov.
|
Approach to
Physical Access Management, Control and Analytics Using
Multimodal and Heterogeneous
Data
|
|
11:05-11:25 |
Abdelhamid
Saighi and Salim Chitroub.
|
Robust
Grayscale Image Watermarking Approach using DCT and DWT |
|
11:25-11:45
|
Elías Grande
|
Social
Behaviour Identification relying on Device Fingerprint Analysis
|
|
11:45-12:05 |
Cristian Chindrus and Constantin F.
Caruntu
|
Development
and Testing of a Core System for Red and Blue Scenario in Cyber Security
Incidents
|
|
12:05-12:25 |
Mariem Turki,
Bouthaina Dammak and Rawya Mars
|
A Private
Smart Parking Solution based on Blockchain and AI
|
|
12:25-12:45 |
Mays A.
Hamdan, Amel Meddeb Maklouf and Hassene Mnif
|
Review of Authentication with Privacy-Preserving Schemes for 5G-enabled Vehicular Networks |
|
12:45 - 14:15
|
Lunch Break
|
||
14:15 - 14:45
|
Keynote
speech 5: Scaling Blockchains
Keynote
Speaker: Abdelhakim Senhaji Hafidh, University of
Montreal,
Canada
|
||
|
Session
4: machine learning for Security Session
chair: Prof. Dmitriy Levonevskiy
|
||
14:45-15:05 |
Ines Jemal,
Mohamed Amine Haddar, Omar Cheikhrouhou and Adel Mahfoudhi.
|
SWAF: A Smart
Web Application Firewall Based
on Convolutional Neural Network
|
|
15:05-15:25 |
Amina Sahbi,
Faouzi Jaidi and Adel Bouhoula
|
Artificial
Intelligence for SDN Security: Analysis, Challenges
|
|
15:25-15:45 |
Ciprian-Alin
Simion, Gheorghe Balan and Dragos Gavrilut
|
Improving
Detection of Malicious Samples by using State-of-the-Art Adversarial Machine
Learning Algorithms
|
|
15:45-16:05
|
Ratun Rahman,
Md Rafid Islam and Akib Ahmed. |
A Study of
Permission-based Malware Detection Using Machine Learning |
|
16:05- 16:30
|
Coffee Break
|
||
|
Session 5:
Short papers Session
chair: Dr. Elías Grande |
||
16:30-16:45 |
Sabrine
Bhiri, Kais Loukil, Faten Chaabane and Tarek Frikha |
Blockchain
Application for Parking Management |
|
16:45-17:00 |
Hedi Choura,
Faten Chaabane, Mouna Baklouti and Tarek Frikha
|
Blockchain for
IoT-Based Healthcare using Secure and Privacy-Preserving Watermark
|
|
17:00-17:15 |
Héla Makina,
Asma Ben Letaifa and Abderrezak Rachedi
|
Leveraging
Edge Computing, Blockchain and IPFS for Addressing eHealth Records Challenges
|
|
17:15-17:30 |
Lotfi
Ezzeddini, Jalel Ktari, Iheb Zouaoui, Amira Talha, Nizar Jarray and Tarek
Frikha.
|
Blockchain
for the Electronic Voting System :a
Case study : Student Representative Vote in Tunisian Institute
|
|
17:30-17:45
|
Ahmed
Abadulla Ashlam, Atta Badii, Frederick Stahl |
Multi-Phase
Algorithmic Framework to Prevent SQL Injection Attacks using Improved Machine
Learning and Deep Learning to Enhance Database Security in Real-Time |
|
17:45-18:00 |
Omar
Cheikhrouhou, Ouissem Ben Fredj, Nesrine Atitallah and Salem Hellal |
Intrusion
Detection in Industrial IoT |
|
18:00-18:15 |
Mehdi
Houichi, Faouzi Jaidi and Adel Bouhoula. |
Analysis of
Smart Cities Security: Challenges and Advancements |
|
18:15-18:30 |
Siegfried
Hollerer, Marta Chabrova, Thilo Sauter and Wolfgang Kastner
|
Combined
Modeling Techniques for Safety and Security in Industrial Automation: A Case
Study
|
|
18:30-18:45 |
Mays Jabbar
and Hafedh Trabelsi.
|
A
Betweenness Centrality Based Clustering in VANETs
|
|
SINCONF 2022 > Sunday, 13th
of November
|
|||
09:00 - 10:00
|
Keynote
speech 6: Cybersecurity of connected Vehicules Keynote
Speaker: Mohamed Mosbah, Polytechnic Institute of Bordeaux
|
||
|
Session
6: Security Systems Session
chair: Mohamed Mosbah |
||
10:00-10:20 |
Liudmila
Babenko and Ilya Rusalovsky |
Homomorphic Operations
on Integers via Operations on Bits
|
|
10:20-10:40 |
Silviu-Constantin
Vițel, Marilena
Lupașcu, Dragoș Teodor
Gavriluț and Henri Luchian
|
Evolution of
Macro VBA Obfuscation Techniques
|
|
10:40-11:00 |
Sondes Ksibi,
Faouzi Jaidi and Adel Bouhoula.
|
A
User-Centric Fuzzy AHP-based Method for Medical Devices Security Assessment |
|
11:00-11:30
|
Coffee Break
|
||
11:30-12 :00
|
Closing
Ceremony
|
||
12:00 -13 :00
|
Room Check-out and Lunch Break
|
||
13 :00-
|
Cultural activities
|
||
Previous SIN Conf events and their proceedings (see below for special issues and books):