In succession to the successful annual SIN 2007 - SIN 2021, SIN 2022 provides an international forum for presentation of research and applications of security in information and networks. The SIN 2022 conference will be held in Sousse, Tunisia and accept papers, special sessions, workshops, and tutorials on theory and practice of security of information and networks. The SIN Conference series has been co-organized by prominent institutions and co-hosted by two universities in each of the USA, UK, Russia, Türkiye, India, and Australia since 2007. SIN 2022 is sponsored by the University of Sfax, Tunisia, IEEE Tunisia Section, IEEE Tunisia Computer Chapter, IEEE Council on RFID Tunisia Chapter, ATRS Tunisian Association for Scientific Research, and Hasan Kalyoncu University, Türkiye.

November 11th – 13th


Call for papers

Papers, special sessions, tutorials, and workshops addressing all aspects of security in information and networks are being sought. Researchers and industrial practitioners working on the following and related subjects are especially encouraged. Doctoral students are encouraged to propose papers on ongoing research.

Broad areas of interest in security theory, technology and applications will include, but are not limited to, the following:

Secure information systems

  • Security, privacy, and trust of blockchain and distributed ledger technologies
  • Consensus mechanisms, especially distributed control and processing applications
  • Secure smart contracts

Security in networks

  • Network security and protocols
  • Computer network defence
  • Next generation network architecture
  • Autonomous and adaptive security

Development and realization of fundamental technologies

  • Cryptographic techniques and key management
  • Post Quantum Cryptography
  • Security schemes
  • New algorithms
  • IoT Security and Trust
  • Malware analysis
  • Access control and intrusion detection
  • Computational intelligence techniques in security
  • Trust and privacy

Application Areas

  • Detection and prevention of cybercrimes such as fraud and phishing
  • Industrial applications of security
  • Industrial experiences and challenges of security systems
  • Security of cyber-physical systems
  • Security tools and development platforms
  • Security-aware software engineering
  • Security challenges in Mobile/Embedded Systems
  • Cloud security
  • Security Awareness and Education

Security Assurance

  • Critical analysis of existing approaches
  • Interoperability, service levels and quality issues in security systems
  • Information assurance, security, and public policy
  • Security ontology, models, protocols & policies
  • Standards, guidelines and certification
  • Information assurance

Special Sessions

Three proposals for special sessions have been accepted:

  • Special Session 1: Special session on Intelligent Blockchain for Internet of Things

    Special session organizers:
    Dr. Ben Othman Soufiene :PRINCE Laboratory Research, ISITcom, Hammam Sousse, University of Sousse, Tunisia.

  • Special Session 2: Special session on Emerging trends of using AI/ML to mitigate cyber attacks in SDN

    Special session organizers:
    Ali El Kamel, Manel Majdoub, and Habib Youssef :PRINCE Research Laboratory, ISITComHammam Sousse, University of Sousse.

  • Special Session 3: Special session on Cyber Security and Digital Investigation

    Special session organizers:
    Waseem Iqbal :National University of Sciences and Technology (NUST), Pakistan
    Yawar Abbas :National University of Sciences and Technology (NUST), Pakistan

Types of submissions

The following two paper categories are welcome. Any submission needs to be explicitly marked as “full paper” or “short paper”.

  • Full papers – scientific research papers, surveying works and industrial experiences describing significant advances. Papers should be no longer than 8 pages, including references.
  • Short papers – early results or work in progress with initial findings. Papers should be maximum 4 pages long, including references.

All papers must be original and not simultaneously submitted to another journal or conference. All paper submissions must contain a title, a short abstract, and a list of keywords. All submissions will be subjected to a thorough double‐blind review by at least three reviewers. Submitted papers shall be anonymised and all author names, affiliations, acknowledgements, and obvious traceable references should be eliminated to be eligible for the review process.

Authors are also encouraged to propose position papers on practical studies and experiments, critique of existing work, emerging issues, and novel ideas under development. Enterprises and research centres developing, implementing, or using security tools and frameworks are encouraged to propose application / tool demo.

  • Proposals for special sessions, tutorials, and workshops should provide sufficient detail to evaluate them.


Submitted manuscripts should represent novel research contributions.

All manuscripts will have to be submitted in anonymised form for double-blind review. In double-blind review, neither the author nor the reviewers are aware of each other's identity. Papers that are not properly anonymised may be rejected without review.

To prepare your manuscript under double-blind review rules:

  • Remove author names and affiliations from the title page.
  • Carefully review the figures and appendices to ensure affiliations are not accidentally included
  • When referring to your previous work, do so in the third person, as though it were written by someone else.
  • Authors may include links to websites that contain source code, tools, or other supplemental material. Neither the link in the paper nor the website or any of the materials therein may contain the authors’ names and affiliations.

Submissions should be made according to the IEEE Manuscript Templates for Conference Proceedings (Microsoft Word template, LaTex template, Overleaf). Kindly note that we prefer the use of US English.

All submissions are made through EasyChair. Please only use this link for submission.


The 2022 IEEE SIN registration site is now live and ready to accept registrations! Please click the live link below to access the registration website:

Live Link:

Travel and Accommodation

Visa Information

Visa Policy information


The SIN-Conf-2022 will be held at the IBEROSTAR Diar Andalous hotel ★★★★★ in the city of Sousse.

Iberostar Diar andalous Sousse is a 5 star hotel in Sousse. It sets in an ideal location, just 3 km from Port El Kantaoui and just a short drive away from Monastir airport.

Hotel Contact:
Web site:
Location : Hammam Sousse, 4089 Port el Kantaoui, Tunisia


The main airports to join Sousse are:

Monastir Habib Bourguiba International Airport
Enfidha Hammamat International Airport
Tunis Carthage International Airport

Important dates

The due dates have been extended for the special sessions. Please consult the CFP of the specific special session.

  • Paper Submission by: July 24th
  • Author Notification: September 25th (extended, onwards)
  • Author Registration: October 10th
  • Camera Ready Submission: October 11th
  • Conference: November 11th – 13th

SINCONF 2022 > Friday, 11th of November

13:00 - 14:30

Registration and Opening

14:30- 14:45

Welcome from the general conference chair

14:45 - 15:30

Keynote Speech 1: Random Neural Networks Optimise QoS, Security and Energy Consumption

Keynote Speaker: Erol Gelenbe, Polish Academy of Sciences

15:30 - 16:00

Keynote Speech 2: Intrusion detection systems using machine learning for the security of autonomous vehicles

Keynote Speaker : Abdelwahid Derhab, King Saud University, Saudi Arabia

16 :00-16-30

Coffee Break


Session 1: Mitigating Attacks

Session chair: Pr. Atilla Elci


Andikan Otung and Andrew Martin

Towards Comparative Evaluation of DDoS Defences


Ouissem Ben Fredj

A NLP-inspired method to predict multi-step cyberattacks


Ali Kerem Yıldız, Aykut Atmaca, Ali Özgür Solak , Yekta Can Tursun and Şerif Bahtiyar

A Trust Based DNS System to Prevent Eclipse Attack on Blockchain Networks


Chidera Biringa and Gokhan Kul

A Secure Design Pattern Approach Toward Tackling Lateral-Injection Attacks


Anne Bumiller, Olivier Barais and Nicolas Aillery

Towards a Better Understanding of Impersonation Risks


Moez Krichen, Mariam Lahami and Qasem Abu Al-Haija

Formal Methods for the Verification of Smart Contracts: A Review


Thiago Figueiredo Costa and Mateus Felipe Tymburibá

Challenges on Prioritizing Software Patching

SINCONF 2022 > Saturday, 12th of November


Day Opening Remarks

08:30 - 09:00

Keynote speech 3 : Cyber Security Threat Landscape in the Context of Industry 4.0 Keynote Keynote Speaker: Haider Abbas, NCSAEL, USA

09:00 - 09:40

Keynote speech 4: Introducing Homomorphic Encryption in Blockchain-enabled Applications

Keynote Speaker: Mohamed Hamdi, University of Carthage, Tunisia


Session 2: Blockchain

Session chair: Pr.Mohamed Hamdi


Bessem Zaabar, Omar Cheikhrouhou and Mohamed Abid

Intrusion Detecion System for IoMT through Blockchain-based Federated Learning


Murshedul Arifeen and Andrei Petrovski. 

Topology for Preserving Feature Correlation in Tabular Synthetic Data

10:20 - 10:45

Coffee Break


Session 3: Security Systems

Session chair: Habib Youssef


Dmitriy Levonevskiy, Anna Motienko and Mikhail Vinogradov.

Approach to Physical Access Management, Control and Analytics Using Multimodal and Heterogeneous Data


Abdelhamid Saighi and Salim Chitroub. 

Robust Grayscale Image Watermarking Approach using DCT and DWT


Elías Grande

Social Behaviour Identification relying on Device Fingerprint Analysis


Cristian Chindrus and Constantin F. Caruntu

Development and Testing of a Core System for Red and Blue Scenario in Cyber Security Incidents


Mariem Turki, Bouthaina Dammak and Rawya Mars

A Private Smart Parking Solution based on Blockchain and AI


Mays A. Hamdan, Amel Meddeb Maklouf and Hassene Mnif

Review of Authentication with Privacy-Preserving Schemes for 5G-enabled Vehicular Networks

12:45 - 14:15

Lunch Break

14:15 - 14:45

Keynote speech 5:  Scaling Blockchains

Keynote Speaker: Abdelhakim Senhaji Hafidh, University of Montreal, Canada


Session 4: machine learning for Security

Session chair: Prof. Dmitriy Levonevskiy


Ines Jemal, Mohamed Amine Haddar, Omar Cheikhrouhou and Adel Mahfoudhi.

SWAF: A Smart Web Application Firewall Based on Convolutional Neural Network


Amina Sahbi, Faouzi Jaidi and Adel Bouhoula

Artificial Intelligence for SDN Security: Analysis, Challenges


Ciprian-Alin Simion, Gheorghe Balan and Dragos Gavrilut

Improving Detection of Malicious Samples by using State-of-the-Art Adversarial Machine Learning Algorithms


Ratun Rahman, Md Rafid Islam and Akib Ahmed.

A Study of Permission-based Malware Detection Using Machine Learning

16:05- 16:30

Coffee Break


Session 5: Short papers

Session chair: Dr. Elías Grande


Sabrine Bhiri, Kais Loukil, Faten Chaabane and Tarek Frikha

Blockchain Application for Parking Management


Hedi Choura, Faten Chaabane, Mouna Baklouti and Tarek Frikha

Blockchain for IoT-Based Healthcare using Secure and Privacy-Preserving Watermark


Héla Makina, Asma Ben Letaifa and Abderrezak Rachedi

Leveraging Edge Computing, Blockchain and IPFS for Addressing eHealth Records Challenges


Lotfi Ezzeddini, Jalel Ktari, Iheb Zouaoui, Amira Talha, Nizar Jarray and Tarek Frikha.

Blockchain for the Electronic Voting System :a Case study : Student Representative Vote in Tunisian Institute


Ahmed Abadulla Ashlam, Atta Badii, Frederick Stahl

Multi-Phase Algorithmic Framework to Prevent SQL Injection Attacks using Improved Machine Learning and Deep Learning to Enhance Database Security in Real-Time


Omar Cheikhrouhou, Ouissem Ben Fredj, Nesrine Atitallah and Salem Hellal

Intrusion Detection in Industrial IoT


Mehdi Houichi, Faouzi Jaidi and Adel Bouhoula. 

Analysis of Smart Cities Security: Challenges and Advancements


Siegfried Hollerer, Marta Chabrova, Thilo Sauter and Wolfgang Kastner

Combined Modeling Techniques for Safety and Security in Industrial Automation: A Case Study


Mays Jabbar and Hafedh Trabelsi.

 A Betweenness Centrality Based Clustering in VANETs

SINCONF 2022 > Sunday, 13th of November

09:00 - 10:00

Keynote speech 6: Cybersecurity of connected Vehicules

Keynote Speaker: Mohamed Mosbah, Polytechnic Institute of Bordeaux


Session 6: Security Systems

Session chair: Mohamed Mosbah


Liudmila Babenko and Ilya Rusalovsky

Homomorphic Operations on Integers via Operations on Bits


Silviu-Constantin Vițel, Marilena Lupașcu, Dragoș Teodor Gavriluț and Henri Luchian

Evolution of Macro VBA Obfuscation Techniques


Sondes Ksibi, Faouzi Jaidi and Adel Bouhoula.

A User-Centric Fuzzy AHP-based Method for Medical Devices Security Assessment


Coffee Break

11:30-12 :00

Closing Ceremony

12:00 -13 :00

Room Check-out and Lunch Break

13 :00-

Cultural activities


Honorary Chair

  • Adel BOUHOULA , Arabian Gulf University and Tunisian Society for Digital Security

Conference Chair

  • Omar Cheikhrouhou, ISIMA,Tunisia.

Conference Co-Chairs

  • Mohamed Abid, CES-Lab, Tunisia.
  • Atilla Elçi, Hasan Kalyoncu University, Turkey
  • Naghmeh Moradpoor, Edinburgh Napier University, United Kingdom
  • Berna Ors Yalcin, Istanbul Technical University, Turkey
  • Oleg Makarevich, Ludmila Babenko, Southern Federal University, Russia
  • Theodoros Spyridopoulos, Cardiff University, Wales
  • Manoj S. Gaur, MNIT, India
  • Rajveer S. Shekhawat, MUJ, India
  • Jaideep Vaidya, Rutgers University, USA
  • Mehmet Orgun, Macquarie University, Australia

Program Chair

  • Habib Youssef, ISITCom, Tunisia

Program Co-Chairs

  • Kais Loukil, ESC, Tunisia
  • Olfa Gaddour, CES Lab, Tunisia
  • Andrei Petrovski, Robert Gordon University, United Kingdom
  • Alexander Chefranov, Eastern Mediterranean University, TRNC
  • Maxim Anikeev, Fraunhofer Institute for Secure Information Technology, Germany
  • Philipp Reinecke, Cardiff University, United Kingdom
  • Hossain Shahriar, Kennesaw State University, USA
  • Vijay Laxmi, MNIT, India
  • Behnam Rahnama, Medis Inc., Iran
  • Josef Pieprzyk,CSIRO, Australia, and Polish Academy of Sceiences, Poland

Promotion Chair

  • Wassim Jmal, IEEE Tunisia CRFID Chapter.

Promotion Co-Chairs

  • Habib M. Kammoun, IEEE Tunisia Section.
  • Oussema Fitouri, IEEE Tunisia Computer Chapter.
  • Xavier Bellekens, Strathclyde University, Scotland
  • Şerif Bahtiyar, Istanbul Technical University
  • Tahir Sandıkkaya, Istanbul Technical University, Turkey
  • Rajan Shankaran, Macquarie University, Australia
  • Manoj Kumar Bohra, Manipal University Jaipur, India
  • Benjamin NGUYEN, INSA/LIFO CVL, France.
  • Chekib GHORBEL. ENICarthage, Tunisia.

Publication Chair

  • Mouna Baklouti, ENIS, Tunisia.

Local Arrangement Chair

  • Walid Hassairi, ISIMA, Tunisia.

Keynote Talks

Prof. Mohamed Mosbah

Prof. Dr. Haider Abbas

Dr. Abdelouahid Derhab

Abdelhakim Senhaji Hafid

Prof. Erol Gelenbe

Prof. Mohamed Hamdi

Advisory Committee Members

  • Imed Romdhani , Edinburgh Napier University, UK.
  • Anis Koubaa, Prince Sultan University, KSA.
  • Faouzi Zarai, ENET’Com, Tunisia.
  • Bart Preneel, Katholieke Universiteit Leuven, Belgium
  • Bülent Örencik, Beykent University, Turkey
  • Cetin Kaya Koc, University of California Santa Barbara, USA
  • Edward Dawson, Queensland University of Technology, Australia
  • Elisa Bertino, Purdue University, USA
  • N. Balakrishnan, IISc Bangalore, India
  • Willy Susilo, University of Wollongong, Australia
  • Alexander Shelupanov, Tomsk State University for Control Systems and Radio Electronics, Russia

E-presence, Website and Informatics Support

  • Sepideh Sadeghpour, Medis Inc., Iran
  • Mojtaba Hosseini, Medis Inc., Iran

Past Events & Special issues

Previous SIN Conf events and their proceedings (see below for special issues and books):