Schedule 7 (New)

November 10, 2021 : Day - 01
08:00 - 09:00

Registration

  • Conference Hall

09:00 - 10:00

Official Opening Session

  • Conference Hall

10:00 - 10:45

Behavioural intelligence of artificial creatures

  • Prof. Yves Duthen  
  • Conference Hall

11:15 - 12:00

Deep Leaning Techniques for Threat Intelligence

  • Prof. Mamoun Alazab  
  • Conference Hall

12:00 - 12:45

Recognizing FDIA as a Critical Issue in the Field of Cybersecurity

  • Prof. Al-Sakib Khan Pathan  
  • Conference Hall

The field of cybersecurity often focuses on only technical aspects of cyber activities, connections, protecting codes from specific violations, and regulating operational methods of various cyber applications. While this is important to give enough emphasis on the technical aspects, the importance of the presence of error-free data in the cyber platform cannot be overlooked. The False Data Injection Attack or FDIA concept basically came from the smart grid domain which refers to the manipulation of sensor readings. However, due to the enormous growth of the Internet, a similar issue has come to the view as data could be often provided in manipulated form to be used for cyberspace or cyber applications as well. FDIA specifically considers the deliberate attempts of modifying data from various readings of source sensors and devices or in the databases which could have long lasting impact even if the datasets are used later for any practical application. In this case, we are not talking about cyber-attack based data manipulation issue but rather about deliberate modification of data that would apparently look like valid before their practical use. In this talk, we would explore this issue, talk about various aspects to tackle FDIA in the cyberspace, and share the basic idea behind some countermeasures. The focus of the talk is about protection of data in the cyberspace before application-specific use (i.e., preventing FDI), not how to defend against sophisticated cyber-attacks that are launched via complicated technical means. Some recent and relevant works in this area would be discussed.

13:00 - 14:30
14:30 - 17:00
14:30 - 17:00
November 11, 2021 : Day - 02
09:00 - 09:45

Artificial Intelligence in Cloud Computing and Internet-of-Things

  • Prof. Vincenzo Piuri  
  • Conference Hall

Recent years have seen a growing interest among users in the migration of their applications to Cloud computing and Internet-of-Things environments. However, due to high complexity, Cloud-based and Internet-of-Things infrastructures need advanced components for supporting applications and advanced management techniques for increasing the efficiency. Adaptivity and autonomous learning abilities become extremely useful to support configuration and dynamic adaptation of these infrastructures to the changing needs of the users as well as to create adaptable applications. This self-adaptation ability is increasingly essential especially for non expert managers as well as for application designers and developers with limited competences in tools for achieving this ability. Artificial intelligence is a set of techniques which greatly can improve both the creation of applications and the management of these infrastructures. This talk will discuss the use of artificial intelligence in supporting the creation of applications in cloud and IoT infrastructures as well as their use in the various aspects of infrastructure management.

09:45 - 10:30

Resource Allocation and Scheduling Real-Time Applications in Cloud and Fog Architecture: Trends and Challenges

  • Prof. Helen Karatza  
  • Conference Hall

Cloud computing plays an ever-increasing role recently in various sectors including academia and business. It has been widely recognized that resource allocation and application scheduling are important aspects of cloud computing. Due to the rapid growth of Internet of Things (IoT) applications, fog computing has emerged as a computing paradigm used to solve constrains in cloud computing related to network congestion and transmission latency, thus providing additional functionality in IoT. Most of the IoT applications are time-sensitive, so the constraint of meeting deadlines is mandatory. On the other hand, the processing capacity of the fog resources is usually limited. Consequently, appropriate management of real-time applications is required for effective use of cloud and fog resources. In this keynote we will discuss novel techniques to address challenges in resource allocation and scheduling in cloud and fog computing infrastructures. Additionally, we will identify and provide future research directions in the cloud and fog computing research areas.

11:15 - 12:00

IoT and Fog Computing: Challenges and applications

  • Prof. Imed Romdhani  
  • Conference Hall

12:00 - 12:45

To be Defined

  • Prof. Philippe Roose  
  • Conference Hall

13:00 - 14:30
14:30 - 17:00
14:30 - 17:00
14:30 - 17:00
17:00 - 17:30

Closing Ceremony

  • Conference Hall

X
%d bloggers like this: