POSTER: A Cyberspace Study of the Russia-Ukraine War
Gursimran Singh (Rochester Institute of Technology, USA), H. B. Acharya (Rochester Institute of Technology, USA)
POSTER: ML-Compass: A Comprehensive Assessment Framework for Machine Learning Models
Zhibo Jin (The University of Sydney and CSIRO’s Data61, Australia), Zhiyu Zhu (The University of Sydney and CSIRO’s Data61, Australia),Hongsheng Hu (CSIRO’s Data61, Australia),Minhui Xue (CSIRO’s Data61, Australia), Huaming Chen (The University of Sydney, Australia)
POSTER: A Semi-Asynchronous Federated Intrusion Detection Framework for Power Systems
Muhammad Akbar Husnoo (Centre for Cyber Resilience and Trust (CREST) and Deakin University, Australia), Adnan Anwar (Centre for Cyber Resilience and Trust (CREST) and Deakin University, Australia), Haftu Tasew Reda (Centre for Cyber Resilience and Trust (CREST) and Deakin University, Australia), Nasser Hosseinzadeh (Centre for Smart Power and Energy Research (CSPER) and Deakin University, Australia)
POSTER: Toward Intelligent Cyber Attacks for Moving Target Defense Techniques in Software-Defined Networking
Tina Moghaddam (The University of Queensland, Australia) , Guowei Yang (The University of Queensland, Australia), Chandra Thapa (CSIRO’s Data61, Australia), Seyit Camtepe (CSIRO’s Data61, Australia), Dan Dongseong Kim (The University of Queensland, Australia)
POSTER: A Common Framework for Resilient and Safe Cyber-Physical System Design
Luyao Niu (University of Washington, USA), Abdullah Al Maruf (University of Washington, USA), Andrew Clark (Washington University in St. Louis, USA), J. Sukarno Mertoguno (Georgia Institute of Technology, USA), Radha Poovendran (University of Washington, USA)
POSTER: Performance Characterization of Binarized Neural Networks in Traffic Fingerprinting
Yiyan Wang (The University of Sydney, Australia), Thilini Dahanayaka (The University of Sydney, Australia), Guillaume Jourjon (CSIRO’s Data61, Australia), Suranga Seneviratne (The University of Sydney, Australia)
POSTER: On Searching Information Leakage of Python Model Execution to Detect Adversarial Examples
POSTER: A Teacher-Student with Human Feedback Model for Human-AI Collaboration in Cybersecurity
Abdullahi Chowdhury (The University of Adelaide, Australia), Debi Ashenden (The University of Adelaide, Australia), Ganna Pogrebna (The University of Sydney, Australia), Hung Nguyen (The University of Adelaide, Australia)
POSTER: Security Logs Graph Analytics for Industry Network System
Qiaoran Meng (National University of Singapore, Singapore), Nay Oo (NCS Cyber Special Ops-R&D, Singapore), Hoon Wei Lim (NCS Cyber Special Ops-R&D, Singapore), Biplab Sikdar (National University of Singapore, Singapore)
POSTER: Leveraging eBPF to Enhance Sandboxing of WebAssembly Runtimes
Marco Abbadini (Università degli Studi di Bergamo, Italy), Michele Beretta (Università degli Studi di Bergamo, Italy), Dario Facchinetti Gianluca Oldani (Università degli Studi di Bergamo, Italy), Matthew Rossi (Università degli Studi di Bergamo, Italy), Stefano Paraboschi (Università degli Studi di Bergamo, Italy)