Accepted Paper (2nd)

Title

Authors

POSTER: A Cyberspace Study of the Russia-Ukraine War

Gursimran Singh (Rochester Institute of Technology, USA), H. B. Acharya (Rochester Institute of Technology, USA)

POSTER: ML-Compass: A Comprehensive Assessment Framework for Machine Learning Models

Zhibo Jin (The University of Sydney and CSIRO’s Data61, Australia), Zhiyu Zhu (The University of Sydney and CSIRO’s Data61, Australia), Hongsheng Hu (CSIRO’s Data61, Australia), Minhui Xue (CSIRO’s Data61, Australia), Huaming Chen (The University of Sydney, Australia)

POSTER: A Semi-Asynchronous Federated Intrusion Detection Framework for Power Systems

Muhammad Akbar Husnoo (Centre for Cyber Resilience and Trust (CREST) and Deakin University, Australia), Adnan Anwar (Centre for Cyber Resilience and Trust (CREST) and Deakin University, Australia), Haftu Tasew Reda (Centre for Cyber Resilience and Trust (CREST) and Deakin University, Australia), Nasser Hosseinzadeh (Centre for Smart Power and Energy Research (CSPER) and Deakin University, Australia)

POSTER: Toward Intelligent Cyber Attacks for Moving Target Defense Techniques in Software-Defined Networking

Tina Moghaddam (The University of Queensland, Australia) , Guowei Yang (The University of Queensland, Australia), Chandra Thapa (CSIRO’s Data61, Australia), Seyit Camtepe (CSIRO’s Data61, Australia), Dan Dongseong Kim (The University of Queensland, Australia)

POSTER: A Common Framework for Resilient and Safe Cyber-Physical System Design

Luyao Niu (University of Washington, USA), Abdullah Al Maruf  (University of Washington, USA), Andrew Clark (Washington University in St. Louis, USA), J. Sukarno Mertoguno (Georgia Institute of Technology, USA), Radha Poovendran (University of Washington, USA)

POSTER: Performance Characterization of Binarized Neural Networks in Traffic Fingerprinting

Yiyan Wang (The University of Sydney, Australia), Thilini Dahanayaka (The University of Sydney, Australia), Guillaume Jourjon (CSIRO’s Data61, Australia), Suranga Seneviratne (The University of Sydney, Australia)

POSTER: On Searching Information Leakage of Python Model Execution to Detect Adversarial Examples

Cheng-Yao Guo (National Chengchi University, Taiwan), Fang Yu (National Chengchi University, Taiwan)

POSTER: A Teacher-Student with Human Feedback Model for Human-AI Collaboration in Cybersecurity

Abdullahi Chowdhury (The University of Adelaide, Australia), Debi Ashenden (The University of Adelaide, Australia), Ganna Pogrebna (The University of Sydney, Australia), Hung Nguyen (The University of Adelaide, Australia)

POSTER: Security Logs Graph Analytics for Industry Network System

Qiaoran Meng (National University of Singapore, Singapore), Nay Oo (NCS Cyber Special Ops-R&D, Singapore), Hoon Wei Lim (NCS Cyber Special Ops-R&D, Singapore), Biplab Sikdar (National University of Singapore, Singapore)

POSTER: Leveraging eBPF to Enhance Sandboxing of WebAssembly Runtimes

Marco Abbadini (Università degli Studi di Bergamo, Italy), Michele Beretta (Università degli Studi di Bergamo, Italy), Dario Facchinetti Gianluca Oldani (Università degli Studi di Bergamo, Italy), Matthew Rossi (Università degli Studi di Bergamo, Italy), Stefano Paraboschi (Università degli Studi di Bergamo, Italy)