Session 5: Short Papers II

10:00-10:20 – Towards Attacker Attribution for Risk Analysis. By Elena Doynikova, Evgenia Novikova, Diana Gaifulina and Igor Kotenko (St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences, Rusia) 

10:20-10:40 – Modelling and Verification of Safety of Access Control in SCADA Systems. By Inna Vistbakka and Elena Troubitsyna (Åbo Akademi University, Finland & KTH, Sweden)

10:40-11:00 – Security Assessment and Hardening of Autonomous Vehicles. By Samir Ouchani and Abdelaziz Khaled (CESI eXia, France)  

11:00 – 11:30

BREAK

11:30 – 13:00

Session 6: Risk Analysis, Neural Networks & Web Protection

11:30-12:00 – Modelling Security Risk Scenarios using Subjective Attack Trees. By Nasser Al-Hadhrami, Matthew Collinson and Nir Oren (University of Aberdeen, UK)

12:00-12:30 – Premium Access to Convolutional Neural Networks. By Julien Bringer, Herve Chabanne and Linda Guiga (Kallistech, IDEMIA and Télécom Paris, France)

12:30-13:00 – An OWASP Top Ten Driven Survey for Web Application Protection Methods. By O. Ben Fredj, O. Cheikhrouhou, M. Krichen, H. Hamam, A. Derhab (ENIS, Tunisia; Imam University, Saudi Arabia; University of Moncton, Canada; King Saud University, Saudi Arabia)