Presentations
Detail lecture for week |
Weekly |
Title |
Presenter |
1st |
Orientation |
Professor |
A Survey on Metaverse: Fundamentals, Security, and Privacy (1) |
Sushil |
2nd |
A Survey on Metaverse: Fundamentals, Security, and Privacy (2) |
Mikail |
A Survey on Metaverse: Fundamentals, Security, and Privacy (3) |
Abir |
3rd |
A survey on ransomware: Evolution, taxonomy, and defense solutions (1) |
Jeremiah |
A survey on ransomware: Evolution, taxonomy, and defense solutions (2) |
Oscar |
Machine Learning–based Cyber Attacks Targeting on Controlled Information: A Survey |
Sangthong |
Machine Learning–based Cyber Attacks Targeting on Controlled Information: A Survey |
Oscar |
4th |
Deep learning for insider threat detection Review, challenges and opportunities |
박희재 |
Machine learning security attacks and defense approaches for emerging cyber physical applications: A comprehensive survey |
Mikail |
A survey on data-driven network intrusion detection (1) |
Bhagyashree |
A survey on data-driven network intrusion detection (2) |
진호천 |
5th |
A Survey on Cross-Architectural IoT Malware Threat Hunting (1) |
Jeremiah |
A Survey on Cross-Architectural IoT Malware Threat Hunting (2) |
Abir |
Block hunter: Federated learning for cyber threat hunting in blockchain-based iiot networks |
Sangthong |
6th |
Utilizing Cyber Threat Hunting Techniques to Find Ransomware Attacks: A Survey of the State of the Art |
Oscar |
Collective intelligence: Decentralized learning for Android malware detection in IoT with blockchain |
진호천 |
The Anonymity of the Dark Web: A Survey (1) |
Abir |
The Anonymity of the Dark Web: A Survey (2) |
Bhagyashree |
7th |
Internet of things applications, security challenges, attacks, intrusion detection, and future visions: A systematic review (1) |
Sushil |
Internet of things applications, security challenges, attacks, intrusion detection, and future visions: A systematic review (2) |
박희재 |
Federated Threat-Hunting Approach for Microservice-Based Industrial Cyber-Physical System |
Bhagyashree |
8th |
Middle Term |
|
9th |
Digital Twin: A Comprehensive Survey of Security Threats (1) |
Jeremiah |
Digital Twin: A Comprehensive Survey of Security Threats (2) |
Oscar |
Characterising the Digital Twin: A systematic literature review |
Bhagyashree |
10th |
Reducing Offloading Latency for Digital Twin Edge Networks in 6G |
박희재 |
A Digital Twin Based Industrial Automation and Control System Security Architecture |
진호천 |
11th |
Deep Learning for Hybrid 5G Services in Mobile Edge Computing Systems: Learn From a Digital Twin |
박희재 |
Digital Twin Analysis to Promote Safety and Security in Autonomous Vehicles |
Sangthong |
12th |
Towards Aircraft Maintenance Metaverse Using Speech Interactions with Virtual Objects in Mixed Reality |
Oscar |
The Sociel Metaverse: Battle for Privacy |
Abir |
13th |
Edge Intelligence-Based Ultra-Reliable and Low-Latency Communications for Digital Twin-Enabled Metaverse |
Sangthong |
Big data analysis of the Internet of Things in the digital twins of smart city based on deep learning |
Mikail |
14th |
EtherTwin: Blockchain-based Secure Digital Twin
Information Management (1) |
Sushil |
EtherTwin: Blockchain-based Secure Digital Twin
Information Management (2) |
Abir |
15th |
Group Paper Presentation |
|