Resit (14.June, 2024) schedule
Time | Author | Topic | Presentation |
10:00-10:20 | Johan Valdemar Leoste | Developing a Digital Twin for Enhanced Predictive Analysis of Social Media Information Operations | |
10:20-10:40 | Fanny Lamp | A Comparative Analysis of the AI Act and Cybersecurity Frameworks | |
10:40-11:00 | Rashad Gafarli | Cybersecurity Training Effectiveness: Assessing Long-Term Retention and Behavior Change | |
11:00-11:20 | Mert Meiessaar | Dark Web Market of Compromised Estonian Machines | |
11:20-11:40 | break | break | break |
11:40-12:00 | Esa Markus Jalmari Kontio | Android malware interfering with system modules: extracting Mobile-ID codes | |
12:00-12:20 | Mihkel Jõgeda | Analyzing the Effectiveness of Social Engineering Training Program in Preventing Cyber Attacks | |
12:20-12:40 | Allar Lauk | Threat Intelligence Sharing for Cybersecurity of Internet of Vehicles Using Blockchain and AI | |
12:40-13:00 | Argo Käsper | A Comprehensive Evaluation Framework for Assessing the Quality and Security of AI-Generated Code | |
13:00-13:20 | break | break | break |
13:40-14:00 | Elif Mihrisah Can | Cybersecurity Requirements and Challenges in Space | |
14:00-14:20 | Grete Ohak | The Vulnerability Spectrum: Identifying and Mitigating Cybersecurity Risks in Smart Meter Infrastructure | |
14:20-14:40 | Rabindranath Sundaram Kuus | Using the image processing abilities of large language models to detect phishing emails |