Lectures
- Introductory Lecture 1 (15.February):
- Introductory Lecture 2 (22.February):
- Slides
- Procedures for performing systematic reviews
- Example 1: Levasseur O., Iqbal M., Matulevičius R.: Survey of Model-Driven Engineering Techniques for Blockchain-Based Applications. Proceedings of the Forum at Practice of Enterprise Modeling 2021 (PoEM-Forum 2021)
- Example 2: Ganji D., Kalloniatis C., Mouratidis H., Gheytassi S. M. (2019): Approaches to Develop and Implement ISO/IEC 27001 Standard - Information Security Management Systems: A Systematic Literature Review, International Journal on Advances in Software, vol 12, No 3&4, 2019
- Example 3: Mellado, D., Blanco, C., Sánchez, L.E., Fernández-Medina, E.: A systematic review of security requirements engineering. Comput. Stand. Interf. 32, 153–165 (2010)
- Introductory Lecture 3 (29.February):
- Seminar 1 (18.April)
Time | Author | Topic | Presentation |
10:15-10:35 | Marco Fontana | Balancing act: the economic dynamics of cybersecurity implementation and returns | presentation |
10:35-10:55 | Julia Zhong | Developing Educational Cybersecurity Tool For Primary School Children | presentation |
10:55-11:15 | Luka Kerin | Cognitive warfare in information environment | presentation |
11:15-11:35 | Hua Zhong | Image-based deep learning solution for Detecting Phishing/Spam Emails | presentation |
11:35-11:55 | Thomas Fankhauser | Developing a low-cost anti-tailgating solution | presentation |
- Seminar 2 (25.April)
Time | Author | Topic | Presentation |
10:15-10:35 | Martin Kilgi | Using Large Language Models For Secure Code Review | presentation |
10:35-10:55 | Jaan Erik Lepp | Web application's UI impact on end-users data protection | presentation |
10:55-11:15 | Oliver Vanamets | Container Vulnerability Scanning in TEHIK | presentation |
11:15-11:35 | Mihhail Karagjaur | Threat modelling of a large language model-based artificial intelligence system | presentation |
11:35-11:55 | Zaza Gogia | Planning Cyberspace Operations. Implementing automatic/semi-automatic own and adversary asserts input to the operational area | presentation |
- Seminar 3 (2.May)
Time | Author | Topic | Presentation |
10:15-10:35 | Gustav Gretskov | Extracting investigation-ready cellular data from a jailbroken handset | presentation |
10:35-10:55 | Britta Sillaots | Convergence of hospital and consumer wearables, their legal aspects and whether 5G offers a solution | presentation |
10:55-11:15 | Julia Grosschmid | Addressing maritime workforce cybersecurity skills development | presentation |
11:15-11:35 | Csaba Virág | Cybersecurity challenges in the space domain | presentation |
- Seminar 4 (9.May)
Time | Author | Topic | Presentation |
10:15-10:35 | Maxel Ochoa | Automated Threat Detection and Alert Thresholds in Cyber Operations: Leveraging Machine Learning for Parsing Company Documents and Managing Information Overload | presentation |
10:35-10:55 | Keisuke Konno | Large Language Models for NMEA Protocol Fuzzing | presentation |
10:55-11:15 | Dennis Bykov | Cybersecurity Policy and Governance: Evaluating Effectiveness and Enhancing Resilience | presentation |
11:15-11:35 | Andrei Aleksejev | Blockchain-enabled digital twins as intrusion detection systems | presentation |
- Seminar 5 (16.May)
Time | Author | Topic | Presentation |
10:15-10:35 | Roman Malõšev | Static analysis to prevent memory corruption attacks | presentation |
10:35-10:55 | Timofei Mihhailov | Development of Cybersecurity Learning Material for Future and Current K-12 Teachers in Ida-Virumaa | presentation |
10:55-11:15 | Daniel Golubkov | Secure Identity and Access Management Best Practices | presentation |
11:15-11:35 | Haider Rehman | Machine Learning-based anomaly detection for maritime systems | presentation |
11:35-11:55 | Karl Rikkonen | Developing an Automated, Adaptive Purple Teaming Framework Utilizing Atomic Red Team Tactics | presentation |
- Seminar 6 (23.May)
Time | Author | Topic | Presentation |
10:15-10:35 | Ali Atakan Basaran | Using multi-modal large language models for Javascript classification | presentation |
10:35-10:55 | Johan Mattias Juul | Developing Machine Learning for Enhanced GNSS Defense Mechanisms in Military Operations | presentation |
10:55-11:15 | Daniel Allan Chapkovski | Developments in the Efficiency of Secure Multi-Party Computation Schemes | presentation |