Program Agenda
TIMES LISTED ARE CDT
PROGRAM AGENDA | ||||
MONDAY, APRIL 4 | ||||
1200 - 1700 |
Check out the virtual platforms and test your settings |
|||
TUESDAY, APRIL 5 | ||||
0930 - 1000 |
Networking, log into the platform and chat with other attendees |
|||
SESSION 1 | ||||
1000 - 1015 |
Welcome and Opening Remarks |
|||
1015 - 1115 |
KEYNOTE PRESENTATION |
|||
1115 - 1135 |
BREAK |
|||
SESSION 2 | ||||
1135 - 1305 |
Works-in-Progress Session (45 minute discussions) Phishing |
|||
![]() |
||||
1305 - 1405 |
LUNCH & NETWORKING |
|||
SESSION 3 | ||||
1405 - 1500 |
Works-Already-Published Session (20 minute talks + 5 minutes Q&A) |
|||
1500 - 1515 |
BREAK |
|||
1515 - 1610 |
Works-Already-Published Session (20 minute talks + 5 minutes Q&A) Consent as a Foundation for Responsible Autonomy Verified Cryptographic Code for Everybody |
|||
![]() |
||||
1610 - 1640 |
NETWORKING |
|||
WEDNESDAY, APRIL 6 | ||||
0930 - 1000 |
Networking, log into the platform and chat with other attendees |
|||
SESSION 4 | ||||
1000 - 1100 |
KEYNOTE PRESENTATION |
|||
1100 - 1120 |
BREAK |
|||
SESSION 5 | ||||
1120 - 1250 |
Works-in-Progress Session (45 minute discussions) Verification of Cyber Emulation Experiments Cybersecurity Incident Response |
|||
![]() |
||||
1250 - 1350 |
LUNCH & NETWORKING |
|||
SESSION 6 | ||||
1350 - 1420 |
NSA Best Cybersecurity Paper Competition Honorable Mention: |
|||
1420 - 1430 |
BREAK |
|||
1430 - 1615 |
Works-Already-Published Session (20 minute talks + 5 minutes Q&A) Evaluating Mail-Based Security for Electoral Processes Using Attack Trees MLEFlow: Learning from History to Improve Load Balancing in Tor FAIXID: A Framework for Enhancing AI Explainability of Intrusion Detection Results Using Data Cleaning Techniques |
|||
SESSION 7 | ||||
1615 - 1715 |
Posters & Demos (the poster and demo session will take place on Gather) |
|||
THURSDAY, APRIL 7 | ||||
0930 - 1000 |
Networking, log into the platform and chat with other attendees |
|||
SESSION 8 | ||||
1000 - 1100 |
KEYNOTE PRESENTATION |
|||
1100 - 1130 |
NSA Best Cybersecurity Paper Competition Winner: |
|||
1130 - 1150 |
.BREAK |
|||
SESSION 9 | ||||
1150 - 1320 |
Works-in-Progress Session (45 minute discussions) Detecting Malicious Agents |
|||
![]() |
||||
1320 - 1420 |
LUNCH & NETWORKING |
|||
SESSION 10 | ||||
1420 - 1540 |
Works-Already-Published Session (20 minute talks + 5 minutes Q&A) Empirical Study of PLC Authentication Protocols in Industrial Control Systems Tracing Your Roots: Exploring the TLS Trust Anchor Ecosystem |
|||
1540 - 1555 |
||||
SYMPOSIUM ADJOURNED |
