Conveners
Security & Resilience in Cyber-Physical Systems
- Lilia Sava (Technical University of Moldova)
-
Ebru Resul18/09/2025, 15:00Doctoral SymposiumPaper presentation
Cyber Threat Intelligence (CTI) Reports are valuable sources of information for understanding adversarial behaviors and malware functionalities. But their lack of consistency and structure can represent a challenge for security analysts in interpreting, correlating, and applying them effectively. Structuring the data in a common format, such as the MITRE ATT&CK framework, is crucial for...
Go to contribution page -
Matei Madalin (University Alexandru Ioan Cuza, Faculty of Computer Science)18/09/2025, 15:15Social Aspects of Networking Environment TodayPaper presentation
Accessible public transportation remains a significant challenge for visually impaired individuals, largely due to the unreliability of conventional positioning systems like GPS in complex urban and indoor environments. This paper introduces a novel system designed to enhance the independence and safety of visually impaired users navigating public transportation facilities and vehicles. Our...
Go to contribution page -
Razvan Bogdan (Universitatea Politehnica din Timisoara)18/09/2025, 15:30Networking in Education and ResearchPaper presentation
This paper presents NeuroReact, a multi-sensory system in the field of NeuroKinetics (a term we use to describe the study of neurological responses to motion-based stimuli), designed to evaluate and support neurocognitive reactions to specific stimuli (audio, visual, tactile) using embedded hardware and gamified interaction. The experimental scenarios were adapted for different recovery games,...
Go to contribution page -
Andrei-Florian Ciorgan (UPB)18/09/2025, 15:45Security & Resilience in Cyber-Physical SystemsPaper presentation
This paper introduces a unified testbed for evaluating the security of modern automotive networks through the integration of the CARLA driving simulator with a physical platform based on the open-source Toyota PASTA architecture. The proposed simulation environment facilitates realistic generation, manipulation, and visualization of Controller Area Network (CAN) traffic, including packet...
Go to contribution page -
Teodor-Ștefan Duțu (National Unviersity of Science and Technology Politehnica Bucharest)18/09/2025, 16:00Security & Resilience in Cyber-Physical SystemsPaper presentation
Mobile devices have become ubiquitous, with Apple owning more than 25% of the market. One method by which iOS ensures the security of its apps is through sandboxing. This mechanism is implemented as a set of rules compiled into binary files that lie inside the OS firmware that isolate applications within controlled environments to prevent unauthorized operations. The contents of these profiles...
Go to contribution page -
Mr Alexandru Chis ("Transilvania" University of Brasov)18/09/2025, 16:15Networking in Education and ResearchPaper presentation
This paper proposes an integrated behavioral analytics framework that leverages the usage of a centralized SIEM, edge AI processing, and automation to enable adaptive, real-time detection and response.
Go to contribution page
By collecting diverse behavioral data: API calls of applications, system commands, authentication attempts, and web request patterns, using Wazuh agents from mixed environments, the system... -
Mr Cornel Argint, Mr Cristian Nistor, Mr Daniel Abotezătoaei18/09/2025, 16:30Security & Resilience in Cyber-Physical SystemsPaper presentation
Abstract—The increasing complexity and scale of cyber threats demand optimized and reproducible testing environments for security evaluations. This paper proposes a set of best practices for configuring and monitoring such environments to ensure effective and realistic vulnerability scans, penetration tests, and compliance audits. Key contributions include the use of Infrastructure as Code...
Go to contribution page