| 2022 | 15th International Conference on Security of Information and Networks, SIN 2022, Sousse, Tunisia, November 11-13, 2022 |
| 2022 | A Betweenness Centrality Based Clustering in VANETs. Mays Kareem Jabbar, Hafedh Trabelsi |
| 2022 | A NLP-inspired method to predict multi-step cyberattacks. Ouissem Ben Fredj |
| 2022 | A Private Smart parking solution based on Blockchain and AI. Mariem Turki, Bouthaina Damak, Rawya Mars |
| 2022 | A Secure Design Pattern Approach Toward Tackling Lateral-Injection Attacks. Chidera Biringa, Gökhan Kul |
| 2022 | A Study of Permission-based Malware Detection Using Machine Learning. Ratun Rahman, Md. Rafid Islam, Akib Ahmed, Md. Kamrul Hasan, Hasan Mahmud |
| 2022 | A Trust Based DNS System to Prevent Eclipse Attack on Blockchain Networks. Ali Kerem Yildiz, Aykut Atmaca, Ali Özgür Solak, Yekta Can Tursun, Serif Bahtiyar |
| 2022 | A User-Centric Fuzzy AHP-based Method for Medical Devices Security Assessment. Sondes Ksibi, Faouzi Jaïdi, Adel Bouhoula |
| 2022 | Analysis of Smart Cities Security: Challenges and Advancements. Mehdi Houichi, Faouzi Jaïdi, Adel Bouhoula |
| 2022 | Approach to Physical Access Management, Control and Analytics Using Multimodal and Heterogeneous Data. Dmitriy Levonevskiy, Anna I. Motienko, Mikhail Vinogradov |
| 2022 | Artificial Intelligence for SDN Security: Analysis, Challenges and Approach Proposal. Amina Sahbi, Faouzi Jaïdi, Adel Bouhoula |
| 2022 | Blockchain Application for Parking Management. Sabrine Bhiri, Kais Loukil, Faten Chaabane, Tarek Frikha |
| 2022 | Blockchain for IoT-Based Healthcare using secure and privacy-preserving watermark. Hedi Choura, Faten Chaabane, Mouna Baklouti, Tarek Frikha |
| 2022 | Blockchain for the electronic voting system: case study: student representative vote in Tunisian institute. Lotfi Ezzeddini, Jalel Ktari, Iheb Zouaoui, Amira Talha, Nizar Jarray, Tarek Frikha |
| 2022 | Challenges on prioritizing software patching. Thiago Figueiredo Costa, Mateus Tymburibá |
| 2022 | Combined Modeling Techniques for Safety and Security in Industrial Automation: A Case Study. Siegfried Hollerer, Marta Chabrová, Thilo Sauter, Wolfgang Kastner |
| 2022 | Development and Testing of a Core System for Red and Blue Scenario in Cyber Security Incidents. Amelia Chindrus, Constantin Florin Caruntu |
| 2022 | Evolution of macro VBA obfuscation techniques. Silviu Constantin Vitel, Marilena Lupascu, Dragos Teodor Gavrilut, Henri Luchian |
| 2022 | Formal Methods for the Verification of Smart Contracts: A Review. Moez Krichen, Mariam Lahami, Qasem Abu Al-Haija |
| 2022 | Homomorphic operations on integers via operations on bits. Liudmila Babenko, Ilya Rusalovsky |
| 2022 | Improving detection of malicious samples by using state-of-the-art adversarial machine learning algorithms. Ciprian-Alin Simion, Gheorghe Balan, Dragos Teodor Gavrilut |
| 2022 | Intrusion Detection System for IoMT through Blockchain-based Federated Learning. Bessem Zaabar, Omar Cheikhrouhou, Mohamed Abid |
| 2022 | Intrusion Detection in Industrial IoT. Omar Cheikhrouhou, Ouissem Ben Fredj, Nesrine Atitallah, Salem Hellal |
| 2022 | Keynote Speaker 1: Random Neural Networks Optimise QoS, Security and Energy Consumption. Erol Gelenbe |
| 2022 | Keynote Speaker 2: Cybersecurity of connected Vehicules. Mohamed Mosbah |
| 2022 | Keynote Speaker 3: Scaling Blockchains. Abdelhakim Senhaji Hafidh |
| 2022 | Keynote Speaker 4: Introducing Homomorphic Encryption in Blockchain-enabled Applications. Mohamed Hamdi |
| 2022 | Keynote Speaker 5: Cyber Security Threat Landscape in the Context of Industry 4.0. Haider Abbas |
| 2022 | Keynote Speaker 6: Intrusion detection systems using machine learning for the security of autonomous vehicles. Abdelouahid Derhab |
| 2022 | Leveraging Edge Computing, Blockchain and IPFS for Addressing eHealth Records Challenges. Hela Makina, Asma Ben Letaifa, Abderazek Rachedi |
| 2022 | Multi-Phase Algorithmic Framework to Prevent SQL Injection Attacks using Improved Machine learning and Deep learning to Enhance Database security in Real-time. Ahmed Abadulla Ashlam, Atta Badii, Frederic T. Stahl |
| 2022 | Preface. Omar Cheikhrouhou, Atilla Elçi |
| 2022 | Review of Authentication with Privacy-preserving Schemes for 5G-enabled Vehicular Networks. Mays A. Hamdan, Amel Meddeb-Makhlouf, Hassene Mnif |
| 2022 | Robust grayscale image watermarking approach using DCT and DWT. Abdelhamid Saighi, Salim Chitroub |
| 2022 | SWAF: A Smart Web Application Firewall Based on Convolutional Neural Network. Ines Jemal, Mohamed Amine Haddar, Omar Cheikhrouhou, Adel Mahfoudhi |
| 2022 | Social Behaviour Identification relying on Device Fingerprint Analysis. Elías Grande |
| 2022 | Topology for Preserving Feature Correlation in Tabular Synthetic Data. Murshedul Arifeen, Andrei Petrovski |
| 2022 | Towards Comparative Evaluation of DDoS Defences. Andikan Otung, Andrew P. Martin |
| 2022 | Towards a Better Understanding of Impersonation Risks. Anne Bumiller, Olivier Barais, Nicolas Aillery, Gaël Le Lan |