14-15  June 2023

European Interdisciplinary Cybersecurity Conference

University of Stavanger, Kjølv Egelands Hus, Kristine Bonnevies vei 22, Stavanger, Norway
Venue (PDF)

About EICC 2023

The European Interdisciplinary Cybersecurity Conference - EICC 2023 aims at establishing a venue for the exchange of information on cybersecurity and its many aspects between academics and practitioners in Europe. EICC was until 2019 known as the Central European Cybersecurity Conference - CECC and has been rebranded to underscore the interdisciplinarity of the conference and broaden its reach. EICC 2023 encourages the dialogue between computer scientists and researchers in all other fields related to cybersecurity, such as behavioral sciences, sociology, criminology, investigations and law. Interdisciplinary contributions are especially welcome.

EICC 2023 is planned as an in-person conference.

Special Sessions

Complex network analysis for cybersecurity - CNACYS 2023

Child online safety and harms - COSH 2023

Digital Privacy for the Industrial Applications - DP4I 2023


Sokratis Katsikas

AI and Cybersecurity: Friends or foes?

Artificial Intelligence (AI) and Cybersecurity are domains of intense research activity. Developments in them and because of them find their way regularly to the media as well. However, how one domain influences the other is less widely known and has been insufficiently researched.

In this talk we will provide an overview of the current landscape of AI in terms of both defensive and offensive applications in cybersecurity on one hand and of the risks that stem from manipulating and/or attacking AI-enabled systems on the other.

Sokratis K. Katsikas was born in Athens, Greece, in 1960. He is the Director of the Norwegian Centre for Cybersecurity in Critical Sectors and Professor with the Department of Information Security and Communication Technology, Norwegian University of Science and Technology, Norway. He is also Professor Emeritus of the Department of Digital Systems, University of Piraeus, Greece. In 2019 we was awarded a Doctorate Honoris Causa from the Department of Production and Management Engineering, Democritus University of Thrace, Greece. In 2021 he was ranked 7th in the security professionals category of the IFSEC “Global influencers in security and fire” list. He has authored or co-authored more than 300 journal papers, book chapters and conference proceedings papers. He is serving on the editorial board of several scientific journals, he has co-authored/edited 46 books and conference proceedings and has served on/chaired the technical programme committee of more than 870 international scientific conferences. He chairs the Steering Committee of the ESORICS Conference and he is the Editor-in-Chief of the International Journal of Information Security (Springer).

Tor Helleseth

Some works and life stories of Ernst Sejersted Selmer

Ernst Sejersted Selmer (February 1920– November 2006) was a Norwegian mathematician and cryptologist, particularly known for his pioneering research within cryptography that formed the basis of modern crypto machines in NATO and NSA. He designed the algorithm used to calculate the check digits in Norwegian birth numbers. In honor of Prof. Ernst Sejersted Selmer the University of Bergen established the Selmer Center in 2003, which holds a leading position in the field of coding theory and cryptography nationally and internationally. In this talk I will highlight some of his scientific works in Norwegian crypto-history, and introduce some life stories of Ernst Sejersted Selmer

Tor Helleseth received his Dr. Philos. degree in mathematics from the University of Bergen, Norway, in 1979. In 1979-1980 he was a Research fellow at the Eindhoven University of Technology, The Netherlands. From 1981 to 1984 he was at the Chief Headquarters of Defense in Norway. Since 1984 he has been a Professor at the Department of Informatics at the University of Bergen. He has led the Selmer Center from the very beginning and has been the major factor in building up the group. His research interests are coding theory, cryptography, sequences and discrete mathematics. He has published more than 400 papers in international refereed journals or conferences, chapter in books, chapters in Encyclopaedias etc. (103 of the papers are in the prestigious IEEE Transactions on Information Theory). During 1991-1993 and 2012-2014 he served as an associate editor for the IEEE Transactions on Information Theory. He is on the editorial board on Designs, Codes and Cryptography since 1996 and on Cryptography and Communications: Discrete Structures, Boolean Functions and Sequences since 2009. He was the program chair for Eurocrypt'93 and a program co-chair for the IEEE Information Theory Workshop ITW1997 in Longyearbyen, Norway and the ITW2007 in Solstrand, Norway. He was a program co-chair for Sequences and Their Applications (SETA) in 1998, 2001, 2004, 2006, 2012 and 2018; a program co-chair for Advances in Information Coding and Wireless Communications (AICWC) in 2014, 2015, 2017, 2018; and a technical program co-chair for International Workshop on Signal Design and Applications (IWSDA2019). He was elected an IEEE Fellow in 1997 for his contributions to coding theory and cryptography and became IEEE Life Fellow in 2018. He became a member of the Norwegian Academy of Science and Letters (DNVA - Det Norske Videnskaps-Akademi) in 2004. In 2007-2009 he served on the Board of Governors for the IEEE Information Theory Society. He was in several committees for selecting award winners of prestigious awards, including IEEE Richard W. Hamming Medal (2016, 2017, 2018), IEEE Information Theory Society Paper Award (2017, 2018), IEEE Joint Communications Society/Information Theory Award (2017, 2018) and IEEE Jack Keil Wolf ISIT Student Paper Award (2015, 2017, 2018).

Conference program

Conference program (PDF)

Wednesday, 14 June 2023



(Room I)


Keynote I

(Room I)



Main track I

(Room I)


Towards detecting device fingerprinting on iOS with API function hooking
Kris Heid, Vincent Andrae, Jens Heider


CLOUDOSCOPE: Detecting Anti-Forensic Malware using Public Cloud Environments
Mordechai Guri


HTTP Cyberattacks Detection through Automatic Signature Generation in multi-site IoT Deployments
Agustín Walabonso Lara Romero, Juan Antonio Ternero Muñiz, Rafael Estepa Alonso, Antonio Estepa Alonso, Fernando Ruiz Robles, Jesús Díaz Verdejo



Main track II

(Room I)


New Tricks to Old Codes: Can AI Chatbots Replace Static Code Analysis Tools?
Omer Said Ozturk, Emre Ekmekcioglu, Orcun Cetin, Budi Arief, Julio Hernandez-Castro


Towards Detecting Anomalies in Log-Event Sequences with Deep Learning: Open Research Challenges
Patrick Himler, Max Landauer, Florian Skopik, Markus Wurzenberger


Robustness of Image-Based Malware Classification Models trained with Generative Adversarial Networks
Ciaran O Reilly, Stephen O Shaughnessy, Christina Thorpe



Main track III

(Room I)


Cyber Informedness: A New Metric using CVSS to Increase Trust in Intrusion Detection Systems
Robin Duraz, Julien Francq, David Espes, Sandrine Vaton


Analysing the Impact of Gender Classification on Age Estimation
Petra Grd, Ena Barčić, Igor Tomičić, Bogdan Okreša Đurić


Useful Cyber Threat Intelligence Relation Retrieval Using Transfer Learning
Chia-Mei Chen, Fang-Hsuan Hsu, Jenq-Neng Hwang

Poster Session

(Room I)


Older adults and tablet computers: Adoption and the role of perceived threat of cyber attacks
Anže Mihelič, Igor Bernik, Simon Vrhovec

Crypto-agile Design and Testbed for QKD-Networks
Johanna Henrich, Andreas Heinemann, Martin Stiemerling, Fabian Seidl

A Deep Learning-based Malware Traffic Classifier for 5G Networks Employing Protocol-Agnostic and PCAP-to-Embeddings Techniques
Georgios Agrafiotis, Eftychia Makri, Antonios Lalas, Konstantinos Votis, Dimitrios Tzovaras, Nikolaos Tsampieris

In Alice and Bob, I trust?
Allison Wylde

CNACYS special session

(Room II)


Exploratory and Explanation-Aware Network Intrusion Profiling using Subgroup Discovery and Complex Network Analysis
Martin Atzmueller, Sophia Sylvester, Rushed Kanawati


RADAR: A TTP-based Extensible, Explainable, and Effective System for Network Traffic Analysis and Malware Detection
Yashovardhan Sharma, Simon Birnbach, Ivan Martinovic

Main track IV: Best paper session

(Room I)


Multistep Cyberattacks Detection using a Flexible Multilevel System for Alerts and Events Correlation
Elvira Castillo-Fernández, Jesús Díaz-Verdejo, Rafael Estepa Alonso, Antonio Estepa Alonso, Javier Muñoz Calle, Germán Madinabeitia


An Evaluation of Information Flows in Digital Euro Transactions Using Contextual Integrity Theory
Frédéric Tronnier, Patrick Biker, Erik Baur, Sascha Löbner


DGA Detection Using Similarity-Preserving Bloom Encodings
Lasse Nitz, Avikarsha Mandal


Best paper award

(Room I)

Thursday, 15 June 2023


Keynote II

(Room I)



Main track V

(Room I)


Investigating the Availability of Child Sexual Abuse Materials in Dark Web Markets: Evidence Gathered and Lessons Learned
Yichao Wang, Budi Arief, Virginia Franqueira, Anna Grace Coates, Caoilte Ó Ciardha


Digital safety alarms - Exploring the understandings of the cybersecurity practice in Norwegian municipalities
Alvhild Skjelvik, Arnstein Vestad


Acceptance Factors and Obstacles for Cryptocurrency Adoption
Peter Hamm, Sebastian Pape, David Harborth


ViSDM: A Liquid Democracy based Visual Data Marketplace for Sovereign Crowdsourcing Data Collection
Venkata Satya Sai Ajay Daliparthi, Nurul Momen, Kurt Tutschku, Miguel De Prado



Main track VI

(Room I)


Exposed-mode of Wormhole Attack in Opportunistic Mobile Networks: Impact Study and Analysis
Sidra Aslam, Ala Altaweel, Ibrahim Kamel


A Framework for Advanced Persistent Threat Attribution using Zachman Ontology
Venkata Sai Charan Putrevu, Hrushikesh Chunduri, Mohan Anand Putrevu, Sandeep Shukla


Ontology-based Framework for Boundary Verification of Safety and Security Properties in Industrial Control Systems
Chibuzo Ukegbu, Ramesh Neupane, Hoda Mehrpouyan



Main track VII

(Room I)


Privacy Preserving Data Analysis with the Encode, Shuffle, Analyse Architecture in Vehicular Data Sharing
Sascha Löbner, Christian Gartner, Frédéric Tronnier


Effect of Power Conversion Efficiency of the RF Energy Harvester on the Security and Data Rate of the Self-Sustainable IoT Devices
Fariborz Lohrabi Pour, Dong Sam Ha


Improving Covert Channel Bandwidth by Variable-Length Exponent Re-Coding in Floating-Point Representations
Jörg Keller, Carina Heßeling



DP4I special session

(Room I)


Digital Energy Platforms Considering Digital Privacy and Security by Design Principles
Ümit Cali, Marthe Fogstad Dynge, Ahmed Idries, Sambeet Mishra, Ivanko Dmytro, Naser Hashemipour, Murat Kuzlu


Cybersecurity and Digital Privacy Aspects of V2X in the EV Charging Structure
Ümit Cali, Murat Kuzlu, Onur Elma, Osman Gazi Gucluturk, Ahmet Kilic, Ferhat Özgur Catak


Cyber-physical Hardening of the Digital Water Infrastructure
Ümit Cali, Ferhat Özgur Catak, Zsolt György Balogh, Rita Ugarelli, Martin Gilje Jaatun

COSH special session

(Room II)


Usability, Security, and Privacy Recommendations for Mobile Parental Control
Vahiny Gnanasekaran, Katrien De Moor


Cybercrime and Video Games: Exploring children's safety in the gaming environment
Matteo Curcio


Collaboration between parents and children to raise cybersecurity awareness
Farzana Quayyum


Short Break


DP4I Panel


Conference closing


Author registration

390 EUR
(early bird)

440 EUR

Co-author registration

320 EUR
(early bird)

370 EUR

Second paper

190 EUR
(early bird)

240 EUR

Student attendee

160 EUR
(early bird)

210 EUR

Participation (without accepted paper)

350 EUR
(early bird)

550 EUR

Student authors of full papers, short papers and posters are not eligible for the student registration fee and must pay the regular registration fee.

Early-bird registration fees must be paid on 25 April 2023 or earlier.

Exposition of accepted posters is mandatory.


Conference chair

Aleksandra Mileva, University Goce Delcev (North Macedonia)

Program committee co-chairs

Virginia Franqueira, University of Kent (UK)
Steffen Wendzel, Worms University of Applied Sciences (Germany)

Program committee

Kevin Allix, University of Luxembourg (Luxembourg)
Rafael Asorey Cacheda, Universidad Politécnica de Cartagena (Spain)
Laurent Aufrechter, Thales (France)
Jurlind Budurushi, Qatar University (Qatar)
Luca Caviglione, IMATI - CNR (Italy)
Michal Choras, ITTI (Poland)
Marijke Coetzee, North-West University (South Africa)
Pavlos Efraimidis, Democritus University of Thrace (Greece)
Tobias Eggendorfer, Agentur für Innovation in der Cybersicherheit (Germany)
Damjan Fujs, University of Ljubljana (Slovenia)
Joaquín Garcia-Alfaro, Institut Polytechnique de Paris (France)
Dieter Gollmann, Hamburg University of Technology (Germany)
Petra Grd, University of Zagreb (Croatia)
Nils Gruschka, University of Oslo (Norway)
Mordechai Guri, Ben-Gurion University (Israel)
Piroska Haller, University of Medicine, Pharmacy, Sciences and Technology of Tg. Mures (Romania)
Marko Hölbl, University of Maribor (Slovenia)
Siv Hilde Houmb, Statnett (Norway)
Pedro Inácio, Universidade da Beira Interior (Portugal)
Audun Josang, University of Oslo (Norway)
Georgios Karopoulos, European Commission, Joint Research Centre (Italy)
Sokratis Katsikas, Norwegian University of Science and Technology (Norway)
Stefan Katzenbeisser, University of Passau (Germany)
Romain Laborde, University Paul Sabatier Toulouse III (France)
Jean-Francois Lalande, CentraleSupélec / Inria (France)
Gabriele Lenzini, SnT/University of Luxembourg (Luxembourg)
Shujun Li, University of Kent (UK)
Haibing Lu, Santa Clara University (USA)
Olaf Maennel, Tallinn University of Technology (Estonia)
Brad Malin, Vanderbilt University (US)
Karola Marky, Leibniz University Hannover (Germany)
Peter Mayer, Karlsruhe Institute of Technology (Germany)
David Megías, Internet Interdisciplinary Institute (IN3) / Universitat Oberta de Catalunya (Spain)
Rodrigo Miani, Universidade Federal de Uberlândia (Brazil)
Anže Mihelič, University of Maribor (Slovenia)
Caroline Moeckel, Royal Holloway, University of London (UK)
Pal-Stefan Murvay, Politehnica University of Timisoara (Romania)
Bashar Nuseibeh, The Open University (UK) & Lero (Ireland)
Sebastian Pape, Goethe University Frankfurt (Germany)
Marek Pawlicki, UTP Bydgoszcz (Poland)
Fernando Pérez-González, Universidade de Vigo (Spain)
Kaja Prislan, University of Maribor (Slovenia)
Helena Rifà-Pous, Universitat Oberta de Catalunya (Spain)
Judith Rossebo, ABB Norway (Norway)
Anderson Santana De Oliveira, SAP (Germany)
Lynsay Shepherd, Abertay University (UK)
Gerardo Simari, Universidad Nacional del Sur and CONICET (Argentina)
Kai Simon, Fraunhofer-Gesellschaft (Germany)
Florian Skopik, AIT Austrian Institute of Technology (Austria)
Daniel Spiekermann, Polizeiakademie Niedersachsen (Germany)
Hung-Min Sun, National Tsing Hua University (Taiwan)
Igor Tomičić, University of Zagreb (Croatia)
Mahesh Tripunitara, University of Waterloo (Canada)
Edgar Weippl, University of Vienna (Austria)
Christos Xenakis, University of Piraeus (Greece)
Nicola Zannone,Eindhoven University of Technology (Netherlands)
Aleš Završnik, Institute of Criminology at the Faculty of Law Ljubljana (Slovenia)
Marco Zuppelli, CNR (Italy)

Organizing co-chairs

Martin Gilje Jaatun, University of Stavanger (Norway)
Chunming Rong, University of Stavanger (Norway)

Steering committee

Igor Bernik, University of Maribor (Slovenia)
Bela Genge, University of Medicine, Pharmacy, Sciences and Technology of Tg. Mures (Romania)
Joerg Keller, FernUniversitaet in Hagen (Germany)
Blaž Markelj, University of Maribor (Slovenia)
Wojciech Mazurczyk, Warsaw University of Technology (Poland)
Simon Vrhovec, University of Maribor (Slovenia)

Important dates

31 Jan 2023

Paper submission deadline

7 Mar 2023

Author notification

5 Mar 2023

Poster submission deadline

9 Apr 2023


Call for papers


The conference is devoted to exploring and presenting original innovative applications, scientific and technological advancements in the field of cybersecurity. Topics for this conference include, but are not limited to:

  • Cybersecurity and cyber resilience
  • Cyber insurance
  • Digital privacy
  • Digital currency, blockchains and cybercrime
  • Law, investigation, internet jurisdiction and ethics
  • Child safety in the cyberspace
  • Cyber forensics
  • Surveillance, interception, blocking and sovereignty
  • Cyber warfare
  • Network security
  • Critical infrastructure security
  • Embedded systems security
  • Business continuity and disaster recovery
  • Information security governance
  • Security management
  • Cloud security
  • Internet of things security
  • Big data and cybersecurity
  • Healthcare information security
  • Software development security
  • Cyber-physical systems security
  • Adversarial machine learning
  • Trust management


EICC 2023 proceedings will be published by Association for Computer Machinery (ACM) in the ACM Digital Library within its International Conference Proceedings Series (ICPS).

Proceedings from the previous conferences are available here:

EICC 2022, EICC 2021, EICC 2020 (published by ACM)

CECC 2019, CECC 2018 (published by ACM)

CECC 2017 (published by University of Maribor Press)

Authors of accepted papers will be invited to submit extended versions to the Journal of Universal Computer Science (0948-695X / 0948-6968) Special Issue on Fighting Cybersecurity Risks from a Multidisciplinary Perspective.

Submission Guidelines

The official language of the conference is English. Papers are limited to 6 pages.

All papers must be original and not simultaneously submitted to another journal or conference. The following paper categories are welcome:

  • Full papers reporting on original research findings (5-6 pages)
  • Short papers reporting on original research findings (3-4 pages)
  • Posters (extended abstracts) reporting on original research findings (1-2 pages, including references)

The conference will offer a Best paper award of 200 GBP sponsored by the Institute of Cyber Security for Society (iCSS), University of Kent (UK), and Best poster award.

University of Kent, Institute of Cyber Security for Society (iCSS)

Papers submitted to EICC 2023 have to use the ACM SigConf template. Please, read template instructions carefully before submitting the paper. The use of the Latex template is strongly encouraged. Non-proficient Latex users are encouraged to use the Overleaf online collaborative Latex platform (ACM Latex template on Overleaf).

Word users: For peer review, use the two-column template. Keep in mind that you will need to submit the paper in the one-column template to TAPS after acceptance. The final paper will be published in a two-column format.

Latex users: Use only the two-column template (first line in the document: \documentclass[sigconf]{acmart}). Keep in mind that TAPS supports only specific packages.

The quality of the research papers will be assessed based on its originality, significance and clarity.

All submitted research papers will undergo a double-blind reviewing process. Please, make sure that submitted papers do not contain author names or obvious self-references. Please note that the page limit applies to camera-ready papers with author names included and not the submitted anonymized version.

Each paper will be reviewed by 2-3 reviewers. Afterwards, a discussion will be held by the chairs and reviewers to determine the outcomes of the peer-review.

Authors of accepted posters should prepare A0 sized posters (portrait) for the poster exhibition. Other designs may be considered.

Submission of a paper/poster implies that at least one of the authors will register and present the paper/poster at the conference if the paper/poster is accepted. If an author has more than one accepted paper/poster, each additional accepted paper/poster costs the same as the first one.

Submit papers using EICC 2023 submission system.

Full papers can exceed the page limit by a maximum of 2 pages. Each additional page above the page limit will be charged 50 EUR on top of the registration fee.

Call for special sessions

EICC 2023 is inviting proposals for Special Sessions. The typical goal of a special session is to present and discuss in a thorough and more narrow manner a specific aspect of cybersecurity and its interdisciplinary nature. EICC 2023 provides special session organizers with the opportunity to publish accepted special session papers as part of its conference proceedings. To be included in the EICC 2023 proceedings, special session papers must follow the conference submission guidelines and undergo the same rigorous reviewing process as conference papers.

Important dates

Proposal submission deadline

15 Jan 2023

Acceptance notification

Within 7 days after submission

Submission guidelines

The official language of EICC 2023 and its special sessions is English. Special sessions may welcome full and/or short papers.

Special session proposals should include:

  • Special session title
  • Acronym (optional)
  • Abstract
  • List of topics
  • Special session chair(s)
  • Tentative special session program committee
  • Proposed deadlines (camera-ready deadline is the same for all papers included in EICC 2023 proceedings)

Submit special session proposals using the submission form.