NISS 2022

Asia/Jakarta
online

online

Ahmad Afif Supianto (BRIN)
Description

https://niss22.medi-ast.org/

Research Center for Informatics at National Research and Innovation Agency (BRIN), Republic of Indonesia, and Moroccan Mediterranean Association of Sciences and Sustainable Development organize the fifth edition of International Conference on Networking, Information Systems & Security (NISS 2022) with theme

"Envisage Intelligent Systems in 5G/6G-based Interconnected Digital Worlds"

NISS is a comprehensive conference focused on the various aspects of advances in intelligent information systems, cyber-security and networking technologies. The main purpose of NISS is to improve our research and lead to cutting-edge discovery by achieving the highest scientific capability as well as encourage open discussions on recent advances in computer communication and information technologies.

Authors are invited to submit original, unpublished manuscripts that demonstrate recent advances in computer communications, wireless/mobile networks, data technologies, intelligent systems, and cyber security, both in theoretical and practical aspects.

Accepted papers will be submitted for inclusion into IEEE Xplore subject to meeting IEEE Xplore's scope and quality requirements.

Keynote Speakers:

  • Prof. Michał Woźniak, Wroclaw University of Technology, Wroclaw, Poland
  • Prof. Haibin Zhu, Nipissing University, Canada
  • Prof. Shi-Jinn Horng, National Taiwan University of Science and Technology, Taiwan
  • Prof. Kathleen Kramer, University of San Diego, San Diego, USA
  • Prof. Ying-Dar Lin, National Chiao Tung University (NCTU), Taiwan
  • Prof. Ning Zhang, University of Windsor, Windsor, Canada
  • Dr. Kaoutar El Maghraoui, IBM Thomas J. Watson Research Center, New York, USA
  • Prof. Boudhir Anouar Abdelhakim, Abdelmalek Essaâdi University, Morocco


Registration
NISS 2022 Registration
Participants
  • Aang Gunawan Sutyawan
  • Abdelali Azouz
  • Abdelghani OUYOUS
  • Abderrahim Doudou
  • Abdoul Karim TAHIROU DJAMBEIDOU
  • Abdurrakhman Prasetyadi
  • Abir Benaouicha
  • Ahmad Afif Supianto
  • Ahmad Fauzi
  • Ahmed BICHRI
  • akbari basuki
  • Al Hafiz Akbar Maulana Siagian
  • Andre Sihombing
  • Andri Fachrur Rozie
  • Andria Arisal
  • Anindita Oktaria
  • Anne Parlina
  • Anoual EL KAH
  • Anouar Abdelhakim BOUDHIR
  • Arafat Febriandirza
  • Ardila Yananto
  • Ari Muzakir
  • asmaa doublali
  • Assia SOUFIANI
  • Astri Widi Astuti
  • aya abbadi
  • Ayoub BOUJANNA
  • ayoub mesquiny
  • Aziz Mahboub
  • Azza Muhammad
  • B. Berlian Surya Wicaksana
  • Badr Eddine SAADAOUI
  • Badr-Eddine SOUSSI NIAIMI
  • Bambang Setiadi
  • Bernadetta Kwintiana
  • Budi Nugroho
  • Cahyo Trianggoro
  • Candra Ihsan
  • Christine Jakobs
  • Dadan Ridwan Saleh
  • DALAL ZAIM
  • Devi Munandar
  • Diah Anggraeni Jatraningrum
  • Dian Andriana
  • Dianadewi Riswantini
  • Dmitriy Bystrov
  • Doha Fettach
  • Dwi Alfianti
  • Edy Maryadi
  • Ekasari Nugraheni
  • Elvira Nurfadhilah
  • Esa Prakasa
  • FADWA BOUHLAL
  • faiza dib
  • Farah El Ghemary
  • FARID Abdellah
  • fauzan langga
  • Febi Siti Sutria Ningsih
  • Feri Ahmadi
  • Fildzah 'Adany
  • Firdaous AFILAL TRIBAK
  • Galih Sumantri
  • Gersain Salvador Cruz
  • Glanny Mangindaan
  • Guntur Eko Putro
  • Haibin Zhu
  • Hamza CHAOUI
  • Hamza Hrida
  • Hanatyani Nur Asmi
  • HASNAE BORROHOU
  • Hassan Abdalla
  • HASSAN FAHAM
  • Hicham Boudlal
  • Hicham Boudlal
  • Hicham Nouri
  • Hilman Pardede
  • Hilman Pardede
  • Hind Meziane
  • I Gede Susrama Mas Diyasa
  • Ihab Moudhich
  • Ikram Ben abdel ouahab
  • Ikram HAMDAOUI
  • ilham kachbal
  • Imad Ajbar
  • iman EL KODSSI
  • Imane Benali
  • IMANE KHAYAT MERDAN
  • Indah Susanti
  • Inna Samuilika
  • Irfan Asfy Fakhry Anto
  • Irwan Priyanto
  • Ismail EL Gaabouri
  • Jemie Muliadi
  • Kaoutar El Maghraoui
  • Kaoutar en-neffad
  • kaoutar laachiri
  • Kathleen Kramer
  • Khasanah Nur Hidayah
  • Lamya Oukhouya
  • Lindawati Wardani
  • Lotfi Elaachak
  • Luthfia Nur Azizah
  • Manal Abdouh
  • manal rayyam
  • Manal Shehab
  • marza marzuki
  • mega saputra
  • Mehdi Khaddor
  • Merios Gusan Putra
  • Michal Wozniak
  • Mohamed Amine FELLAJI
  • Mohamed CHERRADI
  • Mohamed EDDOUJAJI
  • mohamed ettaounaty
  • Mohamed FARTITCHOU
  • MOHAMED MASKITTOU
  • Mohamed ZOUIDINE
  • MOHAMMED EL KARKRAOUI
  • Mostafa Belkasmi
  • Muh Hafizh Izzaturrahim
  • Muhammad Eka Setio Aji
  • Mustapha Hankar
  • Mustofa Amirullah
  • Nabil BENAYA
  • Nabila Putri
  • Nassera HABBAT
  • naziha redouani
  • Ning Zhang
  • Nouhaila INNAN
  • Nuning Rahmawati
  • Nunung Nurjanah
  • Oki Priyadi
  • Ossama Laazani
  • Oumaima El Kouari
  • Oussama HAMAL
  • P. Husnul Khotimah
  • PAPA DIADIA BA
  • Puji Lestari
  • R Sandra Yuwana
  • R. Bambang Heryanto
  • RADOUANE BAGHIANI
  • Renni Kusumowardani
  • Retno Kusumaningrum
  • Rinaldy Simanjuntak
  • Rini Wijayanti
  • Risnandar Risnandar
  • Robby Arifandri
  • Roy Massie
  • Saadane Rachid
  • Safae Ndama
  • Safia EL BOUCHINI-IDRISSI
  • SAFOUANE El HARRAK
  • Said el Abdellaoui
  • Salasi wasis Widyanto
  • salima El Aissati
  • Salma Achahbar
  • salmane zouitni
  • Samadi Sohaib
  • Samia Haman
  • Shidiq Al Hakim
  • Siti Kania Kushadiani
  • Soufyan Laarif
  • soufyane ayanouz
  • Soumaya El belhadji
  • Sri Sulasmi
  • Sukmawati Nur Endah
  • Surayya Obaid
  • Syahrul Syahrul
  • Syukri Darmawan
  • Toni Dwi Novianto
  • Tri Wahono
  • Ulfah Fayumi
  • Vicky Zilvan
  • Vicky Zilvan
  • Vincent Vincent
  • Walid JEBRANE
  • wiam elharrat
  • Wiwin Suwarningsih
  • yahya rechaki
  • Yasmine AARAB
  • yassine amghar
  • Yasyn ELYUSUFI
  • Younes Piro
  • YOUSRA DAHDOUH
  • Youssef Lamriji
  • Yunita Diana Sari
  • Wednesday, March 30
    • 2:30 PM 2:40 PM
      Registration
    • 2:40 PM 3:45 PM
      Opening Ceremony
      Convener: P. Husnul Khotimah
      • 2:40 PM
        Program Outlining 10m
      • 2:50 PM
        Welcome Speech 10m

        Dr. Eng. Ahmad Afif Supianto, General Chair of NISS 2022

        Speaker: Ahmad Afif Supianto (BRIN)
      • 3:00 PM
        Welcome Speech 10m

        Prof. Ben Ahmed, General Co-Chair of NISS 2022

        Speaker: Prof. Ben Ahmed
      • 3:10 PM
        Welcome Speech 10m

        Prof. Abdelhakim, General Co-Chair of NISS 2022

        Speaker: Prof. Abdelhakim
      • 3:20 PM
        Opening remarks 10m

        Dr. Esa Prakasa, Acting Director of Research Center for Data and Information Sciences -The National Research and Innovation Agency (BRIN)

        Speaker: Esa Prakasa (BRIN)
      • 3:30 PM
        Opening remarks 10m

        Dr. Eng. Budi Prawara, Chairman of Research Organization for Electronics and Informatics - The National Research and Innovation Agency (BRIN)

        Speaker: Dr Budi Prawara (BRIN)
      • 3:40 PM
        Screen Capturing Session 5m
    • 3:45 PM 4:00 PM
      Break
    • 4:00 PM 4:30 PM
      Keynote-11
      Convener: Dr Susanto Heru (BRIN)
      • 4:00 PM
        Keynote Speaker-1 30m

        Prof. Ying-Dar Lin, National Chiao Tung University (NCTU), Taiwan

        AIoT: Cloud or Edge, Big or Small Data, Public or Private Model

        IoT as a service (IoTaS) has been offered by cloud service providers. With 5G mobile edge computing (MEC), now local operators world-wide are able to compete with cloud service providers in offering IoTaS. Handling massive data requires computational intelligence where artificial intelligence (AI) can play a key role to upgrade IoTaS to AIoTaS (AIoT as a service). In this talk, we answer some key questions in this emerging field: Is it cloud or edge who can compete better in offering AIoTaS? Is there a need to federate them together? Whose data and AI in AIoTaS? Tenants or service providers? What is the gap between small data owned by a tenant and big data shared to the service provider? How about the private model trained from small data and public model trained from big data? How can we render a public model by federating private models so as to keep small data private?

        Speaker: Prof. Ying-Dar Lin (National Chiao Tung University)
    • 4:30 PM 6:00 PM
      Data Analytics
      Convener: Puji Lestari (Badan Riset dan Inovasi Nasional)
      • 4:30 PM
        Intelligent Technology Management based on Patent Topic Modeling 18m
        Speaker: MOHAMED MASKITTOU
      • 4:48 PM
        Deep Background Matting 18m
        Speaker: Said el Abdellaoui (LAPSSII, High School of Technology, Cadi Ayyad University, B.P. 89, Safi, Morocco)
      • 5:06 PM
        OntoBiodiv: Reconnecting Biodiversity Data with Specimens 18m
        Speaker: Dadan Ridwan Saleh (National Research and Innovation Agency)
      • 5:24 PM
        Sentiment Analysis of Students’ Facebook Comments Toward University Announcements 18m
        Speaker: Anoual EL KAH (Mohamed First University)
      • 5:42 PM
        Analysis of Agricultural Product Package Recommendations Using the FP-Growth Algorithm 18m
        Speaker: I Gede Susrama Mas Diyasa (UPN "Veteran" Jawa Timur)
    • 4:30 PM 6:00 PM
      Systems and Technology
      Convener: Saadane Rachid (SIRC/LAGES-EHTP)
    • 6:00 PM 6:15 PM
      Break
    • 6:15 PM 6:45 PM
      Keynote-12
      Convener: Dr Wassila Mtalaa (Luxembourg Institute of Science and Technology)
      • 6:15 PM
        Keynote Speaker-2 30m

        Prof. Haibin Zhu, Nipissing University, Canada

        E-CARGO and Role-Based Collaboration

        Role-Based Collaboration (RBC) is a computational methodology that uses roles as the primary underlying mechanism to facilitate collaboration activities. It consists of a set of concepts, principles, models, processes, and algorithms.

        RBC and its Environments - Classes, Agents, Roles, Groups, and Objects (E-CARGO) model have been developed to a powerful tool for investigating collaboration and complex systems. Related research has brought and will bring in exciting improvements to the development, evaluation, and management of systems including collaboration, services, clouds, productions, and administration systems. RBC and E-CARGO grow gradually into a strong fundamental methodology and model for exploring solutions to problems of complex systems including Collective Intelligence, Sensor Networking, Scheduling, Smart Cities, Internet of Things, Cyber-Physical Systems, and Social Simulation Systems.

        E-CARGO assists scientists and engineering to formalize abstract problems, which originally are taken as complex problems, and finally points out solutions to such problems including programming. The E-CARGO model possesses all the preferred properties of a computational model. It has been verified by formalizing and solving significant problems in collaboration and complex systems, e.g., Group Role Assignment (GRA). With the help of E-CARGO, the methodology of RBC can be applied to solve various real-world problems. E-CARGO itself can be extended to formalize abstract problems as innovative investigations in research. On the other hand, the details of each E-CARGO component are still open for renovations for specific fields to make the model easily applied. For example, in programming, we need to specify the primitive elements for each component of E-CARGO. When these primitive elements are well-specified, a new type of modelling/programming language can be developed and applied to solve general problems with software design and implementations.

        In this keynote, we examine the requirement of research on collaboration systems and technologies, discuss RBC and its model E-CARGO; review the related research achievements on RBC and E-CARGO in the past years; discuss those problems that have not yet been solved satisfactorily; present the fundamental methods to conduct research related to RBC and E-CRAGO and discover related problems; and analyze their connections with other cutting-edge fields. This keynote aims at informing that E-CARGO is a well-developed model and has been investigated and applied in many ways. The speaker welcomes queries, reviews, studies, applications, and criticisms.

        As case studies of E-CARGO, GRA and its related problem models are inspired by delving into the details of the E-CARGO components and the RBC process. GRA can help solve related collaboration problems with the help of programming and optimization platforms. All the related Java codes can be downloaded by GitHub: https://github.com/haibinnipissing/E-CARGO-Codes. The speaker welcomes interested researchers and practitioners to use these codes in their research and practice and contact the speaker if there are any questions about them.

        Speaker: Haibin Zhu (Nipissing University)
    • 6:45 PM 8:15 PM
      AI Applications-1
      Convener: Andri Fachrur Rozie (BRIN)
    • 6:45 PM 8:15 PM
      Computing and Intelligent Systems
      Convener: Dian Andriana (National Research and Innovation Agency (Indonesia))
    • 8:15 PM 8:30 PM
      Break
    • 8:30 PM 9:30 PM
      Keynote-13
      Conveners: Hilman Pardede, soufyane ayanouz
      • 8:30 PM
        Keynote Speaker-3 30m

        Dr. Kaoutar El Maghraoui, IBM Thomas J. Watson Research Center, New York, USA

        Hardware-Software Co-Design Approaches for Sustainable AI

        Building upon IBM’s unique ability to perform research and deliver innovations throughout the entire computational stack, spanning from abstract algorithms to systems, hardware and even material science, the architectural design of AI systems is being re-conceptualized in non-trivial ways. IBM Research is making further strides to design and build futuristic optimized AI stack through approximate computing and non-Von Neumann approaches, This talk discusses the hardware-software co-design approaches we are adopting to power the future of sustainable AI models and applications.

        Speaker: Dr Kaoutar El Maghraoui (IBM Thomas J. Watson Research Center)
      • 9:00 PM
        Keynote Speaker-4 30m

        Prof. Kathleen Kramer, University of San Diego, San Diego, USA

        Feature Object Extraction – Fusing Evidence, Not Rolling the Die

        A classification fusion technique using feature extraction and fuzzy logic known as Feature Object Extraction is developed and applied to hypothesis-based decision problems such as cyber security and GPS attacks. The Feature Object Extraction approach is not a probabilistic approach that determines the odds of one hypothesis over another, e.g., GPS Jamming vs. Dropouts. Instead, evidence to support or refute each hypothesis is accrued to create a degree of certainty. The feature-aided object extraction technique was initially developed for the target classification problem. Unlike probabilistic methods, evidence that supports one hypothesis does not necessarily refute the probability of another hypothesis. For example, the U.S. Mint recently was overwhelmed during the opening of sales for limited edition coin sets. The evidence of the high volume on the site could indicate a denial-of-service attack or large numbers of customers. The relationship to the availability of limited-edition coins supports expected high traffic. It does not, however, refute a denial-of-service attack, as actually has occurred. Feature Object Extraction also allows for erroneous information and can recover where probabilistically a class can eliminated without the ability to recover. In one application, cybersecurity is interpreted as a sensor fusion problem that includes various alternative techniques into the solution space. GPS security, where various jamming and spoofing techniques are possibilities, the ability to discern the type of attacks that are possible has been shown to be well suited for this evidence accrual technique.

        Speaker: Kathleen Kramer (University of San Diego)
    • 9:30 PM 9:45 PM
      Closing Ceremony
      Convener: P. Husnul Khotimah
      • 9:30 PM
        Screen Capturing Session 5m
      • 9:35 PM
        Closing 10m
  • Thursday, March 31
    • 2:30 PM 2:40 PM
      Registration
    • 2:40 PM 2:55 PM
      Opening Ceremony
      Convener: P. Husnul Khotimah
      • 2:40 PM
        Program Outlining 10m
      • 2:50 PM
        Screen Capturing Session 5m
    • 2:55 PM 3:25 PM
      Keynote-21
      Convener: Lotfi Elaachak
      • 2:55 PM
        Keynote Speaker-5 30m

        Prof. Shi-Jinn Horng, National Taiwan University of Science and Technology, Taiwan

        Speaker: Prof. Shi-Jinn Horng
    • 3:25 PM 4:55 PM
      AI Applications-2
      Convener: Yasyn ELYUSUFI (FST Tangier)
    • 3:25 PM 4:55 PM
      Networking
      Convener: Risnandar Risnandar (BRIN)
    • 3:25 PM 4:55 PM
      Security
      Conveners: Dr Foni A. Setiawan (BRIN), Dr Lindung A. Manik (BRIN)
      • 3:25 PM
        Public-Key Cryptography behind Blockchain Security 18m
        Speaker: Mohamed FARTITCHOU (LaMAO laboratory, MSC team, FPD, Mohammed First University, Nador)
      • 3:43 PM
        Towards fast ECC signing algorithms for Blockchain 18m
        Speaker: Youssef Lamriji
      • 4:19 PM
        A Survey on Lightweight Cryptography Approach For IoT Devices Security 18m
        Speaker: Ismail EL GAABOURI (ICES Team, ENSIAS, Univesity Mohamed V in rabat)
      • 4:37 PM
        Streamlining Security Relevance Analysis According to ISO 21434 18m
        Speaker: Christine Jakobs
    • 4:55 PM 5:10 PM
      Break
    • 5:10 PM 5:40 PM
      Keynote-22
      Convener: Prof. Pavel Kroemer (VSB - Technical University of Ostrava)
      • 5:10 PM
        Keynote Speaker-6 30m

        Prof. Michał Woźniak, Wroclaw University of Technology, Wroclaw, Poland

        Difficult Data Analysis

        Nowadays, many practical decision tasks require building models based on data which included severe difficulties, as imbalanced class distributions, limited access to ground truth, or data in motion, to enumerate only a few. Such characteristics may strongly deteriorate the final model performances. Therefore, the proposition of the new learning methods that can combat the difficulties above should focus on intense research. The main aim of this talk is to discuss the problems of data difficulties, especially imbalanced data or data stream.

        Speaker: Michal Wozniak
    • 5:40 PM 7:25 PM
      Poster-1
      Conveners: Arafat Febriandirza (BRIN), Budi Nugroho (National Research and Innovation Agency)
    • 5:40 PM 7:25 PM
      Poster-2
      Conveners: Nabil BENAYA (Faculty of Sciences and Technologies Al Hoceima), faiza dib (fsth)
      • 5:40 PM
        Hadoop-based Big Data Distributions: A Comparative Study 15m
        Speaker: Ikram HAMDAOUI
      • 5:55 PM
        DLDB-Service: An extensible Data Lake System 15m
        Speaker: Mohamed CHERRADI (DSCI)
      • 6:10 PM
        Honypots for IoT Security: A Review 15m
        Speaker: Oumaima El Kouari (ERMIA TEAM, ENSAT- Abdelmalek Essaàdi University, Morocco)
        paper 39
      • 6:25 PM
        Security and DDoS Attack in the Software Defined Network 15m
        Speaker: Abdoul Karim TAHIROU DJAMBEIDOU (Université Cheikh Anta Diop UCAD)
      • 6:40 PM
        A Proposed Big Data Architecture using Data Lakes for Education Systems 15m
        Speaker: Lamya Oukhouya
      • 6:55 PM
        A Review: Augmented Reality Technology-Based Interactive Learning Media 15m
        Speaker: Astri Widi Astuti
      • 7:10 PM
        Cryptographic Methods for eHealth Cloud Applications Using IoT based 5G: Comparison Study 15m
        Speaker: manal rayyam
    • 7:25 PM 8:25 PM
      Keynote-23
      Convener: Farah El Ghemary
      • 7:25 PM
        Keynote Speaker-7 30m

        Prof. Boudhir Anouar Abdelhakim, Abdelmalek Essaâdi University, Morocco

        Speaker: Prof. Boudhir Anouar Abdelhakim
      • 7:55 PM
        Keynote Speaker-8 30m

        Prof. Ning Zhang, University of Windsor, Windsor, Canada

        Communication and Computing Resource Management for Internet of Things

        Internet of things (IoT) is a vast network of smart objects to work together in collecting and analyzing data. It lays the foundation for various emerging applications, such as smart home, smart city, and smart transportation systems. In this talk, we will discuss how next generation wireless networks can support IoT in aspects of data transmission and data processing. Two research works will be presented, including i) a game theory based base station coordination for efficient data transmission; and i) deep reinforcement learning aided dynamic computation offloading for IoT. Finally, future research directions are discussed.

        Speaker: Prof. Ning Zhang (University of Windsor)
    • 8:25 PM 9:00 PM
      Closing Ceremony
      Convener: P. Husnul Khotimah
      • 8:25 PM
        Best Paper & Presenter Award 10m
      • 8:35 PM
        Screen Capturing Session 5m
      • 8:40 PM
        Closing Remark 10m

        Dr. Eng. Ahmad Afif Supianto, General Chair of NISS 2022

        Speaker: Ahmad Afif Supianto (BRIN)