13th International Conference on Security of Information and Networks

About The Event ONLINE

Proceedings by ACM Press.
All papers will be inserted into the ACM Digital Library and subsequently indexed by Scopus.


Istanbul, Turkey


4-7 November 2020

In succession to the successful annual SIN 2007 - SIN 2019, the 13th International Conference on Security of Information and Networks (SIN 2020) provides an international forum for presentation of research and applications of security in information and networks. SIN 2020 conference features contributed as well as invited papers, special sessions, workshops, and tutorials on theory and practice of security of information and networks.


Conference Venue


Organized by:

  • Istanbul technical University, Istanbul, Turkey
  • Hasan kalyoncu University, Gaziantep, Turkey
  • The University of Glasgow, Glasgow, UK
  • Rutgers University, Newark, USA
  • Kennesaw State University, Georgia, USA
  • Malaviya National Institute of Technology, Jaipur, India
  • Manipal University Jaipur, India
  • Macquarie University, Sydney, Australia
  • Cardiff University, Wales, UK
  • Southern Federal University, Taganrog, Rostov-on-Don, Russia
  • Sochi State University, Sochi, Russia

Hosted by:

  • Department of Electronics and Communication Engineering, Istanbul Technical University, Istanbul, Turkey

Supported by:

Important Links

SIN 2020 will feature the following keynote talks:

Conference Chair

  • Berna Ors Yalcin, Istanbul Technical University, Turkey

Conference Co-Chairs

  • Atilla Elçi, Hasan Kalyoncu University, Turkey
  • Ron Poet, University of Glasgow, Scotland
  • Jaideep Vaidya, Rutgers University, USA
  • Manoj S. Gaur, MNIT, India
  • Rajveer S. Shekhawat, MUJ, India
  • Mehmet Orgun, Macquarie University, Australia
  • Pete Burnap, Cardiff University, Wales
  • Oleg Makarevich, Ludmila Babenko, Southern Federal University, Russia

Program Chair

  • Berna Ors Yalcin, Istanbul Technical University, Turkey

Program Co-Chairs

  • Alexander Chefranov, Eastern Mediterranean University, TRNC
  • Maxim Anikeev, Fraunhofer Institute for Secure Information Technology, Germany
  • Philipp Reinecke, Cardiff University, United Kingdom
  • Hossain Shahriar, Kennesaw State University, USA
  • Vijay Laxmi, MNIT, India
  • Naghmeh Moradpoor Sheykhkanloo, Edinburgh Napier University, United Kingdom
  • Behnam Rahnama, Medis Inc., Iran
  • Josef Pieprzyk,CSIRO, Australia, and Polish Academy of Sceiences, Poland

Promotion Chair

  • Şerif Bahtiyar, Istanbul Technical University

Promotion Co-Chairs

  • Tahir Sandıkkaya, Istanbul Technical University, Turkey
  • Rajan Shankaran, Macquarie University, Australia
  • Manoj Kumar Bohra, Manipal University Jaipur, India
  • Xavier Bellekens, Strathclyde University, Scotland

Local Publicity Co-Chair

  • Xavier Bellekens, University of Strathclyde, Scotland

Local Committee

  • Latif AKÇAY Istanbul Technical University
  • Mehmet Onur DEMİRTÜRK Istanbul Technical University
  • Yasin Fırat KULA Istanbul Technical University
  • Mustafa TANIŞ Istanbul Technical University
  • Serdar Duran Istanbul Technical University

Logo, certificates, covers designs, and website

  • Efe Cem Elçi, Turkey
  • Sepideh Sadeghpour, Medis Inc., Iran

Volunteers Team

  • Students of Istanbul Technical University, Turkey

Advisory Committee Members

  • Bart Preneel, Katholieke Universiteit Leuven, Belgium
  • Bülent Örencik, Beykent University, Turkey
  • Cetin Kaya Koc, University of California Santa Barbara, USA
  • Edward Dawson, Queensland University of Technology, Australia
  • Elisa Bertino, Purdue University, USA
  • N. Balakrishnan, IISc Bangalore, India
  • Willy Susilo, University of Wollongong, Australia
  • Alexander Shelupanov, Tomsk State University for Control Systems and Radio Electronics, Russia

International Program Committee

  • Stelvio Cimato, University of Milan
  • Luigi Logrippo, Université du Québec en Outaouais
  • Utsav Upadhyay, Dr. B R Ambedkar National Institute of Technology, Jalandhar, Punjab, India
  • Natalia Miloslavskaya, National Research Nuclear University MEPhI (Moscow Engineering Physics Institute)
  • Bulent Orencik, Beykent University
  • Alexander Tselykh, SFEDU
  • Ercan Buluş, Namık Kemal Üniversitesi
  • Jan Jurjens, TU Dortmund
  • Bernardi Pranggono, Sheffield Hallam University
  • Ekaterina Maro, Southern Federal University
  • Edgar Weippl, University of Vienna
  • Gerardo Pelosi, Politecnico di Milano
  • Igor Kotenko, St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences (SPIIRAS)
  • Albert Levi, Sabanci University
  • Alexey Tselykh, Southern Federal University
  • Cihangir Tezcan, Middle East Technical University
  • Evgeny Abramov, Southern Federal University
  • Evgenia Ishchukova
  • Gaurav Somani, Central University of Rajasthan
  • Maxim Kalinin, Peter the Great St. Petersburg Polytechnic University
  • Manoj Gaur, Department of Computer Engineering, Malaviya National Instotute of Technology, Jaipur, India
  • Josef Pieprzyk, CSIRO/Data61
  • Gaurav Prasad, National Institute of Technology karnataka
  • Christophe Feltus, Luxembourg Institute of Science and Technology
  • Behnam Rahnama, Dept. of Computer Engineering, Okan University
  • Ankit Mundra, Manipal University Jaipur
  • Sunita Singhal, Manipal University Jaipur
  • Rajveer Singh Shekhawat, Manipal University Jaipur
  • Shweta Saharan, Malaviya National Institute of Technology Jaipur
  • Vasileios Vlachos, University of Thessaly
  • Naghmeh Moradpoor, Edinburgh Napier University
  • Tugkan Tuglular, Izmir Institute of Technology, Turkey
  • Olga Peskova
  • Wojciech Mazurczyk, Warsaw University of Technology, Faculty of Electronics and Information Technology, Institute of Computer Science
  • Mohammad Rahman, Florida International University


Papers must be submitted electronically via the SIN 2020 Submission Site at the link bellow:

Paper Submission Link

Title, author's name(s), affiliation, mailing address, telephone, fax and email of the principal author should be included. Maximum length for the proceedings is 8 pages for full paper, 4 pages for short paper, 2 pages for fast abstract and position statement, and 2 pages for demo and tutorial proposals. Extra page charges apply for full and short papers.
All papers should be written according to (
All proposals for organizing workshops, tutorials, demos, and special sessions are expected at the conference e-mail

All accepted papers will be published by ACM Press in a conference proceedings and uploaded into ACM Digital Library. Extended versions of selected papers will be invited for possible publication in a special issue. Each accepted paper must be registered to be included in the proceedings. Papers not presented during the conference may be removed from the online proceedings.


Papers, special sessions, tutorials, and workshops addressing all aspects of security in information and networks are being sought. Researchers and industrial practitioners working on the following and related subjects are especially encouraged: development and realization of cryptographic solutions, security schemes, new algorithms; critical analysis of existing approaches; secure information systems, security, privacy, and trust of blockchain and distributed ledger technologies, secure smart contracts, consensus mechanisms, especially distributed control and processing applications, and security in networks; interoperability, service levels and quality issues in such systems; information assurance, security, and public policy; detection and prevention of cybercrimes such as fraud and phishing; next generation network architectures, protocols, systems and applications; industrial experiences and challenges of the above. Doctoral students are encouraged to propose papers on ongoing research. Original papers will be considered; submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other conference or workshop that has proceedings. All submitted papers will be reviewed by at least three members of the program committee judging its originality, significance, correctness, presentation and relevance. Authors are also encouraged to propose position papers on practical studies and experiments, critique of existing work, emerging issues, and novel ideas under development. Enterprises and research centers developing, implementing, or using security tools and frameworks are encouraged to propose application / tool demo. Proposals of half-day tutorials on fundamental to advanced subjects covering practical implementation aspects of security are welcome. Proposals of special session(s) to be held in the main conference are welcome. Proposals of workshops to be held in conjunction with the conference are welcome. The theme of a workshop proposal should be closely related to a specific area of the conference topics.

Broad areas of interest in security theory, technology and applications will include, but are not limited to, the following:
  • Access control and intrusion detection
  • Security of cyber-physical systems
  • Autonomous and adaptive security
  • Security tools and development platforms
  • Computational intelligence techniques in security
  • Security ontology, models, protocols & policies
  • Computer network defense
  • Standards, guidelines and certification
  • Cryptographic techniques and key management
  • Security-aware software engineering
  • Industrial applications of security
  • Trust and privacy
  • Information assurance
  • Next generation network architectures
  • Malware analysis
  • Network security and protocols
  • Security challenges in Mobile/Embedded Systems
  • Cloud security
  • Security, privacy, and trust of blockchain and distributed ledger technologies
  • Secure smart contracts
  • Consensus mechanisms
  • Security Awareness and Education
  • Post Quantum Cryptography
  • IoT Security and Trust

Important Dates

Please consult site for the most up-to-date info on the following:

  • Paper Submission by: 15 October 2020
  • All Author Notification: 27 October 2020
  • All Camera Ready and Author Registration: 1 November 2020
  • Tutorial Date: 7 November 2020
  • Conference Dates: 4-6 November 2020


One each of the Best Paper and the Best Presentation awards will be given. The awardees will recieve activation keys to Kaspersky products complements of Kaspersky Academy. Kaspersky will provide one activation key to each awardee to Kaspersky Security Cloud for 3 devices. Kaspersky Security Cloud allows to access Kaspersky's entire family of apps for your desktops and mobiles: "From antivirus to privacy and performance tools, pick what you want to stay safe from threats like malware, spyware and hackers."


Previous SIN Conf events and their proceedings (see below for special issues and books):


Program of SIN 2020- 13th International Conference on Security of information and Networks




Welcome Berna Örs Yalçın


Session 1: Network Security and Protocols1
Session Chair: Atilla Elçi

Nasser Al-Hadhrami, Matthew Collinson and Nir Oren A Subjective Network Approach for Cybersecurity Risk Assessment
Karim Lounis and Mohammad Zulkernine Exploiting Race Condition for Wi-Fi Denial of Service Attacks
Tigran Ovasapyan, Dmitry Moskvin and Artem Tsvetkov Detection of attacks on the Internet of Things based on intelligent analysis of devices functioning indicators
Farzan Majdani, Lynne Batik, Andrei Petrovski and Sergei Petrovski Detecting Malicious Signal Manipulation in Smart Grids Using Intelligent Analysis of Contextual Data
Ouissem Ben Fredj, Alaeddine Mihoub, Omar Cheikhrouhou, Moez Krichen and Abdelouahid Derhab CyberSecurity Attack Prediction: A Deep Learning Approach
Arnab Mukherjee and Raju Halder PoliceChain: Blockchain-Based Smart Policing System for Smart Cities




Session 2: Security of Cyber Physical Systems

Session Chair: Tahir Sandikkaya

Sinem Gür, Simge Demir, Şevval Şimsek and Albert Levi Secure and Privacy Aware Gateway for Home Automation Systems
Giovanni Salzillo, Massimiliano Rak and Felice Moretta Threat Modeling based Penetration Testing: The Open Energy Monitor Case study
Yuning Jiang and Yacine Atif An Approach to Discover and Assess Vulnerability Severity Automatically in Cyber-Physical Systems
Hope Eke, Dr Andrei Petrovski and Hatem Ahriz Detection of False Command and Response Injection Attacks for Cyber Physical Security and Resilience Jessica Fong and Ron Poet
Jessica Fong and Ron Poet Creating Graphical Passwords on a Mobile Phone
Jiyou Wang and Ron Poet Permission Management and User Privacy Based On Android




Session 3: Network Security and Protocols 2

Session Chair 3: Behnam Rahnama

Richard Beno and Ron Poet Hacking Passwords that Satisfy Common Password Policies
Mamello Thinyane and Debora Christine SMART Citizen Cyber Resilience (SC2R) Ontology
Markus Hornsteiner, Sebastian Groll and Alexander Puchta Towards a user-centric IAM entitlement shop - Learnings from the e-commerce
Kübra Aydin, Rahime Belen Sağlam, Shujun Li and Abdullah Bulbul When GDPR Meets CRAs (Credit Reference Agencies): Looking through the Lens of Twitter
Zeynep Chousein, Hacı Yakup Tetik, Rahime Belen Sağlam, Abdullah Bülbül and Shujun Li Tension between GDPR and Public Blockchains:A Data-Driven Analysis of Online Discussions




Keynote Speech: Albert Levi, Key Generation for Body Area Networks

Session Chair: Şerif Bahtiyar




Session 4: Intrusion Detection

Session Chair: Alexander Chefranov

Beyazit Bestami Yuksel, Serif Bahtiyar and Ayse Yilmazer Credit Card Fraud Detection with NCA Dimensionality Reduction
Maksim Kalameyets, Dmitry Levshun, Sergei Soloviev, Andrey Chechulin and Igor Kotenko Social networks bot detection using Benford's law
Mark Vella and Christian Colombo SpotCheck: On-Device Anomaly Detection for Android
Vara Vundavalli, Farhat Barsha, Mohammad Masum, Hossain Shahriar and Hisham Haddad Malicious URL Detection Using Machine Learning Techniques
Maxim Kalinin and Peter Zegzhda AI-based Security for the Smart Networks




Session 5: Cryptographic Techniques and Key Management

Session Chair: Liudmila Babenko

Giovanni Di Crescenzo and Glenn Veach RPM: Additive Stream Ciphers for Lightweight Communication Security
Yakov Mironov, Polina Mironova and Konstantin Rumyantsev Characteristics of a two stage synchronization algorithm in the system of quantum key distribution with dividing a fiber optic line into sections with decreasing length
Valeriy Osipyan and Kirill Litvinov Development of the mathematic model of disymmetric bigram cryptosystem based on a parametric solution family of multi-degree system of Diophantine equations
Liudmila Babenko and Ilya Pisarev Modeling Replay And Integrity Violations Attacks For Cryptographic Protocols Source Codes Verification Of E-Voting System Based On Blind Intermediaries
Abdulaziz Almehmadi, Oksana Kilik and Khalil El-Khatib Eye Gaze-Based Human Error Prevention System: Experts vs. Non-Experts
Shreyas Srinivasa, Jens Myrup Pedersen and Emmanouil Vasilomanolakis Towards systematic honeytoken fingerprinting




Session Chair: Şerif Bahtiyar

Kaspersky Academy - Denis Barinov

Learning that cannot be postponed: raising security awareness while working from home




Session 6: Computational intelligence techniques in security

Session Chair 7: Naghmeh Moradpoor

Jonathan Francis Roscoe and Max Smith-Creasey Unconventional Mechanisms for Biometric Data Acquisition via Side-Channels
Stanislav Zhdanov and Ekaterina Maro Power analysis side-channel attacks on symmetric block cipher Magma
Igor Kotenko, Igor Saenko and Fadey Skorik Intelligent support for network administrator decisions based on combined neural networks
Vasiliy Krundyshev Neural network approach to assessing cybersecurity risks in large-scale dynamic networks
Zixiang Wang, Jiajia Han, Jiangfeng Zhang and Xin Sun Privacy-preserving Decentralized Parameter Estimation in Edge Computing Networks
Mark Sokolov, Kehinde Olufowobi and Nic Herndon Visual spoofing in content-based spam detection
Muhammet Sahin and Serif Bahtiyar A Survey on Malware Detection with Deep Learning




Best paper award:

Nasser Al-Hadhrami, Matthew Collinson and Nir Oren: A Subjective Network Approach for Cybersecurity Risk Assessment

Best presentation award:

Mark Sokolov, Kehinde Olufowobi and Nic Herndon: Visual spoofing in content-based spam detection
Closing Ceremony: Atilla Elçi

Contact Us