﻿{"id":5245,"date":"2024-12-07T09:14:21","date_gmt":"2024-12-07T09:14:21","guid":{"rendered":"https:\/\/uni.hi.is\/helmut\/?p=5245"},"modified":"2025-01-30T08:45:19","modified_gmt":"2025-01-30T08:45:19","slug":"two-papers-at-the-11th-ieee-international-conference-on-social-networks-analysis-management-and-security-snams-2024","status":"publish","type":"post","link":"https:\/\/uni.hi.is\/helmut\/2024\/12\/07\/two-papers-at-the-11th-ieee-international-conference-on-social-networks-analysis-management-and-security-snams-2024\/","title":{"rendered":"Two cybersecurity papers at the 11th IEEE International Conference on Social Networks Analysis, Management and Security (SNAMS-2024)"},"content":{"rendered":"<p>We have two research papers accepted at the <a href=\"https:\/\/emergingtechnet.org\/SNAMS2024\/\">11th IEEE International Conference on Social Networks Analysis, Management and Security (SNAMS-2024)<\/a>.<\/p>\n<ul>\n<li>Brynj\u00f3lfur Stef\u00e1nsson, \u00c1sta Gu\u00f0r\u00fan Helgad\u00f3ttir, Martin Nizon-Deladoeuille, Helmut Neukirchen, Thomas Welsh: <i>Understanding Trust in Authentication Methods for Icelandic Digital Public Services<\/i>. IEEE SNAMS 2024: The 11th IEEE International Conference on Social Networks Analysis, Management and Security, IEEE, to appear 2024 or 2025. Preprint DOI: <a href=\"https:\/\/doi.org\/10.48550\/arXiv.2501.17548\">10.48550\/arXiv.2501.17548<\/a><\/li>\n<li>Martin Nizon-Deladoeuille, Brynj\u00f3lfur Stef\u00e1nsson, Helmut Neukirchen, Thomas Welsh.<br \/>\n<i>Towards Supporting Penetration Testing Education with Large Language Models: an Evaluation and Comparison<\/i>. IEEE SNAMS 2024: The 11th IEEE International Conference on Social Networks Analysis, Management and Security, IEEE, to appear 2024 or 2025. Preprint DOI: <a href=\"https:\/\/doi.org\/10.48550\/arXiv.2501.17539\">10.48550\/arXiv.2501.17539<\/a><\/li>\n<\/ul>\n<p>The <a href=\"https:\/\/emergingtechnet.org\/SNAMS2024\/program_final.pdf\">program<\/a> lists only paper titles -- not authors nor presenters. Our student Brynj\u00f3lfur Stef\u00e1nsson presented both papers at the conference.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/uni.hi.is\/helmut\/files\/2024\/12\/SNAMS_trust-670x472.png\" alt=\"\" width=\"670\" height=\"472\" class=\"alignnone size-medium wp-image-5253\" srcset=\"https:\/\/uni.hi.is\/helmut\/files\/2024\/12\/SNAMS_trust-670x472.png 670w, https:\/\/uni.hi.is\/helmut\/files\/2024\/12\/SNAMS_trust-1024x721.png 1024w, https:\/\/uni.hi.is\/helmut\/files\/2024\/12\/SNAMS_trust-150x106.png 150w, https:\/\/uni.hi.is\/helmut\/files\/2024\/12\/SNAMS_trust-768x541.png 768w, https:\/\/uni.hi.is\/helmut\/files\/2024\/12\/SNAMS_trust.png 1058w\" sizes=\"auto, (max-width: 670px) 100vw, 670px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/uni.hi.is\/helmut\/files\/2024\/12\/SNAMS_llm-591x670.png\" alt=\"\" width=\"591\" height=\"670\" class=\"alignnone size-medium wp-image-5254\" srcset=\"https:\/\/uni.hi.is\/helmut\/files\/2024\/12\/SNAMS_llm-591x670.png 591w, https:\/\/uni.hi.is\/helmut\/files\/2024\/12\/SNAMS_llm-903x1024.png 903w, https:\/\/uni.hi.is\/helmut\/files\/2024\/12\/SNAMS_llm-132x150.png 132w, https:\/\/uni.hi.is\/helmut\/files\/2024\/12\/SNAMS_llm-768x871.png 768w, https:\/\/uni.hi.is\/helmut\/files\/2024\/12\/SNAMS_llm.png 1056w\" sizes=\"auto, (max-width: 591px) 100vw, 591px\" \/><\/p>\n<hr>\n<p>This research is in the context of our <a href=\"https:\/\/uni.hi.is\/helmut\/cybersecurity\/\">cybersecurity activities<\/a> and the ECCC\/EU co-funded projects <a href=\"https:\/\/uni.hi.is\/helmut\/research\/icedef-defend-iceland\/\">ICEDEF \u2013 Defend Iceland<\/a> and <a href=\"https:\/\/uni.hi.is\/helmut\/research\/eyvor-ncc\/\">Eyv\u00f6r \u2013 the National Cybersecurity Coordination Centre of Iceland (NCC-IS)<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/uni.hi.is\/helmut\/files\/2025\/01\/ECCC_logo-150x49.png\" alt=\"\" width=\"150\" height=\"49\" class=\"alignright size-thumbnail wp-image-5148\" srcset=\"https:\/\/uni.hi.is\/helmut\/files\/2025\/01\/ECCC_logo-150x49.png 150w, https:\/\/uni.hi.is\/helmut\/files\/2025\/01\/ECCC_logo.png 442w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><br \/>\n<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/uni.hi.is\/helmut\/files\/2023\/09\/EN-Co-funded-by-the-EU_POS-150x31.jpg\" alt=\"\" width=\"150\" height=\"31\" class=\"alignright size-thumbnail wp-image-3911\" srcset=\"https:\/\/uni.hi.is\/helmut\/files\/2023\/09\/EN-Co-funded-by-the-EU_POS-150x31.jpg 150w, https:\/\/uni.hi.is\/helmut\/files\/2023\/09\/EN-Co-funded-by-the-EU_POS-670x141.jpg 670w, https:\/\/uni.hi.is\/helmut\/files\/2023\/09\/EN-Co-funded-by-the-EU_POS-768x161.jpg 768w, https:\/\/uni.hi.is\/helmut\/files\/2023\/09\/EN-Co-funded-by-the-EU_POS.jpg 991w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We have two research papers accepted at the 11th IEEE International Conference on Social Networks Analysis, Management and Security (SNAMS-2024). Brynj\u00f3lfur Stef\u00e1nsson, \u00c1sta Gu\u00f0r\u00fan Helgad\u00f3ttir, Martin Nizon-Deladoeuille, Helmut Neukirchen, Thomas Welsh: Understanding Trust in Authentication Methods for Icelandic Digital Public Services. IEEE SNAMS 2024: The 11th IEEE International Conference on Social Networks Analysis, Management and [&hellip;]<\/p>\n","protected":false},"author":512,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[177208,79],"tags":[],"class_list":["post-5245","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","category-research"],"_links":{"self":[{"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/posts\/5245","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/users\/512"}],"replies":[{"embeddable":true,"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/comments?post=5245"}],"version-history":[{"count":9,"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/posts\/5245\/revisions"}],"predecessor-version":[{"id":5279,"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/posts\/5245\/revisions\/5279"}],"wp:attachment":[{"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/media?parent=5245"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/categories?post=5245"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/tags?post=5245"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}