Publications

Blogs

I. Siahaan.

Cyber Threat Intelligence: "Is it a mythical animal?", Published: December 03, 2021

I. Siahaan.

"We"llness not "I"llness: Cyber Security is a Shared Responsibility, Published: May 28, 2021

I. Siahaan.

Trust, but verify": Safety and Security in Critical System, Published: September 21, 2020

I. Siahaan.

Democratic Rights and Legislative Duties in the Time of COVID-19, Published: July 13, 2020


Webinars

I. Siahaan.

Security in Smart Grid

I. Siahaan.

Leverage AI in Threat Management


Radio Talks

I. Siahaan. 

CBC Shift - NB with Vanessa Vander Valk, Saint John Cyber Security  Aired: Nov. 16, 2020


Newspaper Interview

I. Siahaan. 

l'Acadie Nouvelle with Alexandre Boudreau, Rançongiciel: que faire en cas d’attaque?  Published: Aug. 09, 2021


Technical Reports

M. Abrishami, K. Boakye-Boateng, A. Ghorbani, I. Siahaan (Authors’ order is alphabetical order by last name)

IBM Open Data Modelling in Threat Intelligence Sharing Project

Canadian Institute for Cybersecurity (CIC) Technical Report CIC-TR05-2021


A. Al Muktadir, K. Boakye-Boateng, A. Ghorbani, I. Siahaan, D. Xu (Authors’ order is alphabetical order by last name)

Siemens Data Collection Project

Canadian Institute for Cybersecurity (CIC) Technical Report CIC-TR01-2020


K. Boakye-Boateng, K. Boldt, A. Ghorbani, R. Lu, B. Sennewald, I. Siahaan, D. Xu (Authors’ order is alphabetical order by last name)

Siemens Security Analytics Project

Canadian Institute for Cybersecurity (CIC) Technical Report CIC-TR01-2019


M. Al-Darwbi, M. Firoozjaei, A. Ghorbani, N. Mahmoudyar, I. Siahaan (Authors’ order is alphabetical order by last name)

Siemens Operational Technology (OT) Forensics

Canadian Institute for Cybersecurity (CIC) Technical Report CIC-TR01-2019


F. Massacci and I. Siahaan (Authors’ order is alphabetical order by last name)

Automata Modulo Theory (AMT)

Department of Information Engineering and Computer Science Technical Report DISI-09-027


F. Massacci and I. Siahaan (Authors’ order is alphabetical order by last name)

Inclusion Matching Implementation of Automata Modulo Theory

Department of Information Engineering and Computer Science Technical Report DISI-09-073


F. Massacci and I. Siahaan (Authors’ order is alphabetical order by last name)

Simulation Matching Implementation of Automata Modulo Theory

Department of Information Engineering and Computer Science Technical Report DISI-09-074


Journals

Piero A. Bonatti, Luca Ioffredo, Iliana M. Petrovab, Luigi Sauroa, Ida R. Siahaan (Authors’ order is alphabetical order by last name)

Real-time reasoning in OWL2 for GDPR compliance

In Artificial Intelligence. 2020.

doi:10.1016/j.artint.2020.103389


N. Bielova, N. Dragoni, F. Massacci, K. Naliuka and I. Siahaan (Authors’ order is alphabetical order by last name)

Matching in Security-by-Contract for Mobile Code

In Journal of Logic and Algebraic Programming. 2009.

doi:10.1016/j.jlap.2009.02.013


L. Desmet and W. Joosen and F. Massacci and P. Philippaerts and F. Piessens and I. Siahaan and D. Vanoverberghe. (Authors’ order is alphabetical order by last name)

Security-by-contract on the .NET platform

In Information Security Technical Report, Volume 13 Issue 1, 2008.

doi:10.1016/j.istr.2008.02.001


Conferences

K. Boakye-Boateng, I. Siahaan, A. Al Muktadir, D. Xu, A. Ghorbani 

Sniffing Serial-Based Substation Devices: A Complement to Security-Centric Data Collection

The IEEE PES ISGT Europe 2021 (ISGT Europe 2021)


A. Al Muktadir, I. Siahaan, K. Boakye-Boateng, D. Xu, A. Ghorbani 

Recommending Location for Placing Data Collector in the OPC Classic

The 4th IEEE International Conference on Industrial Cyber-Physical Systems (ICPS 2021).

doi:10.1109/ICPS49255.2021.9468121


Rojali, I. Siahaan

Steganography Algorithm Multi Pixel Value Differencing  (MPVD)  to Increase Message Capacity and Data Security

The International Conference on Mathematics: Pure, Applied and Computation (ICoMPAC 2016). 

doi: 10.1063/1.4994438


Y. Muliono, I. Siahaan

A Study and Model of Automatic Mapper For ICD-9 and ICD-10 For Healthcare Provider in Indonesia 

The Eleventh 2016 International Conference on Knowledge, Information and Creativity Support Systems (KICSS 2016)


I. Santoso, I. Siahaan

Privacy Modelling Of Sensitive Data in Universal Healthcare Coverage in Indonesia

The Eleventh 2016 International Conference on Knowledge, Information and Creativity Support Systems (KICSS 2016)

doi:10.1109/kicss.2016.7951437


T.W.Cenggoro, I. Siahaan

Dynamic Bandwidth Management Based on Traffic Prediction Using Deep Long Short Term Memory

2nd International Conference on Science in Information Technology (ICSITech 2016). 

doi:10.1109/ICSITech.2016.7852655


G. Bruns, P. W. L. Fong, I. Siahaan, and M. Huth

Relationship-Based Access Control: Its Expression and Enforcement Through Hybrid Logic.

In Proc. of the 2nd ACM Conference on Data and Application Security and Privacy (CODASPY'2012), San Antonio, TX, USA, February 7-9, 2012. A longer version appears as Technical Report 2011/12, Department of Computing, Imperial College, London, UK.. 

doi:10.1145/2133601.2133616


P. W. L. Fong and I. Siahaan

Relationship-Based Access Control Policies and Their Policy Languages.

In Proc. of the 16th ACM Symposium on Access Control Models and Technologies (SACMAT'11)

doi:10.1145/1998441.1998450


R. Smith and C. Estan and S. Jha and I. Siahaan

Fast Signature Matching Using Extended Finite Automaton (XFA)

In Proc. of The 4th International Conference on Information Systems Security (ICISS 2008).

doi:10.1007/978-3-540-89862-7_15


N. Bielova, M. DallaTore, N. Dragoni, and I. Siahaan. (Authors’ order is alphabetical order by last name)

Matching Policies with Security Claims of Mobile Applications

In Proc. of The 3rd InternationaL Conference on Availability, Reliability and Security (ARES'08).

doi:10.1109/ARES.2008.96


N. Dragoni, F. Massacci, K. Naliuka, and I. Siahaan. (Authors’ order is alphabetical order by last name)

Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code.

In Proc. of EuroPKI'07, Springer-Verlag, 2007

doi:10.1007/978-3-540-73408-6_21


Workshops

F. Massacci and I. Siahaan (Authors’ order is alphabetical order by last name)

Optimizing IRM with Automata Modulo Theory

In the 5th International Workshop on Security and Trust Management (STM 2009)


N. Bielova and I. Siahaan. (Authors’ order is alphabetical order by last name)

Testing Decision Procedures for Security-by-Contract

In Proc. of Joint Workshop on Foundations of Computer Security, Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (FCS-ARSPA-WITS'08), 2008.


F. Massacci and I. Siahaan. (Authors’ order is alphabetical order by last name)

Simulating Midlet's Security Claims with Automata Modulo Theory

In Proc. of ACM SIGPLAN 3rd Workshop on Programming Languages and Analysis for Security

(PLAS 2008). ACM Digital Library, 2008.

doi:10.1145/1375696.1375698


F. Massacci and I. Siahaan. (Authors’ order is alphabetical order by last name)

Matching midlet's security claims with a platform security policy using automata modulo theory.

In Proc. of The 12th Nordic Workshop on Secure IT Systems (NordSec'07), 2007


Symposiums

F. Massacci and F. Piessens and I. Siahaan. (Authors’ order is alphabetical order by last name)

Security-By-Contract for the Future Internet

In Future Internet Symposium 2008 (FIS'08).

doi:10.1007/978-3-642-00985-3_3