Publications
Blogs
I. Siahaan.
Cyber Threat Intelligence: "Is it a mythical animal?", Published: December 03, 2021
I. Siahaan.
"We"llness not "I"llness: Cyber Security is a Shared Responsibility, Published: May 28, 2021
I. Siahaan.
Trust, but verify": Safety and Security in Critical System, Published: September 21, 2020
I. Siahaan.
Democratic Rights and Legislative Duties in the Time of COVID-19, Published: July 13, 2020
Webinars
I. Siahaan.
I. Siahaan.
Leverage AI in Threat Management
Radio Talks
I. Siahaan.
CBC Shift - NB with Vanessa Vander Valk, Saint John Cyber Security Aired: Nov. 16, 2020
Newspaper Interview
I. Siahaan.
l'Acadie Nouvelle with Alexandre Boudreau, Rançongiciel: que faire en cas d’attaque? Published: Aug. 09, 2021
Technical Reports
M. Abrishami, K. Boakye-Boateng, A. Ghorbani, I. Siahaan (Authors’ order is alphabetical order by last name)
IBM Open Data Modelling in Threat Intelligence Sharing Project
Canadian Institute for Cybersecurity (CIC) Technical Report CIC-TR05-2021
A. Al Muktadir, K. Boakye-Boateng, A. Ghorbani, I. Siahaan, D. Xu (Authors’ order is alphabetical order by last name)
Siemens Data Collection Project
Canadian Institute for Cybersecurity (CIC) Technical Report CIC-TR01-2020
K. Boakye-Boateng, K. Boldt, A. Ghorbani, R. Lu, B. Sennewald, I. Siahaan, D. Xu (Authors’ order is alphabetical order by last name)
Siemens Security Analytics Project
Canadian Institute for Cybersecurity (CIC) Technical Report CIC-TR01-2019
M. Al-Darwbi, M. Firoozjaei, A. Ghorbani, N. Mahmoudyar, I. Siahaan (Authors’ order is alphabetical order by last name)
Siemens Operational Technology (OT) Forensics
Canadian Institute for Cybersecurity (CIC) Technical Report CIC-TR01-2019
F. Massacci and I. Siahaan (Authors’ order is alphabetical order by last name)
Automata Modulo Theory (AMT)
Department of Information Engineering and Computer Science Technical Report DISI-09-027
F. Massacci and I. Siahaan (Authors’ order is alphabetical order by last name)
Inclusion Matching Implementation of Automata Modulo Theory
Department of Information Engineering and Computer Science Technical Report DISI-09-073
F. Massacci and I. Siahaan (Authors’ order is alphabetical order by last name)
Simulation Matching Implementation of Automata Modulo Theory
Department of Information Engineering and Computer Science Technical Report DISI-09-074
Journals
Piero A. Bonatti, Luca Ioffredo, Iliana M. Petrovab, Luigi Sauroa, Ida R. Siahaan (Authors’ order is alphabetical order by last name)
Real-time reasoning in OWL2 for GDPR compliance
In Artificial Intelligence. 2020.
doi:10.1016/j.artint.2020.103389
N. Bielova, N. Dragoni, F. Massacci, K. Naliuka and I. Siahaan (Authors’ order is alphabetical order by last name)
Matching in Security-by-Contract for Mobile Code
In Journal of Logic and Algebraic Programming. 2009.
doi:10.1016/j.jlap.2009.02.013
L. Desmet and W. Joosen and F. Massacci and P. Philippaerts and F. Piessens and I. Siahaan and D. Vanoverberghe. (Authors’ order is alphabetical order by last name)
Security-by-contract on the .NET platform
In Information Security Technical Report, Volume 13 Issue 1, 2008.
doi:10.1016/j.istr.2008.02.001
Conferences
K. Boakye-Boateng, I. Siahaan, A. Al Muktadir, D. Xu, A. Ghorbani
Sniffing Serial-Based Substation Devices: A Complement to Security-Centric Data Collection
The IEEE PES ISGT Europe 2021 (ISGT Europe 2021)
A. Al Muktadir, I. Siahaan, K. Boakye-Boateng, D. Xu, A. Ghorbani
Recommending Location for Placing Data Collector in the OPC Classic
The 4th IEEE International Conference on Industrial Cyber-Physical Systems (ICPS 2021).
doi:10.1109/ICPS49255.2021.9468121
Rojali, I. Siahaan
Steganography Algorithm Multi Pixel Value Differencing (MPVD) to Increase Message Capacity and Data Security
The International Conference on Mathematics: Pure, Applied and Computation (ICoMPAC 2016).
doi: 10.1063/1.4994438
Y. Muliono, I. Siahaan
A Study and Model of Automatic Mapper For ICD-9 and ICD-10 For Healthcare Provider in Indonesia
The Eleventh 2016 International Conference on Knowledge, Information and Creativity Support Systems (KICSS 2016)
I. Santoso, I. Siahaan
Privacy Modelling Of Sensitive Data in Universal Healthcare Coverage in Indonesia
The Eleventh 2016 International Conference on Knowledge, Information and Creativity Support Systems (KICSS 2016)
doi:10.1109/kicss.2016.7951437
T.W.Cenggoro, I. Siahaan
Dynamic Bandwidth Management Based on Traffic Prediction Using Deep Long Short Term Memory
2nd International Conference on Science in Information Technology (ICSITech 2016).
doi:10.1109/ICSITech.2016.7852655
G. Bruns, P. W. L. Fong, I. Siahaan, and M. Huth
Relationship-Based Access Control: Its Expression and Enforcement Through Hybrid Logic.
In Proc. of the 2nd ACM Conference on Data and Application Security and Privacy (CODASPY'2012), San Antonio, TX, USA, February 7-9, 2012. A longer version appears as Technical Report 2011/12, Department of Computing, Imperial College, London, UK..
doi:10.1145/2133601.2133616
P. W. L. Fong and I. Siahaan
Relationship-Based Access Control Policies and Their Policy Languages.
In Proc. of the 16th ACM Symposium on Access Control Models and Technologies (SACMAT'11)
doi:10.1145/1998441.1998450
R. Smith and C. Estan and S. Jha and I. Siahaan
Fast Signature Matching Using Extended Finite Automaton (XFA)
In Proc. of The 4th International Conference on Information Systems Security (ICISS 2008).
doi:10.1007/978-3-540-89862-7_15
N. Bielova, M. DallaTore, N. Dragoni, and I. Siahaan. (Authors’ order is alphabetical order by last name)
Matching Policies with Security Claims of Mobile Applications
In Proc. of The 3rd InternationaL Conference on Availability, Reliability and Security (ARES'08).
doi:10.1109/ARES.2008.96
N. Dragoni, F. Massacci, K. Naliuka, and I. Siahaan. (Authors’ order is alphabetical order by last name)
Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code.
In Proc. of EuroPKI'07, Springer-Verlag, 2007
doi:10.1007/978-3-540-73408-6_21
Workshops
F. Massacci and I. Siahaan (Authors’ order is alphabetical order by last name)
Optimizing IRM with Automata Modulo Theory
In the 5th International Workshop on Security and Trust Management (STM 2009)
N. Bielova and I. Siahaan. (Authors’ order is alphabetical order by last name)
Testing Decision Procedures for Security-by-Contract
In Proc. of Joint Workshop on Foundations of Computer Security, Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (FCS-ARSPA-WITS'08), 2008.
F. Massacci and I. Siahaan. (Authors’ order is alphabetical order by last name)
Simulating Midlet's Security Claims with Automata Modulo Theory
In Proc. of ACM SIGPLAN 3rd Workshop on Programming Languages and Analysis for Security
(PLAS 2008). ACM Digital Library, 2008.
doi:10.1145/1375696.1375698
F. Massacci and I. Siahaan. (Authors’ order is alphabetical order by last name)
Matching midlet's security claims with a platform security policy using automata modulo theory.
In Proc. of The 12th Nordic Workshop on Secure IT Systems (NordSec'07), 2007
Symposiums
F. Massacci and F. Piessens and I. Siahaan. (Authors’ order is alphabetical order by last name)
Security-By-Contract for the Future Internet
In Future Internet Symposium 2008 (FIS'08).
doi:10.1007/978-3-642-00985-3_3