General

Session on Information systems

April 15, 2026

Sauletekio ave. 11, S4 Sustainability Center hall, Vilnius, Lithuania

15:00 – 15:15
Participant Registration and Poster Setup
15:15 – 15:30
Conference Opening, Welcome Speech from head of organising comittee Prof. Dr. Diana Kalibatienė
15:30 – 15:50
Anastasija Grubinskienė, Prof. Dr. Andrius Katkevičius “Wearable Physiological Sensor Fusion for Pain Episode Detection” (VILNIUS TECH, Faculty of Electronics), oral presentation
15:50 – 18:00
Poster Session
18:00 – 18:10
Break, Poster Removal
18:10 – 18:30
Best Poster Awards and Closing Session

 

Session on Information Technology Security

April 15, 2026

Sauletekio ave. 11, S4 A08 auditorium, Vilnius, Lithuania

15:15 – 15:25
Participant Registration
15:25 – 15:30
Conference Opening, Welcome Speech from Head of Scientific Committee Prof. Dr. Nikolaj Goranin
15:30 – 21:00
Conference participants' reports:
            15:30
Dainius ČeponisA systematic review of machine and deep learning methods in operation technology intrusion detection
            15:40
Md. Sharfuzzaman SajibFault Tolerance and Data Inconsistencies in Microservices
            15:50
Felix QuainooCognitive Burden Detection Applying Keystroke Dynamics
            16:00
Aleksas ŠumskisDevOps Teams Assistant for Assessing Compliance to Information Security Requirements
            16:10
Kristijonas KlimaitisAdaptation of DevSecOps (Security in DevOps) Practices and Tools for the Needs of Small and Medium Enterprises
            16:20
Matas KutkaLiveness Detection Using Keystroke Dynamics
            16:30
Robertas NevoinasAutomatic Generation of an Initial Cyber Security Audit Report from the Organization′s Technical Data
            16:40
Darius MichalcevičiusDesign of an Autonomous Internal Network Security Assessment Prototype with AI-Based Recommendations
            16:50
Lawrence Chukwuemeka ObiNIS2 Compliance Expert System
            17:00
Gediminas UpskusEvaluation of Compliance of NIS2 Requirements Using a Neural Network
            17:10
Neha PandeyFighting Spear Phishing Attacks Using Email Honeypot
            17:20
Deividas KurmisCyber Security Management System of Smart Home Devices
            17:30
Arnold GrabštunovičIntrusion Detection by Analyzing System Function Parameter Values
            17:40
Milin Hitenkumar ParmarBackdoor Attacks on Large Language Models
            17:50
Danish RashidEvaluation of Information Security Awareness Training Effectiveness Using MCDM Methods
            18:00
Meghal MandotEnhancing Multilingual Cyberbullying Detection using Data Augmentation and Transformer Ensembles
            18:10
Ali AlizadeWeb service API vulnerability evaluation and mitigation
            18:20
Deividas NarbutasKeystroke Dynamics For Fraud Detection
            18:30
Paulius NarkevičiusPart of Software Applications given for teaching Cryptography and Information Security module
            18:40
Simonas RiškaInformation Security Document Generation System Based on Generative Artificial Intelligence
            18:50
Nurlana MuradovaBiometric Keystroke Detection Techniques for Continuous Free-Text Authentication on Multi-Platform Devices
            19:00
Shahin RahmanovResearch of secure code extraction methods for code vulnerability detection
            19:10
Agil AghazadaData leak classification Method
            19:20
Martynas PotapovasA System for Preventing the Registration of Visually Similar Domain Names
            19:30
Vlas DovydkovToward a Framework for Agentic AI-Driven Secure Software Development Lifesycle
            19:40
Airidas ŠarkūnasAgentic LLM-Driven automated penetration testing
            19:50
Mykolas JaneliauskasAdaptive Keystroke Injection with Fully Autonomous IoT Device
            20:00
Anouar LahrourCyber Incident Management Coordination System
            20:10
Joris ŠmatavičiusAutomation of Information Security Risk Assessment Using AI-Powered Language Models
            20:20
Solomon Ayodeji DalumoResearch of SQL Injection using Machine Learning Models
            20:30
Nikita PetrukApplication of Existing convolutional neural networks for host-based intrusion detection
            20:40
Akvilė ŠeikytėInvestigation of Web service API security
            20:50
Ernest StankevičInformation Security Management Process Optimization by the Means of Genetic Algorithm