The researchers below were distinguished invited speakers at previous ICETE conferences.
We are indebted to them for their contribution to heighten the conference level.
2022 |2021 |2020 |2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004
2022
Cyber Security When IT Meets OT
Sokratis K. Katsikas, Norwegian University of Science and Technology, Norway
Don’t Tell Me The Cybersecurity Moon Is Shining… (Cybersecurity Show and Tell)
Luca Vigano, King's College London, United Kingdom
2021
Access Control Convergence: Challenges and Opportunities
Ravi Sandhu, University of Texas San Antonio, United States
VEST: An Early Warning System for Future Cyber-Attacks
V. S. Subrahmanian, Dartmouth College, United States
Privacy-Preserving Analytics in the Big Data Environment
Jaideep Vaidya, Rutgers Business School, United States
2020
Enterprise Systems Architecture - Essentials
Henderik A. Proper, Luxembourg Institute of Science and Technology, Luxembourg
eHealth Monitoring Using Wireless Communication Protocols and Intelligent Systems
Jaime Lloret Mauri, Universidad Politecnica de Valencia, Spain
Industry 4.0: Challenges from a Data Science Perspective
Ajith Abraham, Machine Intelligence Research Labs (MIR Labs), United States
Secure Computation Protocol: A Technology for Our Time
Moti Yung, Columbia University, United States
Analysing Digital Footprints to Infer the Health of Populations and Individuals
Ingemar Johansson Cox, University of Copenhagen, United Kingdom
2019
Security for Connected Vehicles in Cyberspace
Jalel Ben-Othman, University of Paris 13, France
Cooperative Communications, Distributed Coding and Machine Learning
Soon Xin Ng, School of Electronics and Computer Science, University of Southampton, SO17 1BJ, U.K., --- Select a Country ---
2018
Forensic Challenges on Multimedia Analytics, Big Data and the Internet of Things
Zeno Geradts, Netherlands Forensic Institute, Netherlands
The Past, Present and Future of Business Process Management
Jan Mendling, Vienna University of Economics and Business, Austria
Scientific Research vs Bug Hunting
Ismael Ripoll, Universitat Politècnica de València, Spain
The CLOUD: Trigger for a Socio-Economic Revolution
Tobias Hoellwarth, EuroCloud Europe, Austria
Storing Critical Data in the Cloud: Challenges and Solutions
Miguel P. Correia, Universidade de Lisboa, Portugal
2017
Representation and Learning of Structured Dynamic Bayesian Models in Non Stationary Environments
Carlo Regazzoni, University of Genova, Italy
Directions in Security Research
Jan Camenisch, IBM Research - Zurich, Switzerland
Speeding up the execution of numerical computations and simulations with rCUDA
Jose Duato, UPV, Spain
Advances and Future Challenges in Machine Learning and Knowledge Extraction
Andreas Holzinger, Medical University Graz, Austria
2016
Tactile Internet Design Challenges-Network Perspective
Hamid Aghvami, King's College London, United Kingdom
Revisiting control/data plane separation in Software Defined Networking
Giuseppe Bianchi, University of Roma Tor Vergata, Italy
User Acceptance of Internet of Things (IoT) Services and Applications
Anastasios Economides, University of Macedonia, Greece
Runtime Aware Architectures
Mateo Valero, Universidad Politecnica de Catalunya, Spain
Attribute-Based Access Control Status and Directions
Indrakshi Ray, Colorado State University, United States
2015
Integrating Retail and e-Commerce using Web Analytics and Intelligent Sensors
Anthony C. Boucouvalas, University of Peloponnese, Greece
Cloud Computing - State-of-the-Art and Future Research Trends
Eleni Karatza, Aristotle University of Thessaloniki, Greece
Future SDN - Reconfiguration Heartland, Challenge and Revolution
Andrew Moore, University of Cambridge, United Kingdom
Connecting Services to the Web of Data
John Domingue, The Open University, United Kingdom
2014
A Need-based Assessment for Building a National Cyber Security Workforce
Seymour Goodman, Georgia Institute of Technology, United States
Democratization in Science and Technology through Cloud Computing
Ivona Brandić, Vienna UT, Austria
Model-driven Development of Multi-View Modelling Tools - The MUVIEMOT Approach
Dimitris Karagiannis, University of Vienna, Austria
Social Business Intelligence - OLAP Applied to User Generated Contents
Matteo Golfarelli, University of Bologna, Italy
Advanced Persistent Threats & Social Engineering
Edgar Weippl, University of Vienna, SBA Research, Austria
2013
A Data-as-a-Service Framework for IoT Big Data
Laurence T. Yang, St Francis Xavier University, Canada
IP-Oriented QoS and QoE in the Next Generation Networks - Application to Wireless Networks
Pascal Lorenz, University of Haute Alsace, France
The Smart Grid and the Internet should be Friends
Donal O'Mahony, Trinity College Dublin, Ireland
Instantaneous Frequency Analysis
David Naccache, Ecole Normale Superieure, France
2012
Making Sense of All Things Handwritten - From Postal Addresses to Tablet Notes
Venu Govindaraju, University at Buffalo, United States
A Mission-centric Framework for Cyber Situational Awareness
Sushil Jajodia, George Mason University Fairfax, United States
On Knowledge Discovery and Interactive Intelligent Visualization of Biomedical Data - Challenges in Human–Computer Interaction & Biomedical Informatics
Andreas Holzinger, Medical University Graz, Austria
Cyberinfrastructure for eScience and eBusiness from Clouds to Exascale
Geoffrey C. Fox, Indiana University, United States
A Perspective of the Networks of the Future and Smart Cities
Luis M. Correia, IST/IT-Technical University of Lisbon, Portugal
2011
WIMAX? - A Case Study on Minimizing Construction Cost for IEEE 802.16j Multi-hop Relay Networks
Han-Chieh Chao, National Ilan University, Taiwan, Republic of China
BIOMETRICS PRIVACY - Technologies and Applications
Vincenzo Piuri, Università degli Studi di Milano, Italy
FACE BIOMETRICS WITHOUT INTRUSION IN AIRPORT
Enrique Cabello, Universidad Rey Juan Carlos, Spain
PARADIGMS OF DISTRIBUTED SOFTWARE SYSTEMS - Services, Processes, and Self-organization
Winfried Lamersdorf, University of Hamburg, Germany
2010
CHAOTIC QUANTUM CRYPTOGRAPHY - The Ultimate for Network Security
Stamatios Kartalopoulos, University of Oklahoma, United States
NANONETWORKS - A New Frontier in Communications
Ian F. Akyildiz, Georgia Institute of Technology, United States
INFORMATION SECURITY - The SCAN – Secure Processor with Crypto-Biometrics Capabilities
Nikolaos Bourbakis, Wright State University, United States
FROM NATURE TO METHODS AND BACK TO NATURE
Petar M. Djuric, Stony Brook University, United States
2009
ADAPTIVE ANTENNAS IN WIRELESS COMMUNICATION NETWORKS
Blagovest Shishkov, Bulgarian Academy of Sciences, Bulgaria
PROTECTING INFORMATION PRIVACY IN THE ELECTRONIC SOCIETY
Pierangela Samarati, University of Milan, Italy
CLOUD COMPUTING - Fundamental Architecture & Future Applications
Frank Leymann, University of Stuttgart, Germany
WEB 2.0: A BUZZWORD, A SERIOUS DEVELOPMENT, JUST FUN, OR WHAT?
Gottfried Vossen, University of Münster, Germany
E-BUSINESS DESIGN - A Shift to Adaptability
David Marca, University of Phoenix, United States
2008
Cryptographic Algorithms: Successes, Failures and Challenges
Bart Preneel, Katholieke Universiteit Leuven, Belgium
e-Business Innovation: Surviving the Coming Decade
David A. Marca, University of Phoenix, United States
Improving Reliability in Commercial IP Networks
Yaakov Kogan, AT&T Labs, United States
Rethinking Digital Signatures
Ueli Maurer, Swiss Federal Institute of Technology (ETH), Switzerland
Watermarking, Steganography and Content Forensics
Ingemar Cox, University College London, United Kingdom
Next Generation CDMA Technologies for Futuristic Wireless Communications
Hsiao-hwa Chen, National Sun Yat-sen University, Taiwan, Republic of China
The importance of Metrology in Wireless Communication Systems – From AM/FM to SDR Systems
Nuno Borges Carvalho, Instituto de Telecomunicacoes, Universidade de Aveiro, Portugal
2007
Cross-Layer Resource Allocation in Satellite Networks
Franco Davoli, University of Genoa, Italy
Pragmatic Computing
Kecheng Liu, University of Reading, United Kingdom
Infrastructures for Authentication, Authorization and Privilege Management Scope, Evaluation and Use in the Access-eGov Project
Günther Pernul, University of Regensburg, Germany
Recent Trends in the Design of Video Signal Processing IPs and Multimedia SoCs
Santanu Dutta, nVIDIA Corporation, United States
Future and Challenges of the Security of e-Systems and Computer Networks
Mohammad S. Obaidat, Fordham University, NY, United States
Utility Computing: Reality and Beyond
Ivan Ivanov, SUNY Empire State College, United States
2006
Wireless Communications, a New emphasis for Effective Use of the Radio Spectrum
Les Barclay, Barclay Associates Ltd, United Kingdom
e-Business Strategy: Charting a Way through Uncertain Waters of Electronic Commerce
David A. Marca, University of Phoenix, United States
Redefining the Market Place: Only the Numbers are Different?
Thomas J. Greene, M.I.T., United States
Multimedia Representation in MPEG Standards: Achievements and Challenges
Fernando Pereira, Instituto Superior Técnico - Instituto de Telecomunicações, Portugal
Model-based Security Engineering
Jan Jurjens, , Germany
Advances in Speech and Audio Coding and its applications for Mobile Multimedia
Anisse Taleb, Ericsson AB, Sweden
IT Security Forensics: Promises and Shortcomings
Manu Malek, Stevens Institute of Technology, United States
2005
Biometrics and Cryptography
Susanne Wetzel, Stevens Institute of Technology, United States
Trends and Challenges in Wireless Networks
Mohammad S. Obaidat, Fordham University, NY, United States
Agents, Emergence and Modelling: What Value for Communication Networks?
Mark d'Inverno, Westminster University, United Kingdom
The Evolution of Security: Network Intrusion Prevention
Rohit Dhamankar, TippingPoint, United States
Real world threats and opportunities with smartphones
David Wood, Symbian, United Kingdom
Usability, Perceived Credibility and Trust : Users' Perspectives to Security and Privacy
Yin-Leng Theng, Nanyang Technological University, Singapore
2004
E-Business Security and Information Assurance
Manu Malek, Stevens Institute of Technology, United States
Toward Identifying the Attack Source by Deterministic Packet Marking
Nirwan Ansari, New Jersey Institute of Technology, United States
Fundamental Challenges of Next Generation Information Retrieval
Henry Tirri, Department of Computer Science, University of Helsinki, Finland
TraSH: A Transport Layer Handoff Protocol for Mobile Terrestrial and Space Networks
Mohammed Atiquzzaman, University of Oklahoma, United States