Abstract is missing.
- Nomad: Accelerating Geo-distributed Learning with Client TransfersBart Cox, Lydia Y. Chen, Jérémie Decouchant. 1-8 [doi]
- Continuous behavioral authentication using mouse dynamics based on Artificial IntelligenceFrancisco Javier Nóvoa, Daniel Garabato, Alvaro Sarmiento, Mario Casado, Ignasi de José, Carlos Dafonte. 1-8 [doi]
- Keycloak-SSI: Post-Authentication Attribute Verification in Federated Identity Management Using Self-Sovereign IdentityMauladi, Ramin Yahyapour. 9-16 [doi]
- QoE-Driven Optimization of ZFS for Performance-Aware File Sharing PlatformsCamila Murad Veille, Lamine Amour, Scott Fowler, Sami Souihi. 17-24 [doi]
- Learning-Augmented Distributed DirectoriesSwapnil Guragain, Bibek Maharjan, Sushant Bhattarai, Gokarna Sharma, Pavan Poudel. 25-34 [doi]
- Congested by the Past: The Dataset Lag in Network Traffic AnalysisNimesha Wickramasinghe, Sanjay K. Jha, Gene Tsudik, Arash Shaghaghi. 35-38 [doi]
- NC-LoRaSim: A No-Code LoRaWAN Simulation Framework with NS-3Mohamed-Ali Hadj Amor, Ismail Bennis. 39-42 [doi]
- Distributed Resource Selection for Self-Organising Cloud-Edge SystemsQuentin Renau, Amjad Ullah, Emma Hart. 43-50 [doi]
- Dynamic Membership Management and Data Sharding in Edge-Enabled Publish/Subscribe SystemsJaime Saramago, João A. Silva, Hervé Paulino, João M. Lourenço. 51-58 [doi]
- Network-efficient authenticated pseudonym-based V2X communications with constant revocation costsMattia Trabucco, Giovanni Gambigliani Zoccoli, Mirco Marchetti, Luca Ferretti. 59-68 [doi]
- An Analytical Model for Distributed Video Analytics in Mobile Computer Vision-based SystemsMichael Lesko-Krleza, Rodolfo W. L. Coutinho, Yousef R. Shayan. 69-73 [doi]
- Road Sight Unit: Edge Image Processing for Vehicle Trajectory and Collision PredictionJosé Cutileiro, Pedro Rosa, Orlando Remédios, Miguel L. Pardal. 74-78 [doi]
- A Framework for Detecting Secure Web Traffic Over VPNs: HTTPS and QUICYuan Tian, Shou-Hsuan Stephen Huang. 79-86 [doi]
- Network Connection Management Based on the Integration of Artificial Intelligence for IT Operations and Threat Intelligence DatabasesFrancisco Valderlan Jorge Nobre, Ramon S. Araujo, Davi O. Alves, Erick S. Nascimento, Lyedson S. Rodrigues, Rafael L. Gomes. 95-102 [doi]
- ProvSpider: A Robust and Universal Toolkit for Binary Provenance Analysis Using Deep LearningZhiwei Fu, Hanbo Yu, Xinyu Hu, Steven H. H. Ding, Furkan Alaca, Philippe Charland. 103-110 [doi]
- Privacy-Preserving Clusterized Federated Learning Framework for Energy ForecastingAmaia Gil-Lerchundi, Lucía Muñoz-Solanas, Antonio Nappa, Izar Azpiroz. 111-114 [doi]
- Rûm: Multivalued Loss-Tolerant Byzantine Consensus for Mobile Ad-Hoc NetworksJoão Pedro, Guilherme Ramos, David R. Matos. 115-122 [doi]
- When Buildings Blur the Lines: Revealing the Hidden Performance Equivalences in MANET Routing ProtocolsHugo Le Dirach, Marc Boyer, Emmanuel Lochin. 123-130 [doi]
- Don't Stop Receiving: Ensuring Availability of Critical Services on Compromised Mobile DevicesTom Van Eyck, Stefan More, Florian Draschbacher, Sam Michiels, Danny Hughes 0001. 131-140 [doi]
- Ensemble Machine Learning for UAV Network Intrusion Detection: Comprehensive Analysis Using the UAV-NIDD DatasetAnis Charfi, Samiha Ayed, Lamia Chaari, Georgi Tsochev. 141-148 [doi]
- Addressing Decentralized LoRaWAN-Based Wildfire Monitoring in Forested EnvironmentsMaurizio Giacobbe, Giuseppe Tricomi, Antonio Puliafito, Marco Scarpa. 149-156 [doi]
- ELTO: Energy-Latency Trade-off Optimization for Machine Learning Inference with Dynamic BatchingIvan Dokuchaev, Ali Kadhum Idrees, Rolf Schuster. 157-164 [doi]
- Towards Scalable O-RAN Resource Management: Graph-Augmented Proximal Policy OptimizationDuc-Thinh Ngo, Kandaraj Piamrat, Ons Aouedi, Thomas Hassan, Philippe Raipin Parvédy. 165-173 [doi]
- Hypergraphic Partitioning Framework for Static and Adaptive Quantum CircuitsWaldemir Cambiucci, Regina Melo Silveira. 174-181 [doi]
- Geometric Swarm Flocking with OWC ConstraintsKerrian Aziza, Massinissa Tighilt, Binh-Minh Bui-Xuan. 182-185 [doi]
- Exploring Standard-Compliant Channel Access Enhancements for dense LoRaWANChékra El Fehri, Nouha Baccour. 186-189 [doi]
- Thwarting ROP Attacks and Unveiling User Level Stack Tampering through Kernel Shadow StackMarco Calavaro, Pasquale Caporaso, Giuseppe Bianchi 0001, Francesco Quaglia. 190-199 [doi]
- Player infrastructure for Attack and Defense Capture The Flag CompetitionsAndrea Artioli, Edoardo Torrini, Lorenzo Rossi, Francesco Mecatti, Mauro Andreolini. 200-208 [doi]
- RevealNet: Distributed Traffic Correlation for Attack Attribution on Programmable NetworksGurjot Singh, Alim Dhanani, Diogo Barradas. 209-218 [doi]
- Defending Network Intrusion Detection Systems Based on Graph Neural Networks Against Structural Adversarial AttacksDimitri Galli, Andrea Venturi, Dario Stabili, Mauro Andreolini, Mirco Marchetti. 219-228 [doi]
- Systematic Risk Analysis of Multi-Stage Attacks in Zonal Automotive E/E ArchitectureRamakrishnan Pitchaimani, Sébastien Canard, Badis Hammi, Aurel Sorin Spornic. 229-238 [doi]
- Leaf-Link: Experiences Deploying Battery-Free Wireless Forest SensingShuaibu Musa Adam, Van Vu Bui, Lowie Goossens, Sam Michiels, Ka Lok Man, Danny Hughes 0001. 239-246 [doi]
- Spark: Smart Building Fire Prediction And Risk AnalysisAnik Pramanik, Mukesh Kumar, Nisha Panwar, Laramie V. Potts, Jainam Shah, Shantanu Sharma. 247-254 [doi]
- Anomaly Detection in the Internet of Medical Things: Design and Evaluation of a Cross Layer DatasetRui P. Pinto, Bruno M. C. Silva, Pedro R. M. Inácio. 255-262 [doi]
- Compliance Verification of 5G Service Level Agreements using Event-BRiham Badra, Lazhar Hamel, Layth Sliman, Ralp Bou Nader. 263-266 [doi]
- MisConfAI: A Framework for Detecting Configuration Vulnerabilities in Complex SystemsSavi Juneja, Geeta Yadav. 267-275 [doi]
- EvoChain: A Recovery Approach for Permissioned Blockchain ApplicationsFrancisco Faria, Samih Eisa, David R. Matos, Miguel L. Pardal. 276-285 [doi]
- Bonsai: A Recovery Approach for Ethereum ERC-20 TransactionsDiogo Melita, David R. Matos, Miguel L. Pardal. 286-294 [doi]
- Adversarially Robust and Interpretable Magecart Malware DetectionPedro Pereira, José Gouveia, João Vitorino, Eva Maia, Isabel Praça. 295-299 [doi]
- CC2C: Confidential Channel-to-Channel Data Exchange in a Permissioned BlockchainEmanuel Nunes, Samih Eisa, Miguel L. Pardal, Mário Calha. 300-303 [doi]
- Demo: Flute, a Plug and Play Battery-Free Wireless Sensing PlatformVan Vu Bui, Shuaibu Musa Adam, Sam Michiels, Huynh Nguyen Bao Phuong, Danny Hughes 0001. 304-305 [doi]
- Poster: Multi-Agent LLM System for Cisco Router ConfigurationMichal Rozsíval, Petr Matousek, Jaromír Kotala. 306-307 [doi]
- Poster: Targeted Evasion of Malware Detection Using Adversarial Machine LearningOlga Kurasova, Viktor Medvedev, Juozapas Rokas Cypas, Juozas Dautartas. 308-309 [doi]
- Poster: Secure Lifecycle Management of Confidential Virtual Machines in Public CloudsJoão Sereno, Daniel Castro, Nuno Santos, Luis Rodrigues. 310-311 [doi]
- An Approach to Blockchain Voting for RWA GovernanceNuno Braz. 312-313 [doi]
- Poster: Characterization of Dominant and Specific Network Patterns in Industrial Control SystemsAsya Mitseva, Marco Lewandowsky, Andriy Panchenko 0001. 314-315 [doi]
- Poster: Exploring Standard-Compliant Channel Access Enhancements for dense LoRaWANChékra El Fehri, Nouha Baccour. 316-317 [doi]
- Poster: Fully Dynamic Global Traffic Scheduling Prioritizing Emergency Vehicles and PlatoonsShlomi Dolev, Ehud Gudes, Amit Hendin, Hannah Yair. 318-319 [doi]
- Magecart Malware Detection with Feature EngineeringPedro Pereira, José Gouveia, João Vitorino, Eva Maia, Isabel Praça. 320-321 [doi]
- Poster: SALAD-Nets: Synthesizing Adaptive, Accelerated, and Distributed Network FunctionsRui Miguel, Luis Pedrosa, Fernando M. V. Ramos. 322-323 [doi]
- Poster - A Preliminary Music Data Collector for Networked Music PerformanceLamine Amour, Andrea Bareggi. 324-325 [doi]
- Poster: Quality Threat Intelligence to Enhance Cyber Security in the Public AdministrationDiogo Agostinho, Nikhil Tulcidas, Miracle Aniakor, Hugo Miranda, Pedro M. Ferreira, Ana Respício. 326-327 [doi]
- Energy-Aware Adaptive Security for Smart Farming (EAASF): A Hybrid IDS-IPS Framework with SDN-Orchestrated for Agriculture 4.0Seyed Jamal Mirsadri, Ricardo Chaves, Luis Pedrosa. 328-329 [doi]