


default search action
12th NTMS 2025: Paris, France
- 12th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2025, Paris, France, June 18-20, 2025. IEEE 2025, ISBN 979-8-3315-5276-3
- Alina Fesu, Nathan Shone, Áine MacDermott
, Bo Zhou, Max Eiza:
Comparative Analysis of SNN and CNN Models for Energy Efficient Intrusion Detection. 1-7 - Pragya Kaushik, Faheem Ullah, Muhammad Imran Taj:
Mapping Industry Demands for Digital Forensics: A Study of Penetration Tester Requirements. 8-16 - Muhannad AlBreiki, Faisal Alazemi, Niyat Seghid, Azka Wani, Farkhund Iqbal:
Forensic Examination of iOS Platform Artifacts: A Comparative Multi-Tool Study Using Publicly Available Data. 17-25 - Anis Charfi, Samiha Ayed, Lamia Chaari:
Drone Security in Connected Agriculture: Threats, Datasets, and AI-Driven Solutions. 26-33 - Amal Hbaieb, Samiha Ayed, Lamia Chaari:
A Novel SDN-Driven IDS Framework for the Internet of Vehicles. 34-42 - Younes Ifourah, Landry Tchouapi Pouyap, Saadi Boudjit, Samia Bouzefrane, Amar Balla, Ryma Boussaha:
Towards a Secure Modular Drone-Based Hardware Architecture for IoT-Enabled Traffic Safety in Intelligent Transportation Systems. 43-50 - Benjamin Yankson, Rebecca Bondzie, Santino Resciniti, Danielle Marquez, Nelson Chow, Tosan Atele-Williams:
Enhancing Digital Forensics in Higher Education: The Role of Experiential Learning in Bridging the Skills Gap. 51-57 - Iqra Ambreen, Muhammad Aatif, Zunera Jalil, Farkhund Iqbal, Andrew Marrington
:
PViT: A Hybrid Model for Deepfake Face Detection using Patch Vision Transformers and Deep Learning. 58-66 - Hamed Alawadhi, Belal AlGhafri, Niyat Habtom, Farkhund Iqbal:
Unlocking Digital Evidence Utilizing Save Wizard for PS4 in Forensic Analysis. 67-72 - Lucas Vancina, Geoffrey Xie:
A Case for Enabling Delegation of 5G Core Decisions to the RAN. 73-79 - Mamadou Aliou Diallo, Mohamed Amine Ouamri, Muhammad Imran Khalid, Asma Komal, Elhadj Moustapha Diallo, Abuzar B. M. Adam:
Multi-Modal Deep Reinforcement Learning Framework for Interference-Limited RIS-Assisted UAV Wireless Network. 80-85 - Mohamed Amine Ouamri, Abuzar B. M. Adam, Mohammed A. M. Elhassan:
Quantum Deep Reinforcement Learning for Secure Multi-User UAV RSMA Networks. 86-92 - Hussein Kazem, Youakim Badr, Nour El Madhoun, Pierrick Conord:
Digital Signature Quantification in the Bitcoin Blockchain: A Statistical Approach. 93-99 - Brigitte Lonc, Farah-Emma Braiteh, Francesca Bassi:
Hybrid Key Exchange and Signature Design for Quantum-safe C-ITS. 100-108 - Jonathan Brossard:
Advances in Lightweight Cross-Architecture Procedural Debugging. 109-114 - Damianos Diasakos, Nikolaos Prodromos, Apostolos Gkamas, Vasileios Kokkinos
, Christos Bouras, Philippos Pouyioutas:
Distinguishing Signal from Noise in 5G MIMO Systems Using Generative Adversarial Networks. 115-121 - Mirna Haidar, Yasser Fadlallah, Hadi E. Sawaya, Abed Ellatif Samhat:
Coded Caching in Wireless Local Area Networks. 122-128 - Achraf Sayah, Said Aqil, Mohamed Lahby:
Hybrid Metaheuristics-Driven Distributed Task Scheduling for Latency-Sensitive Edge Data Processing. 129-135 - Adnan Imeri, Oussama Gharsallaoui, Thierry Grandjean, Uwe Roth:
A Blockchain-based data management approach for swarm-edge computing. 136-143 - Mohammed Ibrahim El-Hajj, Ahmad Fadlallah, Ali El Attar, Rida Khatoun:
Energy-Efficient Cryptography for Green Computing: Optimizing Algorithms to Reduce Energy Consumption Without Sacrificing Security. 144-151 - Emil P. Andersen, Ola Vanni Flaata, Frank T. Johnsen:
Edge Computing with Kubernetes: KubeEdge in 5G, SATCOM, and Tactical Networks. 152-160 - Flavien Dermigny, Vania Conan, Samia Bouzefrane, Pengwenlong Gu, Youakim Badr, Jean-Marc Montenot:
Enhancing Security and Privacy in 5G Bubbles with Zero-Knowledge Proofs: A Comparative Analysis. 161-167 - Rayan Kanawati
, Nadira Lammari, Adam Faci, Nada Mimouni:
Towards a Situational Aware-Based Cybersecurity Remediation. 168-173 - Farah-Emma Braiteh, Davy Tse, Ounas Yhia, Francesca Bassi, Rida Khatoun:
A Secure and Cooperative Departure Protocol for Connected Automated Platoons. 174-182 - Hervé Chabanne, Vincent Despiegel, Damien Monet:
Biometric Private Embeddings. 183-185 - Hervé Chabanne, Alberto Ibarrondo:
Turnstile cookies: A new root of trust for personhood credentials. 186-188 - Lilia Hannachi, Kotikalapudi Sriram, Doug Montgomery:
Analysis of Propagation of Regular, Extended, and Large BGP Communities. 189-195 - Muharrem Atakan Sentürk, Serif Bahtiyar:
A Survey on Large Language Models in Phishing Detection. 196-204 - Nicollas R. De Oliveira, Gabriel A. Campos, Igor R. Alves, João André C. Watanabe, Rodrigo De Souza Couto, Igor M. Moraes, Dianne Scherly Varela de Medeiros, Diogo M. F. Mattos:
Quantization Effects on Large Language Models for Intent-Based Network Management. 205-212 - Thierry Isaac N'Kouka, Tatiana Aubonnet, Frédéric Lemoine, Mounir Kellil, Noëmie Simoni:
Traffic Prediction Improvement in 5G and beyond: AI and Self-Controlled Components. 213-216 - Adam Kadi, Lyes Khoukhi, Jouni Viinikka, Pierre-Edouard Fabre:
Refining Intrusion Detection in the Age of QUIC: Leveraging Machine Learning for Enhanced Security. 217-222 - Aymene Selamnia, Lyes Khoukhi, Mondher Ayadi, Zakaria Abou El Houda:
Enhancing IIoT Security with Deep Reinforcement Learning for Intrusion Detection. 223-228 - Guilherme Nunes Nasseh Barbosa, Martin Andreoni, Diogo M. F. Mattos:
Leveraging Zero Trust for Enhanced Security and Connectivity in Ad-Hoc Mesh Networks. 229-237 - Kamel Abbad, Lyes Khoukhi, Lionnel Mesnil, Alain Alliot:
Enhancing Maritime Cybersecurity with Advanced Anomaly Detection using Semi-Markov Processes. 238-243 - Abdou-Essamad Jabri, Cyril Drocourt
, Mostafa Azizi, Gil Utard:
DAPIS: A Secure Proxy Re-encryption Protocol for Delegated Authentication and Privacy Management. 244-251 - Alkistis Aikaterini Sigourou, Zoya Dyka, Sze Hei Li, Peter Langendoerfer, Ievgen Kabin:
Revisiting Atomic Patterns for Elliptic Curve Scalar Multiplication Revealing Inherent Vulnerability to Simple SCA. 252-258 - Mehmet Semih Saydam, Seyyit Alper Sert, Güven Yenihayat, Ege Orkun Gamgam:
A Novel Clustering Framework for Military High Performance Mobile Ad-Hoc Networks. 259-264 - Konstantinos Tsioutas, Ioannis Doumanis, Konstantinos Dalezios, Dora Siafla, Konstantinos Tiligadis:
Evaluating Emotional Responses to Experimental Video Art. 265-271 - Burcu Sönmez Sarikaya, Serif Bahtiyar:
A Novel Framework for Adversarial DoS Attack Generation on UAVs. 272-279 - Mohammed El-Hajj, Ali El Attar, Ahmad Fadllallah, Rida Khatoun:
Securing Fault Diagnosis in IoT-Enabled Industrial Systems Using Homomorphic Encryption. 280-287 - Roberto O. Andrade, Jenny Torres, Patricio Zambrano:
Counter-Argument: Ecuador's Progress in Cyberpolicy and Cybersecurity Strategy. 288-291 - Khaled Abbaci, Fayçal M'hamed Bouyakoub, Ikram Chegroune, Massinissa Mouhoub:
A Smart System for Detecting High-Risk Areas of Epidemic Spread. 292-299 - Ranjit Kannappan, Julien Hatin, Emmanuel Bertin, Noël Crespi:
Enhancing Digital Product Passport Through Decentralized Digital Twins. 300-308 - Rachid Rebiha, Sofia Rebiha Decesaro:
Multi-Centered Attack-Surface-Driven Threat Modeling: Securing Healthcare Systems. 309-316 - Walid El Gadal, Sudhakar Ganti:
Federated Secure Intelligent Intrusion Detection and Mitigation Framework for SD-IoT Networks using ViT-GraphSAGE and Automated Attack Reporting. 317-325 - Ahmet Eren Gündogdu, Ebu Yusuf Güven:
WebScan: A Comprehensive Static and Dynamic Analysis Approach for Web Application Security. 326-329 - Melike Baser
, Serif Bahtiyar:
Adversarial Attacks on Faster R-CNN Model for Object Detection in Autonomous Vehicles. 330-336 - Maham Misbah, Haleema Sadia, Nasir Saeed:
DCA-Net: Advanced Small Object Detection Scheme for UAVs Using Contextual Feature Extraction. 337-343 - Abdelhamid Garah, Nader Mbarek, Sergey Kirgizov:
Fuzzy Logic-Based IoT Object Integrity Self-Management. 344-351 - Martín Randall, Santiago Paternain, Pedro Casas, Federico Larroca, Pablo Belzarena:
User Association in Wireless Networks with Distributed GNN-Based Reinforcement Learning. 352-360 - Jamal Haydar, Linda Kanaan, Ali Mokdad, Ali Beydoun:
Network Traffic Fingerprinting for IoT Device Identification Using Machine Learning. 361-369 - Ali Rachini, Souheil Taouk, Maroun Abi Assaf, Rida Khatoun:
Advancing Intrusion Detection: A Deep Analysis of Anomalies and Network Protocol Vulnerabilities. 370-376 - Muthupavithran Selvam, Zeba Khanam, Amit Kumar Singh, Zhan Cui, Muttukrishnan Rajarajan:
CD2A: Continuous Device-to-Device Authentication Exploiting Crystal Oscillator Impurities. 377-385

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.