


default search action
CNS 2025: Avignon, France
- IEEE Conference on Communications and Network Security, CNS 2025, Avignon, France, September 8-11, 2025. IEEE 2025, ISBN 979-8-3315-3856-9

- Jihyeon Song, Kyungmin Park, Cheolhee Park, Ikkyun Kim:

Analysis of QoS Degradation Attacks in Multi-Slice Containerized 5G Core Networks. 1-6 - Md Sajidul Islam Sajid, Jinpeng Wei, Ehab Al-Shaer:

ranDecepter: Real-Time Identification and Deterrence of Ransomware Attacks. 1-9 - Helena Celestino Maia, Calum Brown, John Dooley:

A Physical Layer Chaotic Encryption Method for a Wireless OFDM system. 1-6 - Ashwin Koshy John, Sai Tarrun Pitta, Jaya Dofe, Jai Gopal Pandey:

Hardware Trojan Detection with Machine Learning and Power Side-Channels: A Post-Deployment Analysis. 1-6 - Stavros Dimou, Guevara Noubir:

ARGOS: Anomaly Recognition and Guarding through O-RAN Sensing. 1-11 - Tharushi Nehara, Chanmini Kavinya Samaraweera, Oshan Nettasinghe, Ashen Nethsara, Chamara Sandeepa, Tharindu Gamage, Madhusanka Liyanage:

DistilGuard - Large Language Models for Poisoning Detection in Federated Learning. 1-9 - Jam Mogavero, Rebecca Belval, Erwin Franz, Christopher Rouff, Ali Tekeoglu:

An Autonomic Resilient Electrical Grid for a University Campus. 1-6 - Afia Anjum, Arkajyoti Mitra, Paul Agbaje, Md. Ahanaful Alam, Debashri Roy, Md. Salik Parwez, Habeeb Olufowobi:

SemPerGe: Unveiling Text-Based Adversarial Attacks on Semantic Communication. 1-9 - Shengjie Xu, Yi Qian:

Dynamic Trust Scoring for Zero Trust at the Edge: A Multi-Factor, Context-Aware Approach. 1-6 - Shokooh Khandan, Deniz Beyazgul, Olamide Jogunola, Yakubu Tsado, Tooska Dargahi:

Explainable AI-Driven Threat Detection and Response for Industrial IoT. 1-6 - Hexuan Yu, Md Mohaimin Al Barat, Yang Xiao, Y. Thomas Hou, Wenjing Lou:

Closing the Visibility Gap: A Monitoring Framework for Verifiable Open RAN Operations. 1-9 - Wenjia Wang, Seyed Masoud Sadjadi, Naphtali Rishe, Arpan Mahara:

A Minimal Overlay-Based Framework for Transitioning Legacy Infrastructure to Zero Trust. 1-6 - Yasaman Vaziri, Ali Hassan Sodhro:

Energy-Aware Smart Routing for Biomedical Waste Management via Secure Edge Intelligence in 6G-Enabled CPS. 1-5 - Sang-Yoon Chang, Sourav Purification:

Securing Cellular Availability: The Wireless Blackhole Threat and Defense. 1-9 - Hiu Chi Sit, Aysan Esmradi, Daniel Wankit Yip, Peng Sun:

An Effective and Robust Similarity-Based Phishing Website Detector in Cyber-Physical Systems. 1-6 - Tianwei Lan, Farid Naït-Abdesselam:

LAMLAD: LLM-Based Adversarial Attack Against Machine Learning for Android Malware Detection. 1-9 - Jaxson Brown, Duc-Son Pham, Sieteng Soh, Foad Motalebi, Sivaraman Eswaran, Mahathir Almashor:

ICS-SimLab: A Containerized Approach for Simulating Industrial Control Systems for Cyber Security Research. 1-6 - Alexios Lekidis, Maka Karalashvili, Leandros Maglaras, Konstantinos Karantzalos, George Spanoudakis:

Intelligent Security Operation Centre Services for Critical National Infrastructures. 1-2 - Pattaraporn Khuwuthyakorn, Orawit Thinnukool, Abdullah Lakhan:

A Federated Flower Learning-Empowered Intrusion Detection System for Vehicle 6G Fog Networks. 1-6 - Zixu Tian, Rishika Varma Kalidindi, Mohan Gurusamy:

Dual-Branch Transformer for Anomaly-Based Intrusion Detection from Multivariate KPIs in the 5G User Plane. 1-9 - Pramitha Fernando, Pawani Porambage, Madhusanka Liyanage, Kris Steenhaut, An Braeken:

Securing xApps in Open RAN: A Hierarchical Approach to Authentication and Authorisation. 1-9 - Aliu Akinwale, Wentao Gao, Jiawei Li, Ang Li, Xiaojun Shang, Yanchao Zhang, Dianqi Han:

Practical Reflection Manipulation on mmWave-Based Physical Intrusion Detection. 1-9 - Sourav Purification, Sang-Yoon Chang:

Verifiable Alerts for 4G/5G Public Warning System. 1-9 - Tsung-Yen Hsieh, Po-Hung Chen, Cheng-Feng Hung, Shin-Ming Cheng:

Enabling Hybrid Edge-Level Threat Detection in O-RAN Private Networks for Resilience Enhancement. 1-6 - Md Taef Uddin Nadim, Qinghua Li:

CAPTure: Classifying APT Stages and Techniques via Graph-Enhanced Network Flow Representations. 1-9 - Sudeepa Panta, Qinghua Li:

Non-Linear Polynomial Approximations of the Sigmoid for Plain and Encrypted Models. 1-9 - Ichrak Eddor Mnijli, Amal Sammoud, Guillaume Terrasson, Nicolas Huloux, Mariem El Feki:

Lightweight Biometric Authentication Mechanism Using PPG Signals for WBAN: IEEE CNS 25 Poster. 1-2 - Dora Zivanovic, Jy-Chin Liao, Zhambyl Shaikhanov, Hou-Tong Chen, Chun-Chieh Chang, Sadhvikas Addamane, Daniel M. Mittleman, Edward W. Knightly:

MetaHeart: Spoofing Vibrational Biometrics via Dynamic Metasurfaces. 1-9 - Evangelia Konstantopoulou, Valeria Loscrì, Nicolas Sklavos:

HITL-EdgeSec: A Human-in-the-Loop Autoencoder Framework for Anomaly Detection in 6G Edge Networks. 1-5 - Tanesh Kumar, Zainab Alwaisi, Abhishek K. Gupta, Nitin Auluck, Petri Mähönen:

Analyzing Sustainable Security for 6G Networks. 1-7 - Zhou Xu, Guyue Li, Zhe Peng, Aiqun Hu:

Collusion-Driven Impersonation Attack on Channel-Resistant RF Fingerprinting. 1-9 - Ildi Alla, Valeria Loscrì:

Sec5GLoc: Securing 5G Indoor Localization via Adversary-Resilient Deep Learning Architecture. 1-9 - Andrea De Filippis, Danilo Dell'Orco, Lorenzo Valeriani, Alessio Merlo, Giuseppe Bianchi:

Dearming Android Apps at Install Time: The StegoDefender Case: IEEE CNS 25 Poster. 1-2 - Bruno Paes Leao, Jagannadh Vempati, Gaurav Kumar Srivastava, Siddharth Bhela, Jesse Keller, Priyanjan Sharma:

Operational Impact-Driven Cybersecurity Risk Assessment for Industrial Cyber-Physical Systems. 1-9 - Alessandro Brighente, Leonardo Cipolletta, Mauro Conti, Ludovico Latini:

Are Flow Correlation Attacks Effective on Tor? A Critical Evaluation of State-of-the-Art Proposals. 1-9 - Kyle Stein, Brandon Blackwell, Ernest Funue, Matthew Dees, Shari Watkins, Lanier A. Watkins:

Applying Prompt-Based Mitigation of Gender-Role Bias in Large Language Models for Security. 1-6 - Jorrit Olthuis, Bas Arendsen, Savio Sciancalepore, Nicola Zannone:

Impact of Acoustic Injection Attacks on Micro-UAVs. 1-11 - Xiang-Cian You, Arijit Karati:

Seeing Through the Threat: Adaptive Attention-Guided Backdoor Defense in Non-IID Federated Learning. 1-9 - Joe Rose, Marco M. Cook, Filip Holík, Dimitrios Pezaros:

We're eBPF'd: Exploring Adversarial Manipulation of ELF Files in eBPF-Based Programmable Network Stacks. 1-9 - Jia Wang, Ruitao Cheng, Abdullah Lakhan:

Next-Generation Deep Learning Integrated Drone Security: A 6G-Powered Enabled Edge Cloud Architecture. 1-6 - Isaiah Henry-Simpson, Hortencia Mendoza, Anjie Shen, Xuecheng Wang, Yinzhi Cao, Lanier Watkins:

Dark Drones: Can They Be Automatically Detected and Mitigated? 1-6 - Maham Aurang Zaib, Shams ur Rehman, Erum Malik, Qurat-Ul-Ain Mastoi:

Explainable AI in Tabular Medical Data: A Path to Trustworthy Healthcare Decisions. 1-9 - Anum Talpur, Jannik Schröder, Liliana Kistenmacher, Georg T. Becker, Wolfram Wingerath, Mathias Fischer:

Tagging Alerts to Adversaries: ML-Enabled Classification Using MITRE ATT&CK. 1-9 - Jingcheng Li, Loukas Lazos, Ming Li:

Securing OFDM-Based ISAC Systems Against Sensing Attacks. 1-9 - Carlos Hernandez Gañán, Siôn Lloyd, Sam Cheadle, Samaneh Tajalizadehkhoob:

From Uptime to Remediation Speed: Advancing DNS Abuse Mitigation Metrics. 1-9 - Mohamed Amine Ben Haj Salah, Romain Laborde, Daniele Canavese, Abdelmalek Benzekri, Mohamed Ali Kandi, Afonso Ferreira:

XCId: An SSI-Based Cross-Cloud Identity Wallet. 1-9 - Wakiya Schulz, Clemens Fritzsch, Tobias Rosenkranz, Pascal Ahr, Antonio Saavedra, Lars Renkes, Christoph Lipps, Jörn Hoffmann:

Analysis of SRAM-Based PUFs on AMD Xilinx UltraScale+ FPGAs IEEE CNS 25 Poster. 1-3 - Kevin Röbert, Dominik Kaaser, Mathias Fischer:

Enhancing Privacy Through Unlinkable Data Sharing with User-in-the-Loop Access Control. 1-9 - Qi Han, Jiamin Deng, Shichang Huang, Yu Lit, Guyue Li, Shan Jiang, Zhe Peng:

Adversarial Graph Perturbation for Smart Contract Vulnerability Detection. 1-9 - Heeyun Kim, Fabian Zuluaga Zuluaga, Collins Evans, Siddhartha R. Dalal, Vishal Misra, Dan Rubenstein:

Real-Time Risk Scoring of Ongoing Cyber Attacks. 1-6 - Sunwoo Lee, Woo-Hyun Choi, Hyuk Lim, Seunghyun Yoon:

Evaluating Post-Quantum Cryptography for Resource-Constrained AMI Gateways. 1-2 - Sheng Liu, Panos Papadimitratos:

Safeguarding Federated Learning-Based Road Condition Classification. 1-9 - Lalith Medury, Luke Robinson, Farah I. Kandah:

GANFUSION: GAN-Fused Synthetic Injection for Obfuscating Network Traffic Analysis. 1-9 - Nawaz Ali, Fiza Siyal, Gianluca Aloi, Fahed Alkhabbas, Raffaele Gravina, Ali Hassan Sodhro:

Energy-Efficient Workload orchestration for 6G Vehicular Edge Computing. 1-6 - Nora Basha, Bechir Hamdaoui, Attila A. Yavuz, Thang Hoang, Mehran Mozaffari Kermani:

Secret-Key Agreement Through Hidden Markov Modeling of Wavelet Scattering Embeddings. 1-9 - Woo-Hyun Choi, Sunwoo Lee, Hyuk Lim, Seunghyun Yoon:

Causal Graph-Based Root Cause Analysis for ICS Sensor Streams. 1-2 - Shiyuan Xu, Xue Chen, Yan Zhao, Shang Gao, Jing Wang, Siu-Ming Yiu:

MulShare: A Multi-Receiver Encrypted Search Scheme to Secure Cloud-Assisted EMRs Sharing. 1-9 - Nexhi Sula, Abhinav Kumar, Han Wang, Jie Hou, Reza Tourani:

Silver Linings in the Shadows: Harnessing Membership Fingerprinting for Machine Unlearning. 1-9 - Uttam Ghosh, Laurent Njilla, Kristen E. Oguno, Debashis Das:

GNN-Based Self-Healing for Detection and Recovery of Compromised Nodes in Mission-Critical Supply Chains. 1-6 - Kavyan Zoughalian, Muhammad Aitsam, Jims Marchang, Alessandro G. Di Nuovo:

Guardians of Privacy: Leveraging LLMs in Assistive Robotic Systems for Healthcare. 1-6 - Heetkumar Patel, Suresh Kumar Amalapuram, Saurabh Kumar, Bheemarjuna Reddy Tamma:

IoT - FedMalDetect: Federated Learning Based Malware Detection for IoT Edge Devices. 1-9 - Muhammad Irfan, Gabriele Oligeri, Savio Sciancalepore:

Shifting Signatures: The Ephemeral Nature of the Radio Fingerprint on the USRP X310. 1-6 - Kylie McClanahan, Marie Louise Uwibambe, Qinghua Li:

Optimizing the Selection of Vulnerability Remediation Actions in Operational Technology Environments. 1-6 - Liliana Kistenmacher, Anum Talpur, Mathias Fischer:

Real-Time Detection of Multi-Stage Attacks Using Kill Chain State Machines. 1-9 - Haytham Albousayri, Bechir Hamdaoui, Weng-Keen Wong, Nora Basha:

Bluetooth Fingerprint Identification Under Domain Shift Through Transient Phase Derivative. 1-9 - Nick Y. P. Cheng, Raymund Lin, Dean Xie, Hank Lin, Sally Chen:

iThelma: An Autonomous LLM Agent for Cyber Threat Hunting via Playbook-Driven Intelligence. 1-6 - Mehmet Ugurbil, Dimitris Mouris, Manuel B. Santos, José Cabrero-Holgueras, Miguel de Vega, Shubho Sengupta:

Fission: Distributed Privacy-Preserving Large Language Model Inference. 1-9 - Adrian Rosén, Gurjot Singh Gaba, Andrei V. Gurtov:

A Strategic Roadmap for Phased Zero Trust Architecture Implementation in Organizations. 1-6 - Zheshuo Li, Lingfeng Tao, Yidian Hu, Zhengxiong Li:

PlasTrack: Path-Independent Plasma-Induced Attacks on mmWave Sensing Tracking. 1-9 - Menatallah Fadoua Slama, Hiba Guerrouache, Yacine Challal, Karima Benatchba, Riyadh Baghdadi:

Lightening Encrypted Convolutions: A GPU-Optimized Approach to Private Inference. 1-9 - Sonay Caner-Yildirim, Isabella Corradini, Vesna Dimitrova, Valeria Loscrì, Miranda Harizaj:

Gender and Intersectional Bias in Cybersecurity for Next Generation Wireless Networks. 1-6 - Pedro Rigon, Honghao Fu, Weverton Cordeiro, Carol Fung:

Comprehensive Post-Quantum Cryptography Performance Evaluations for QUIC Protocol. 1-9 - Masahito Kumazaki, Hirokazu Hasegawa, Hiroki Takakura:

Applicability of LLM in Assessing the Reliability of Members to Mitigate Internal Threats. 1-6 - Saiqin Xu, Shuo Wang, Savio Sciancalepore, Alessandro Brighente, Mauro Conti:

Confundus: Mitigating Hostile Wireless Source Localization. 1-10 - Tanveer Khan, Mindaugas Budzys, Antonis Michalas:

Split Happens: Combating Advanced Threats with Split Learning and Function Secret Sharing. 1-9 - Pierpaolo Bene, Andrea Bernardini, Leonardo Sagratella, Nicolò Maunero, Marina Settembre:

Optimizing Local LLM Deployment for 5G CVE Classification Avoiding External Data Exposure. 1-3 - Omar Adel Ibrahim, Roberto Di Pietro:

Echo: On the Limitations of Noise-Based Radio Fingerprinting Obfuscation. 1-9 - Ziqi Xu, Jingcheng Li, Loukas Lazos, Ming Li:

A Trust-Aware POMDP Framework for Thwarting Data Falsification Attacks in Cooperative Driving. 1-9 - Ali Recai Yekta, Nicolas Loza, Jens Gramm, Michael Peter Schneider, Stefan Katzenbeisser:

UDS Attack Taxonomy: Systematic Classification of Vehicle Diagnostic Threats. 1-8 - Cinzia Bernardeschi, Adriano Fagiolini, Dario Pagani, Christian Quadri:

Statistical Model Checking for the Analysis of Attacks in Connected Autonomous Vehicles. 1-6 - Aaron Hunter:

Logic, Belief Propagation and Misinformation. 1-2 - Asbat EI Khairi, Andreas Peter, Andrea Continella:

PROCATCH: Detecting Execution-Based Anomalies in Single-Instance Microservices. 1-9 - Sang Wu Kim, Chenyu Xu:

Embedding Covert Signals in Federated Learning: IEEE CNS 25 Poster. 1-2 - Qingli Zeng, Abdalrahman Bashir, Farid Naït-Abdesselam:

UAVIDS-2025: A Benchmark Dataset for Intrusion Detection in UAV Networks Using Machine Learning Techniques. 1-9 - Jolahn Vaudey, Stéphane Mocanu, Gwenaël Delaval, Éric Rutten:

Reconfiguration of Firewall Filter Rules as a Response to Industrial Control System Intrusion. 1-6 - Jagdeep Singh, Sanjay K. Dhurandher, Isaac Woungang:

A Bayesian Trust-Based Secured Routing Protocol for Opportunistic Networks. 1-6 - Osama Iskandarani, Boubakr Nour, Makan Pourzandi, Mourad Debbabi, Chadi Assi:

Anticipating the Evolution of APT Variants Using Generative AI and Reinforcement Learning. 1-10 - Dolantina Hyka, Jurgen Meçaj, Festim Kodra, Marija S. Milosevic, Vladimir M. Ciric:

Cybersecurity Awareness and Education for Young Internet Users: A Comprehensive Analysis of Prevention Strategies. 1-5 - Oliver Zeidler, Daniel Fraunholz, Julian Sturm, Hartmut König, Wolfgang Kellerer:

Performance Evaluation of 5G Roaming Security Based on PRINS. 1-10 - Awaneesh Kumar Yadav, Eshika Choudhary, Onkar Garg, Madhusanka Liyanage:

Post-Quantum Secure Lattice-Based 5G-AKA Protocol Resistant to Malicious Serving Networks with Perfect Forward Secrecy. 1-9

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














