| 2025 | 23rd International Symposium on Network Computing and Application, NCA 2025, Lisbon, Portugal, November 5-7, 2025 |
| 2025 | A Framework for Detecting Secure Web Traffic Over VPNs: HTTPS and QUIC. Yuan Tian, Shou-Hsuan Stephen Huang |
| 2025 | Addressing Decentralized LoRaWAN-Based Wildfire Monitoring in Forested Environments. Maurizio Giacobbe, Giuseppe Tricomi, Antonio Puliafito, Marco Scarpa |
| 2025 | Adversarially Robust and Interpretable Magecart Malware Detection. Pedro Pereira, José Gouveia, João Vitorino, Eva Maia, Isabel Praça |
| 2025 | An Analytical Model for Distributed Video Analytics in Mobile Computer Vision-based Systems. Michael Lesko-Krleza, Rodolfo W. L. Coutinho, Yousef R. Shayan |
| 2025 | An Approach to Blockchain Voting for RWA Governance. Nuno Braz |
| 2025 | Anomaly Detection in the Internet of Medical Things: Design and Evaluation of a Cross Layer Dataset. Rui P. Pinto, Bruno M. C. Silva, Pedro R. M. Inácio |
| 2025 | Bonsai: A Recovery Approach for Ethereum ERC-20 Transactions. Diogo Melita, David R. Matos, Miguel L. Pardal |
| 2025 | CC2C: Confidential Channel-to-Channel Data Exchange in a Permissioned Blockchain. Emanuel Nunes, Samih Eisa, Miguel L. Pardal, Mário Calha |
| 2025 | Compliance Verification of 5G Service Level Agreements using Event-B. Riham Badra, Lazhar Hamel, Layth Sliman, Ralp Bou Nader |
| 2025 | Congested by the Past: The Dataset Lag in Network Traffic Analysis. Nimesha Wickramasinghe, Sanjay K. Jha, Gene Tsudik, Arash Shaghaghi |
| 2025 | Continuous behavioral authentication using mouse dynamics based on Artificial Intelligence. Francisco Javier Nóvoa, Daniel Garabato, Alvaro Sarmiento, Mario Casado, Ignasi de José, Carlos Dafonte |
| 2025 | Defending Network Intrusion Detection Systems Based on Graph Neural Networks Against Structural Adversarial Attacks. Dimitri Galli, Andrea Venturi, Dario Stabili, Mauro Andreolini, Mirco Marchetti |
| 2025 | Demo: Flute, a Plug and Play Battery-Free Wireless Sensing Platform. Van Vu Bui, Shuaibu Musa Adam, Sam Michiels, Huynh Nguyen Bao Phuong, Danny Hughes |
| 2025 | Distributed Resource Selection for Self-Organising Cloud-Edge Systems. Quentin Renau, Amjad Ullah, Emma Hart |
| 2025 | Don't Stop Receiving: Ensuring Availability of Critical Services on Compromised Mobile Devices. Tom Van Eyck, Stefan More, Florian Draschbacher, Sam Michiels, Danny Hughes |
| 2025 | Dynamic Membership Management and Data Sharding in Edge-Enabled Publish/Subscribe Systems. Jaime Saramago, João A. Silva, Hervé Paulino, João M. Lourenço |
| 2025 | ELTO: Energy-Latency Trade-off Optimization for Machine Learning Inference with Dynamic Batching. Ivan Dokuchaev, Ali Kadhum Idrees, Rolf Schuster |
| 2025 | Energy-Aware Adaptive Security for Smart Farming (EAASF): A Hybrid IDS-IPS Framework with SDN-Orchestrated for Agriculture 4.0. Seyed Jamal Mirsadri, Ricardo Chaves, Luis Pedrosa |
| 2025 | Ensemble Machine Learning for UAV Network Intrusion Detection: Comprehensive Analysis Using the UAV-NIDD Dataset. Anis Charfi, Samiha Ayed, Lamia Chaari, Georgi Tsochev |
| 2025 | EvoChain: A Recovery Approach for Permissioned Blockchain Applications. Francisco Faria, Samih Eisa, David R. Matos, Miguel L. Pardal |
| 2025 | Exploring Standard-Compliant Channel Access Enhancements for dense LoRaWAN. Chékra El Fehri, Nouha Baccour |
| 2025 | Geometric Swarm Flocking with OWC Constraints. Kerrian Aziza, Massinissa Tighilt, Binh-Minh Bui-Xuan |
| 2025 | Hypergraphic Partitioning Framework for Static and Adaptive Quantum Circuits. Waldemir Cambiucci, Regina Melo Silveira |
| 2025 | Keycloak-SSI: Post-Authentication Attribute Verification in Federated Identity Management Using Self-Sovereign Identity. Mauladi, Ramin Yahyapour |
| 2025 | Leaf-Link: Experiences Deploying Battery-Free Wireless Forest Sensing. Shuaibu Musa Adam, Van Vu Bui, Lowie Goossens, Sam Michiels, Ka Lok Man, Danny Hughes |
| 2025 | Learning-Augmented Distributed Directories. Swapnil Guragain, Bibek Maharjan, Sushant Bhattarai, Gokarna Sharma, Pavan Poudel |
| 2025 | Magecart Malware Detection with Feature Engineering. Pedro Pereira, José Gouveia, João Vitorino, Eva Maia, Isabel Praça |
| 2025 | MisConfAI: A Framework for Detecting Configuration Vulnerabilities in Complex Systems. Savi Juneja, Geeta Yadav |
| 2025 | NC-LoRaSim: A No-Code LoRaWAN Simulation Framework with NS-3. Mohamed-Ali Hadj Amor, Ismail Bennis |
| 2025 | Network Connection Management Based on the Integration of Artificial Intelligence for IT Operations and Threat Intelligence Databases. Francisco Valderlan Jorge Nobre, Ramon S. Araujo, Davi O. Alves, Erick S. Nascimento, Lyedson S. Rodrigues, Rafael L. Gomes |
| 2025 | Network-efficient authenticated pseudonym-based V2X communications with constant revocation costs. Mattia Trabucco, Giovanni Gambigliani Zoccoli, Mirco Marchetti, Luca Ferretti |
| 2025 | Nomad: Accelerating Geo-distributed Learning with Client Transfers. Bart Cox, Lydia Y. Chen, Jérémie Decouchant |
| 2025 | Player infrastructure for Attack and Defense Capture The Flag Competitions. Andrea Artioli, Edoardo Torrini, Lorenzo Rossi, Francesco Mecatti, Mauro Andreolini |
| 2025 | Poster - A Preliminary Music Data Collector for Networked Music Performance. Lamine Amour, Andrea Bareggi |
| 2025 | Poster: Characterization of Dominant and Specific Network Patterns in Industrial Control Systems. Asya Mitseva, Marco Lewandowsky, Andriy Panchenko |
| 2025 | Poster: Exploring Standard-Compliant Channel Access Enhancements for dense LoRaWAN. Chékra El Fehri, Nouha Baccour |
| 2025 | Poster: Fully Dynamic Global Traffic Scheduling Prioritizing Emergency Vehicles and Platoons. Shlomi Dolev, Ehud Gudes, Amit Hendin, Hannah Yair |
| 2025 | Poster: Multi-Agent LLM System for Cisco Router Configuration. Michal Rozsíval, Petr Matousek, Jaromír Kotala |
| 2025 | Poster: Quality Threat Intelligence to Enhance Cyber Security in the Public Administration. Diogo Agostinho, Nikhil Tulcidas, Miracle Aniakor, Hugo Miranda, Pedro M. Ferreira, Ana Respício |
| 2025 | Poster: SALAD-Nets: Synthesizing Adaptive, Accelerated, and Distributed Network Functions. Rui Miguel, Luis Pedrosa, Fernando M. V. Ramos |
| 2025 | Poster: Secure Lifecycle Management of Confidential Virtual Machines in Public Clouds. João Sereno, Daniel Castro, Nuno Santos, Luis Rodrigues |
| 2025 | Poster: Targeted Evasion of Malware Detection Using Adversarial Machine Learning. Olga Kurasova, Viktor Medvedev, Juozapas Rokas Cypas, Juozas Dautartas |
| 2025 | Privacy-Preserving Clusterized Federated Learning Framework for Energy Forecasting. Amaia Gil-Lerchundi, Lucía Muñoz-Solanas, Antonio Nappa, Izar Azpiroz |
| 2025 | ProvSpider: A Robust and Universal Toolkit for Binary Provenance Analysis Using Deep Learning. Zhiwei Fu, Hanbo Yu, Xinyu Hu, Steven H. H. Ding, Furkan Alaca, Philippe Charland |
| 2025 | QoE-Driven Optimization of ZFS for Performance-Aware File Sharing Platforms. Camila Murad Veille, Lamine Amour, Scott Fowler, Sami Souihi |
| 2025 | RevealNet: Distributed Traffic Correlation for Attack Attribution on Programmable Networks. Gurjot Singh, Alim Dhanani, Diogo Barradas |
| 2025 | Road Sight Unit: Edge Image Processing for Vehicle Trajectory and Collision Prediction. José Cutileiro, Pedro Rosa, Orlando Remédios, Miguel L. Pardal |
| 2025 | Rûm: Multivalued Loss-Tolerant Byzantine Consensus for Mobile Ad-Hoc Networks. João Pedro, Guilherme Ramos, David R. Matos |
| 2025 | Spark: Smart Building Fire Prediction And Risk Analysis. Anik Pramanik, Mukesh Kumar, Nisha Panwar, Laramie V. Potts, Jainam Shah, Shantanu Sharma |
| 2025 | Systematic Risk Analysis of Multi-Stage Attacks in Zonal Automotive E/E Architecture. Ramakrishnan Pitchaimani, Sébastien Canard, Badis Hammi, Aurel Sorin Spornic |
| 2025 | Thwarting ROP Attacks and Unveiling User Level Stack Tampering through Kernel Shadow Stack. Marco Calavaro, Pasquale Caporaso, Giuseppe Bianchi, Francesco Quaglia |
| 2025 | Towards Scalable O-RAN Resource Management: Graph-Augmented Proximal Policy Optimization. Duc-Thinh Ngo, Kandaraj Piamrat, Ons Aouedi, Thomas Hassan, Philippe Raipin Parvédy |
| 2025 | When Buildings Blur the Lines: Revealing the Hidden Performance Equivalences in MANET Routing Protocols. Hugo Le Dirach, Marc Boyer, Emmanuel Lochin |