1. Do We Really Need Reference-based Phishing Detection? Unleashing the Power of GNN
  2. Tailai Song (Politecnico di Torino); Pedro Casas (AIT Austrian Institute of Technology); Michela Meo (Politecnico di Torino)

  3. On LLM Embeddings for Vulnerability Management
  4. Rustam Talibzade, Francesco Bergadano, Idilio Drago (University of Turin)

  5. Analysing the Energy consumption of a DNS resolver
  6. Nicolas Renout, Gatien Roujanski (Télécom SudParis); Sandoche Balakrichenan (Afnic); Jehan Procaccia, Michel Marot (Télécom SudParis); Benoit Ampeau (Afnic)

  7. Lightweight Traffic Classification: A Simple Baseline Matching Deep Learning Performance
  8. Jaroslav Pesek, Jan Luxemburk, Karel Hynek (CESNET & Czech Technical University in Prague)

  9. Toward transparent and trustworthy attribution of cyberthreats
  10. Ing. Matej Havranek (Czech Technical University, Faculty of Information Technology); Ing. Peter Kalnai, PhD. (ESET Research); CSc. prof. Ing. Hana Kubatova (Czech Technical University, Faculty of Information Technology)

  11. FREKit: A Flexible Simulator for Probabilistic Congestion and Rerouting in Multi-Protocol Networks
  12. Juan Vanerio (University of Vienna, AIT Austrian Institute of Technology); Pedro Casas (AIT Austrian Institute of Technology); Stefan Schmid (TU Berlin)

  13. State of UDP scanners on the Internet
  14. Sina Rostami, Taha Albakour, Tiago Heinrich (Max Planck Institute for Informatics)

  15. WHOactuallyIS? Finding the Companies Behind the Networks
  16. Joshua Levett, Poonam Yadav, Vassilios Vassilakis (University of York)

  17. Towards agnostic Operational Technology (OT) honeypot fingerprinting
  18. Arthur Cordeiro, Emmanouil Vasilomanolakis (Technical University of Denmark)

  19. Graph Neural Networks for Graph-Level Anomaly Detection in Network Intrusion Detection
  20. Georgios Anyfantis, Ismael Castell-Uroz, Pere Barlet-Ros (Universitat Politècnica de Catalunya)

  21. Building Block for the Internet Digital Twin: Scalable and Automated Internetwork Emulator
  22. Joshua Levett, Poonam Yadav, Vassilios Vassilakis (University of York)

  23. Measuring the Effects of Guaranteed Bit Rate on 5G Cell Resource Allocation and Throughput
  24. Dominik Krah, Stefan Farthofer-Oster (Salzburg Research)

  25. Towards Intelligent Resource Allocation in Highly-distributed Content Delivery Networks Using Graph Neural Networks
  26. Juan Vanerio (University of Vienna, AIT Austrian Institute of Technology); Pedro Casas (AIT Austrian Institute of Technology); Stefan Schmid (TU Berlin)

  27. TSGFM – Towards a Graph Foundation Model for Time Series Analysis in Network Monitoring
  28. Hamid Latif-Martínez (UPC Universitat Politècnica de Catalunya); Pedro Casas (AIT Austrian Institute of Technology); José Suárez-Varela (Telefonica Research); Albert Cabellos-Aparicio, Pere Barlet-Ros (UPC Universitat Politècnica de Catalunya)

  29. Rolling the DICE: A Device Identification and Classification Engine to Detect Vulnerable Devices Facing the Internet
  30. Ricardo Yaben, Emmanouil Vasilomanolakis (Technical University of Denmark)

  31. Impact of road congestion on mobile networks
  32. Alexandre Vogel (UCLouvain); Dena Markudova, Andra Lutu (Telefónica Research); Cristel Pelsser (UCLouvain)

  33. Characterizing the Trust Dilemma: Comparing Web Security of Malicious and Benign Domains
  34. Rebecka Lindkvist, Linn Petersson, Carl Magnus Bruhner (Linköping University); David Hasselquist (Linköping University & Sectra Communications); Martin Arlitt (Corelight); Niklas Carlsson (Linköping University)