Program at a Glance
Provisional Program subject to changes
Timing used is CET/UTC+1h

| Day 1 – Wednesday, December 4 | |
| Time | Event | 
| 08:30 – 09:15 | Registration | 
| 09:15 – 09:30 | 
            Opening Conference | 
| 9:30 – 10:45 | 
            Technical Session #1:Innovative Security Solutions for IoT and Cyber-Physical Systems  A Robust Anonymous Authentication Scheme for Securing IoT-Enabled Healthcare Services
              Systems Optimising Intrusion Detection in Cyber-Physical Systems Advanced Anomaly Detection in Energy Control Systems Using Machine Learning and Feature Engineering | 
| 10:45 – 11:15 | Coffee break | 
| 11:15 – 12:30 | 
            Short papers Session #1: Innovations in Intrusion Detection and Threat Mitigation  Dynamic Defense Framework: A Unified Approach for Intrusion Detection and Mitigation in SDN Introspective Intrusion Detection System Through Explainable AI Lightweight Machine Learning-Based IDS for IoT Environments Effective Anomaly Detectionin 5G Networks via Transformer-Based Modelsand Contrastive Learning A Machine Learning-Based Model for Exhaustion Attacks in Wireless Sensor Networks | 
| 12:30 – 13:30 | Lunch break | 
| 13:30 – 14:30 | 
            Keynote #1: AI-native 6G networks: security needs | 
| 14:30 – 15:00 | Coffee break | 
| 15:00 – 16:55 | 
            Technical Session #2:  Blockchain & AI Innovations in Security and Privacy   Blockchain-Enabled Digital Product Passports for Enhancing Security and Lifecycle Management in Healthcare Devices  Blockchain-Enhanced E-Ticket Distribution System to Effective Transactions, Validation, and Audits  Blockchain-Enabled Collaborative Forged Message Detection in RSU-Based VANETs  SDN-API-Sec: A Conflict-Free BC-Based Authorization for Cross-Domain SDNs  Keystroke Dynamics Authentication with MLP, CNN, and LSTM on a Fixed-Text Data Set | 
| 17:00 | Welcome Reception | 
| Day 2 – Thursday, December 5 | |
| Time | Event | 
| 08:45 – 09:00 | Registration | 
| 9:00 – 10:40 | 
            Technical Session #3:AI Detection and Defense Techniques for Emerging Threats Detecting DNS Tunnelling and Data Exfiltration Using Dynamic Time Warping Chat or Trap? Detecting Scams in Messaging Applications with Large Language Models Ransomwise: A Transaction-Based Dataset for Ransomware Bitcoin Wallet Detection VishGuard: Defending Against Vishing | 
| 10:40 – 11:00 | Coffee break | 
| 11:00 – 12:15 | 
            Short papers Session #2: Machine Learning and AI for Cybersecurity  Spam No More: A Cross-Model Analysis of Machine Learning Techniques and Large Language Model Efficacies Predicting User Activities and Device Interactions Using Adversarial Sensor Data: A Machine Learning Approach Anticipating Cyber Threats: Deep Learning Approaches for DDoS Attacks Forecasting Identifying APT Attack Stages Using Anomaly Score Calibration Convergence of AI for Secure Software Development | 
| 12:15 – 13:30 | Lunch break / Posters Session #1 A Multi-Level Network Traffic Classification in Combating Cyberattacks Using Stack Deep Learning Models Password Classification Using Machine Learning and Natural Language Processing Techniques: Methods and Evaluations Detecting Spam Emails Using Machine Learning and Lemmatization Vs Traditional Methods A Machine Learning Approach of Predicting Ransomware Addresses in BlockChain Networks Towards an Unsupervised Reward Function for a Deep Reinforcement Learning Based Intrusion Detection System  | 
| 13:30 – 14:30 | 
            Keynote #2: Self-sovereign Identity: a solid technology that meets the requirements of national digital identity management systems | 
| 14:30 – 16:10 | 
            Technical Session #4:  Cyber Threat Intelligence and Defense Strategies  A New Generation of Security for the 6G  AsIf: Asset Interface Analysis of Industrial Automation Devices  An Efficient Explainable Artificial Intelligence (XAI)-Based Framework for a Robust and Explain- able IDS  FASIL: A Challenge-Based Framework for Secure and Privacy-Preserving Federated Learning | 
| 16:10 – 16:40 | Coffee break | 
| 16:40 – 18:00 | 
            Technical Session #5:  Novel AI Approaches to Cybersecurity Challenges  APT Warfare: Technical Arsenal and Target Profiles of Linux Malware in Advanced Persistent Threats  Security and Privacy-Preserving for Machine Learning Models: Attacks, Countermeasures, and Future Directions  DID U Misbehave? A New Dataset for In-Depth Understanding of Inconspicuous Software | 
| 19:00 | Conference Dinner | 
| Day 3 – Friday, December 6 | |
| Time | Event | 
| 08:45 – 09:15 | Registration | 
| 9:15 – 10:30 | 
            Technical Session #6:Emerging Threats and AI Detection Techniques Towards Identification of Network Applications in Encrypted Traffic
 An Autonomic Chess Bot Detection and Defeat System A Hybrid Machine Learning – Fuzzy Cognitive Map Approach for Fast, Reliable DDoS Attack Detection | 
| 10:30 – 11:00 | Coffee break | 
| 11:00 – 12:30 | 
            Short papers Session #3:  Security in Distributed and IoT Environments Kubernetes-Driven Network Security for Distributed ACL Management Towards the Removal of Identification and Authentication Authority from IM Systems Pirates of the MQTT: Raiding IIoT Systems with a Rogue Client A New Similarity-Based Classification Scheme of Drone Network Attacks Blockchain and Biometric Systems Integration for IoMT Security Regulatory Compliance Verification: A Privacy Preserving Approach | 
| 12:30 – 13:30 | Lunch break / Posters Session #2 A Situational Assessment Module for CCAM Applications Adaptive Optimization of TLS Overhead for Wireless Communication in Critical Infrastructure Interdisciplinary Research Project ‘AI Shield’ Mobbing: AI-Powered Cyberthreat Behavior Analysis and Modeling | 
| 13:30 – 14:30 | 
            Keynote #3: AI for biometrics  | 
| 14:30 – 16:10 | 
            Technical Session #7: Advances in Machine Learning for Cybersecurity  Cross ML for Io(H)T Network Traffic Classification: A New Approach Towards Standardization  Advanced Smart Contract Vulnerability Detection Using Large Language Models  Advanced Machine Learning Approaches for Zero-Day Attack Detection: A Review  AI Security: Cyber Threats and Threat-Informed Defense | 
| 16:10 – 16:20 | Closing Conference & Awards | 

 
					 
					 
					 
			 
			 
			



