{"id":413,"date":"2025-09-27T11:13:28","date_gmt":"2025-09-27T11:13:28","guid":{"rendered":"https:\/\/csnet-conference.org\/2025\/?page_id=413"},"modified":"2025-10-18T09:58:10","modified_gmt":"2025-10-18T09:58:10","slug":"program","status":"publish","type":"page","link":"https:\/\/csnet-conference.org\/2025\/program\/","title":{"rendered":"Program"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"413\" class=\"elementor elementor-413\">\n\t\t\t\t<div class=\"elementor-element elementor-element-47ac342 e-flex e-con-boxed e-con e-parent\" data-id=\"47ac342\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2b83f98 elementor-widget elementor-widget-text-editor\" data-id=\"2b83f98\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h2><span style=\"color: #279ccf;\"><strong>Program<\/strong><\/span><\/h2>\n<div>\n<h4 style=\"text-align: center;\"><span style=\"text-decoration-line: underline;\"><a href=\"https:\/\/csnet-conference.org\/2025\/wp-content\/uploads\/2025\/10\/CSNet2025_Program.pdf\"><span style=\"font-weight: bold;\">You can find here a downloadable PDF version of the program.<\/span><\/a><\/span><\/h4>\n<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9dd2b3e elementor-widget elementor-widget-image\" data-id=\"9dd2b3e\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"737\" src=\"https:\/\/csnet-conference.org\/2025\/wp-content\/uploads\/2025\/10\/program_at_a_glance_v4-1024x737.png\" class=\"attachment-large size-large wp-image-493\" alt=\"\" srcset=\"https:\/\/csnet-conference.org\/2025\/wp-content\/uploads\/2025\/10\/program_at_a_glance_v4-1024x737.png 1024w, https:\/\/csnet-conference.org\/2025\/wp-content\/uploads\/2025\/10\/program_at_a_glance_v4-300x216.png 300w, https:\/\/csnet-conference.org\/2025\/wp-content\/uploads\/2025\/10\/program_at_a_glance_v4-768x553.png 768w, https:\/\/csnet-conference.org\/2025\/wp-content\/uploads\/2025\/10\/program_at_a_glance_v4-1536x1106.png 1536w, https:\/\/csnet-conference.org\/2025\/wp-content\/uploads\/2025\/10\/program_at_a_glance_v4.png 1611w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e13c65c e-flex e-con-boxed e-con e-parent\" data-id=\"e13c65c\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-137dc78 programTitleTD eael-table-align-center eael-dt-th-align-left elementor-widget elementor-widget-eael-data-table\" data-id=\"137dc78\" data-element_type=\"widget\" data-widget_type=\"eael-data-table.default\">\n\t\t\t\t\t\t\t<div class=\"eael-data-table-wrap\" data-table_id=\"137dc78\" id=\"eael-data-table-wrapper-137dc78\" data-custom_responsive=\"false\">\n\t\t\t<table class=\"tablesorter eael-data-table center\" id=\"eael-data-table-137dc78\">\n\t\t\t    <thead>\n\t\t\t        <tr class=\"table-header\">\n\t\t\t\t\t\t\t\t\t            <th class=\"\" id=\"\" colspan=\"3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"data-table-header-text\">Day #1: October 20, 2025<\/span><\/th>\n\t\t\t        \t\t\t\t        <\/tr>\n\t\t\t    <\/thead>\n\t\t\t  \t<tbody>\n\t\t\t\t\t\t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t8:30 &#8211; 9:00\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"2\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\tRegistration\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t9:00 &#8211; 10:00\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"2\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"has-inline-color has-vivid-cyan-blue-color\"><b><i>Welcome Ceremony<\/i><\/b><\/p><ul><li><strong>Opening Talk<\/strong><br \/>Pr. Michael Allen, Acting Vice President of Zayed University<\/li><\/ul><br \/><ul><li><strong>Welcoming Talk<\/strong><br \/>Pr.Maryline Laurent, Full Professor at T\u00e9l\u00e9com SudParis<\/li><\/ul><br \/><ul><li><strong>Welcoming Talk<br \/><\/strong>Pr. Omar Alfandi, Dean of CTI\u00a0<\/li><\/ul><br \/><ul><li><strong>Welcoming Talk<br \/><\/strong>Dr. Ahmad Samer Wazan, General Chair of CSNet 2025<\/li><\/ul>\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t10:00 &#8211; 10:45\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"2\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"has-inline-color has-vivid-cyan-blue-color\"><b><i>Official Opening of the Conference H.E. Dr. Mohamed Al Kuwaiti<\/i><\/b><\/p>\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t10:45 &#8211; 11:00\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"2\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\tCoffee Break\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t11:00 &#8211; 12:00\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"2\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"has-inline-color has-vivid-cyan-blue-color\"><a href=\"https:\/\/csnet-conference.org\/2025\/keynotes\/#keynote1\"><b><i>Keynote 1: <strong><em>Large Perceptive Models for the future of Intelligent Connectivity<\/em><\/strong><\/i><\/b><\/a><\/p><p>Speaker: <strong>Prof. Merouane Debbah<\/strong> (Khalifa University, Abu Dhabi, UAE)<br \/><br \/>Chaired by: <span data-sheets-root=\"1\">Ahmad Samer Wazan (Zayed University, UAE)<\/span><\/p>\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t12:00 &#8211; 13:30\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"2\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\tLunch Break\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t13:30 &#8211; 14:45\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"2\" rowspan=\"\" class=\"progCol2Span\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"has-inline-color has-vivid-cyan-blue-color\"><b><i>TS 1: AI &amp; ML for Cybersecurity <\/i><\/b><\/p><p>Chaired by: Iqra Hussain (Zayed University, UAE)<\/p><ul><li><strong>Quantifying AI Impact in Post-Compromise Incident Response <\/strong>Muntathar Abid and Priyadarsi Nanda (University of Technology Sydney, Australia)<\/li><\/ul><p><em><br \/><\/em><\/p><ul><li><strong>Deep Learning Embeddings for Zero-Day Cyber Threat Detection: A Multi-Modal Framework for Network Flow and SIEM Data Analysis<\/strong><br \/>Shiva Kumar Ramavath (Albertsons, USA &amp; University of the Cumberlands, USA); Akshay Mittal (University of the Cumberlands, USA); Vaishnavi Gudur (USA)<\/li><\/ul><p><em><br \/><\/em><\/p><ul><li><strong>An Effective Hybrid CNN-LSTM Technique with SMOTE Enhanced Feature Engineering Pipeline for Cyber Threats Detection in Industrial Internet of Things (IIoT)<\/strong><br \/>Adil Hussain (Chang&#8217;an University Xi&#8217;an, ShaanXi, China); Kashif Naseer Qureshi (University of Limerick, Ireland &amp; Bahria University Islamabad, Pakistan); Ayesha Aslam (Chang&#8217;an University Xi&#8217;an, ShaanXi Province, China)<\/li><\/ul>\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t14:45 &#8211; 15:15\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"2\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\tCoffee Break\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t15:15 &#8211; 17:00\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol2Span\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"has-inline-color has-vivid-cyan-blue-color\"><b><i>TS 2: Large Language Models, Learning, and Threat Defense<\/i><\/b><\/p><p>Chaired by: <span data-sheets-root=\"1\">Sarah Kohail (Zayed University, UAE)<\/span><\/p><ul><li><strong>A Comparative Study of Large Language Models for Human-like Password Generation and Predictability<\/strong><br \/>Oguz Kagnici (Bogazici University, Turkey); Halil Bisgin (The University of Michigan &#8211; Flint, USA); Suleyman Uludag (The University of Michigan &#8211; Flint, USA)<\/li><\/ul><br \/><ul><li><strong>Hybrid Spear-Phishing Email Detection with LLM and Machine Learning<\/strong><br \/>Alexandru Ghiuru\u021ban (Nuvei Services Romania SRL, Romania &amp; Technical University of Cluj-Napoca, Romania); Ciprian Pavel Opri\u0219a (Technical University of Cluj-Napoca, Romania)<\/li><\/ul><br \/><ul><li><strong>Machine Learning-Based Alert Correlation for Enhanced Cybersecurity: a Multi-Classification Approach<\/strong><br \/>Mouhamadou Lamine Diakhame (Gaston Berger University, Senegal); Cherif Diallo (Universite Gaston Berger &amp; SAMOVAR Research Lab, Senegal); Mohamed Mejri (Laval University, Canada)<\/li><\/ul><br \/><ul><li><strong>PreComp-VFL: Enhancing Embedding Representation in Vertical Federated Learning for Medical Data<\/strong><br \/>Bashair Alrashed (University of Jeddah, Saudi Arabia); Priyadarsi Nanda (University of Technology Sydney, Australia); Hoang Thai Dinh (University of Technology Sydney (UTS), Australia); Saleh Alqahtani (University of Technology Sydney, Australia &amp; Saudi Electronic University, Saudi Arabia); Raddad H Faqihi and Osama Mohammed Dighriri (University of Technology Sydney, Australia); Ethar Alzaid (University of Jeddah, Saudi Arabia); A. Aldahiri (College of Computing Science and Engineering, Saudi Arabia)<\/li><\/ul>\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol2Span\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"has-inline-color has-vivid-cyan-blue-color\"><b><i>TS 3: Adaptive and Proactive Cyber Defense<\/i><\/b><\/p><p>Chaired by: Zainab Khalid Husain (Khalifa University, UAE)<\/p><ul><li><strong>Stackelberg Game for Resilient Collaborative Cyber Threat Detection and Response in IoT Networks<\/strong><br \/>Adel Abusitta (Polytechnique Montreal, Canada); Saja Al Mamoori and Usama Mir (University of Windsor, Canada); Talal Halabi (Laval University, Canada)<\/li><\/ul><br \/><ul><li><strong>A Dynamic AI-Powered Honeypot Framework for Adaptive Cyber Threat Diversion<\/strong><br \/>Iqra Hussain (Zayed University, United Arab Emirates); Monther Aldwairi (Zayed University &amp; Jordan University of Science and Technology, United Arab Emirates); Azka Wani (Zayed University, United Arab Emirates)<\/li><\/ul><br \/><ul><li><strong>A Novel Adaptive Concept Drift Detection Approach for Evolving Network Traffic Patterns<\/strong><br \/>Beny Nugraha (Technische Universit\u00e4t Chemnitz, Germany &amp; Mercu Buana University, Indonesia); Krishna Yadav and Thomas Bauschert (Chemnitz University of Technology, Germany)<\/li><\/ul><br \/><ul><li><strong>Measuring and Preventing Certificate Misconfigurations in Enterprise WPA2\/3 Networks<\/strong><br \/>&gt;Rathan Appana and Mathy Vanhoef (KU Leuven, Belgium)<\/li><\/ul>\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t17:00\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"2\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\tWelcome Reception\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t    <\/tbody>\n\t\t\t<\/table>\n\t\t<\/div>\n\t  \t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d315aa7 e-flex e-con-boxed e-con e-parent\" data-id=\"d315aa7\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a57fe35 programTitleTD eael-table-align-center eael-dt-th-align-left elementor-widget elementor-widget-eael-data-table\" data-id=\"a57fe35\" data-element_type=\"widget\" data-widget_type=\"eael-data-table.default\">\n\t\t\t\t\t\t\t<div class=\"eael-data-table-wrap\" data-table_id=\"a57fe35\" id=\"eael-data-table-wrapper-a57fe35\" data-custom_responsive=\"false\">\n\t\t\t<table class=\"tablesorter eael-data-table center\" id=\"eael-data-table-a57fe35\">\n\t\t\t    <thead>\n\t\t\t        <tr class=\"table-header\">\n\t\t\t\t\t\t\t\t\t            <th class=\"\" id=\"\" colspan=\"3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"data-table-header-text\">Day #2: October 21, 2025<\/span><\/th>\n\t\t\t        \t\t\t\t        <\/tr>\n\t\t\t    <\/thead>\n\t\t\t  \t<tbody>\n\t\t\t\t\t\t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t9:00 &#8211; 10:00\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"2\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\tRegistration\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t10:00 &#8211; 11:00\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"2\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"has-inline-color has-vivid-cyan-blue-color\"><a href=\"https:\/\/csnet-conference.org\/2025\/keynotes\/#keynote2\"><b><i>Keynote 2: <strong><em>Secure Autonomous Systems<\/em><\/strong><\/i><\/b><\/a><\/p><p>Speaker: <b>Jean-Pierre Giacalone<\/b> (Vice President, Secure Systems Research Center, TII, UAE)<br \/><br \/>Chaired by: <span data-sheets-root=\"1\">Martin Andreoni (TII, UAE)<\/span><\/p>\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t11:00 &#8211; 12:30\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol2Span\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"has-inline-color has-vivid-cyan-blue-color\"><b><i>TS 4: Privacy, Encryption &amp; Post-Quantum Security<\/i><\/b><\/p><p>Chaired by: <span data-sheets-root=\"1\">Azka Wani (Zayed University, UAE)<\/span><\/p><ul><li><strong>Consideration of Attribute-Based Encryption Utilization in IoT Communication<\/strong><br \/>Reina Sasaki (Ochanomizu University, Japan &amp; ROIS, Center for R&amp;D on Secure Computer Systems, Japan); Yutaka Ishikawa (ROIS, Center for R&amp;D on Secure Computer Systems, Japan &amp; Otsuma Women&#8217;s University, Japan); Atsuko Takefusa (National Institute of Informatics, Japan); Masato Oguchi (Ochanomizu University, Japan)<\/li><\/ul><br \/><ul><li><strong>CRYPTNA: a Purely Cryptographic Zero Trust Network Access with 1-RTT Packet Authorization<\/strong><br \/>Pierre-Loup Guerrieri (University of Bordeaux, France); Feriel Bouakkaz (EFREI Paris, France); Toufik Ahmed (CNRS-LaBRI UMR 5800, University Bordeaux, Bordeaux-INP, France)<\/li><\/ul><br \/><ul><li><strong>Post-Quantum Resistant Key Exchange Protocol for SSH Transport Layer Using Split-KEM<\/strong><br \/>Onkar Garg (M.Tech Research at IIT Mandi, India); Awaneesh Kumar Yadav (Indian Institute of Technology Mandi (IIT Mandi), India); Ravi Kumar and Atul Anand (IIT Roorkee, India); Sugata Gangopadhyay (Indian Institute of Technology Roorkee, India &amp; IIT Roorkee, India)<\/li><\/ul><br \/><ul><li><span data-sheets-root=\"1\"><strong>Performance of Visual SLAM for Autonomous Vehicles in the CARLA Simulator Under Daytime and Dry Weather Conditions<\/strong><br \/><\/span><span data-sheets-root=\"1\">Mohammed AlAzzani (Technology Innovation Institute, UAE)<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol2Span\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"has-inline-color has-vivid-cyan-blue-color\"><b><i>UAE Cybersecurity Council Seminar: A Security Blueprint for AI by Sukiraman Manivannan<\/i><\/b><\/p>\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t12:30 &#8211; 14:00\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"2\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\tLunch Break\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t14:00 &#8211; 15:15\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol2Span\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"has-inline-color has-vivid-cyan-blue-color\"><b><i>TS 5: Emerging Directions in AI &amp; Security<\/i><\/b><\/p><p>Chaired by: <span data-sheets-root=\"1\">Everton de Matos (TII, UAE)<\/span><\/p><ul><li><strong>Odd Ones Out: Exploiting Prediction Mismatch for Universal Generated Image Detect<\/strong><br \/>Yi-Hong Yeh, Hau-Ching Chen and Jiann-Liang Chen (National Taiwan University of Science and Technology, Taiwan)<\/li><\/ul><br \/><ul><li><strong>A Critical Evaluation of Agentic AI in Cybersecurity: the Pros and the Cons<\/strong><br \/>Victor Obojo (CyberDome Nigeria, Nigeria); Richard A Ikuesan (Zayed University, United Arab Emirates); Elias Iortom (CyberDome Nigeria, Nigeria)<\/li><\/ul><br \/><ul><li><strong>Hybrid CNN-LSTM Based Anomaly Detection for Energy Theft in Residential Smart Meter Data<\/strong><br \/>Hasina Rahman (University of Technology Sydney, Australia); Nazim Sheikh (Macquarie University, Australia); Priyadarsi Nanda (University of Technology Sydney, Australia)<\/li><\/ul>\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol2Span\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"has-inline-color has-vivid-cyan-blue-color\"><b><i>UAE Cybersecurity Council Seminar: The Double-Edged Sword of Generative AI by Abdulaziz Alblooshi <\/i><\/b><\/p>\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t15:15 &#8211; 15:45\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"2\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\tCoffee Break\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t15:45 &#8211; 17:30\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol2Span\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"has-inline-color has-vivid-cyan-blue-color\"><b><i>TS 6: Human and Technical Perspectives in Cyber Defense<\/i><\/b><strong>\u00a0<\/strong><\/p><p>Chaired by: <span data-sheets-root=\"1\">Ashraf Khalil (Zayed University, UAE)<\/span><\/p><ul><li><strong>Digital Defense: Cybersecurity Awareness Platform for Qatar&#8217;s Public Sector<br \/><\/strong>Asmaa Khalifa A M Al-Mohannadi, Afra Abdulla S Kh Alnuaimi and Fatima Mubarak S A Al-Buainain (Community College of Qatar Lusail, Qatar); Shafi&#8217;i M Abdulhamid (Community College of Qatar, Qatar); Nadim Rana (Jazan University, Saudi Arabia); Abdullah Hussein Al-Ghushami (Community College of Qatar &amp; UUM, Qatar)<\/li><\/ul><br \/><ul><li><strong>Cross-Study Comparability for IDS: A Call for Clarity<br \/><\/strong>Maximilian Ludwig (Heidelberg University, Germany &amp; BwInfoSec, Germany); Stefan Machmeier (Heidelberg University, Germany &amp; Heidelberg Institute for Theoretical Studies, Germany); Vincent Heuveline (Interdisciplinary Center for Scientific Computing, Germany)<\/li><\/ul><br \/><ul><li><strong>Iterative Exploration of Cybercrime Groups on Social Media and Convergence Analysis<br \/><\/strong>Junna Ito (Ochanomizu University, Japan); Tomoyuki Sanda and Zhixian Zhao (The Japan Research Institute, Ltd., Japan); Shigeyuki Osada (Japan Research Institute, Ltd., Japan); Naoki Nakagawa (The Japan Research Institute, Ltd., Japan); Masato Oguchi (Ochanomizu University, Japan)<\/li><\/ul><br \/><ul><li><strong>PyS-D2BiTM: Pyramid Squeeze Attention-Enabled Deep Learning Model for Intrusion Detection in the Software-Defined Internet of Things Networks<br \/><\/strong>Azka Wani and Iqra Hussain (Zayed University, United Arab Emirates)<\/li><\/ul>\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol2Span\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"has-inline-color has-vivid-cyan-blue-color\"><b><i>Tutorial : Software vulnerabilities detection using LLMs<\/i><\/b><\/p><p>Speaker: Yasir Malik<span data-sheets-root=\"1\">\u00a0(Bishop\u2019s University, Canada)<\/span><\/p><div class=\"elementToProof\"><b>Abstract<\/b>: This tutorial provides a comprehensive evaluation of deep learning methodologies for software vulnerability detection, with a focus on eHealthcare applications, where vulnerabilities can threaten patient safety, data privacy, and regulatory compliance. It presents the end-to-end deep learning pipeline, including data preprocessing, feature representation, model selection, training, evaluation, and practical deployment. The tutorial demonstrates the application of sequence-based models, graph-based architectures, and pre-trained transformers to real-world medical software datasets, highlighting the impact of pre-training, architectural choices, and code representation on detection performance. In particular, the tutorial discusses how graph-based architectures leveraging code property graphs achieve superior accuracy, and how integrating syntactic and semantic information enables reliable identification of complex vulnerabilities. Finally, it covers strategies for integrating these approaches into eHealthcare workflows to automate detection, enhance security, ensure compliance, and support explainability, providing actionable guidance for building robust and dependable healthcare software.<\/div><div class=\"elementToProof\">\u00a0<\/div><div class=\"elementToProof\"><strong>Short Bio:\u00a0<em>Dr. Yasir Malik<\/em><\/strong> is an Associate Professor and the Director of the System Security Lab at Bishop\u2019s University, where he leads research at the intersection of software security and artificial intelligence. His work focuses on developing advanced techniques to detect, analyze, and mitigate software vulnerabilities using deep learning and large language models (LLMs). By combining AI-driven approaches with practical cybersecurity strategies, Dr. Malik aims to enhance the resilience of modern software systems against emerging threats. He has published extensively in top-tier journals and conferences and collaborates with industry and government partners to translate research into real-world solutions. Beyond his research, Dr. Malik is passionate about mentoring the next generation of cybersecurity professionals and fostering innovation in secure software design and AI-enabled threat intelligence.<\/div>\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t19:00\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"2\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"has-inline-color has-vivid-cyan-blue-color\"><b><i>Conference Dinner<br \/><\/i><\/b><\/p>\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t    <\/tbody>\n\t\t\t<\/table>\n\t\t<\/div>\n\t  \t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9fe79c6 e-flex e-con-boxed e-con e-parent\" data-id=\"9fe79c6\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6ee04d9 programTitleTD eael-table-align-center eael-dt-th-align-left elementor-widget elementor-widget-eael-data-table\" data-id=\"6ee04d9\" data-element_type=\"widget\" data-widget_type=\"eael-data-table.default\">\n\t\t\t\t\t\t\t<div class=\"eael-data-table-wrap\" data-table_id=\"6ee04d9\" id=\"eael-data-table-wrapper-6ee04d9\" data-custom_responsive=\"false\">\n\t\t\t<table class=\"tablesorter eael-data-table center\" id=\"eael-data-table-6ee04d9\">\n\t\t\t    <thead>\n\t\t\t        <tr class=\"table-header\">\n\t\t\t\t\t\t\t\t\t            <th class=\"\" id=\"\" colspan=\"3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"data-table-header-text\">Day #3: October 22, 2025<\/span><\/th>\n\t\t\t        \t\t\t\t        <\/tr>\n\t\t\t    <\/thead>\n\t\t\t  \t<tbody>\n\t\t\t\t\t\t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t9:00 &#8211; 10:00\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"2\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\tRegistration\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t10:00 &#8211; 11:40\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol2Span\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"has-inline-color has-vivid-cyan-blue-color\"><b><i>TS 7: Malware, Ransomware, and Attack Detection<\/i><\/b><\/p><p>Chaired by: <span data-sheets-root=\"1\">Martin Andreoni (TII, UAE)<\/span><\/p><ul><li><strong>Multi-Level Architecture for IoT-Based Android Ransomware Detection and Family Attribution<br \/><\/strong>Ines Gharbi (CNAM, France &amp; Caplogy, France); Amit Agarwal (Caplogy R&amp;D, France); Abdelouahid Derhab (King Saud University, Saudi Arabia); Mohamed Belaoued (Caplogy &amp; Lab-I, France); Abdelouahab Amira (Universite de B\u00e9jaia, Algeria); Kamel Barkaoui (Cedric Cnam- Paris, France)<\/li><\/ul><br \/><ul><li><strong>Ransomware Detection Using Printable Strings<br \/><\/strong>Daneel Nortier and Avinash Singh (University of Pretoria, South Africa); Richard A Ikuesan (Zayed University, United Arab Emirates)<\/li><\/ul><br \/><ul><li><strong>A Modern Solution for Windows Malware Detection with Static PE Header Features<br \/><\/strong>Adil Alizada (Heriot-Watt University Dubai, United Arab Emirates); Hani Ragab Hassen (Heriot-Watt University, United Kingdom (Great Britain))<\/li><\/ul><br \/><ul><li><strong>Hybrid LSTM-BiLSTM Approach for DDoS Attack Forecasting<br \/><\/strong>Yahya Yakhlaf (Caplogy, France); Roumaissa Bekkouche (LIGM, Univ Gustave Eiffel, France); Hadhami Garbouge (Caplogy, France); Mohamed Belaoued (Caplogy &amp; Lab-I, France); Samir Dawaliby (Caplogy R&amp;D, France)<\/li><\/ul>\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol2Span\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"has-inline-color has-vivid-cyan-blue-color\"><b><i>Workshop: DSGenAI<\/i><\/b><\/p>\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t11:40 &#8211; 12:10\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"2\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\tCoffee Break\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t12:10 &#8211; 13:30\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol2Span\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"has-inline-color has-vivid-cyan-blue-color\"><b><i>TS 8: Emerging Technologies for Secure Networks and Systems<\/i><\/b><\/p><p>Chaired by: <span data-sheets-root=\"1\">Nour El Madhoun (LISITE &#8211; Isep, France)<\/span><\/p><ul><li><strong>BlockRoyalty: Royalties Management Using Blockchain and Smart Contracts<br \/><\/strong>Nour El Zahabi (Lebanese University, Lebanon); Nour El Madhoun (LISITE &#8211; Isep, France &amp; Sorbonne Universit\u00e9, France)<\/li><\/ul><br \/><ul><li><strong>On Secure UAV Collision Avoidance<br \/><\/strong>Thomas Ewert (German Aerospace Center &#8211; DLR, Germany); Thomas Strang (German Aerospace Center (DLR) &amp; Intelligence on Wheels (IoW) GmbH, Germany)<\/li><\/ul><br \/><ul><li><strong>Enriching the Assessment of Neural Network-Based Wireless Intrusion Detection Systems: A Case Study on Wi-Fi Networks<br \/><\/strong>Cherifa Hamroun (Laboratoire d&#8217;informatique de Sorbonne Universit\u00e9s &#8211; LIP6 &amp; METEOR Network, France); Anne Fladenmuller (LIP6\/Sorbonne Universit\u00e9, France); Michel Pariente (Meteor Network, France); Guy Pujolle (Sorbonne University &amp; Green Communications Company, France)<\/li><\/ul>\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol2Span\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"has-inline-color has-vivid-cyan-blue-color\"><b><i>1st Workshop on Generative Artificial Intelligence and Cybersecurity on the Internet of Things (GenAICIoT 2025) &#8211; Part 1 <\/i><\/b><\/p><p>Chaired by: <span data-sheets-root=\"1\">Gina Gallegos-Garcia (Instituto Polit\u00e9cnico Nacional, Mexico)<\/span><\/p><br \/><ul><li><strong>AI-Based Anomaly Detection for Enhanced Cybersecurity in IoT Networks<\/strong><br \/>Mamdouh Muhammad (Friedrich-Alexander-Universit\u00e4t Erlangen-N\u00fcrnberg, Germany); Sushmetha Arumugam (Computer Networks and Communication Systems, Germany); Loui Al Sardy (Friedrich-Alexander-Universit\u00e4t Erlangen-N\u00fcrnberg (FAU) &amp; Computer Networks and Communication Systems, Germany)<\/li><\/ul><br \/><ul><li><strong>OTArmor: Securing Automotive over-the-Air Updates Against Malware Using Generative<\/strong><br \/>Modeling Darwin Liao and Marwa A. Elsayed (University of Western Ontario, Canada)<\/li><\/ul><br \/><ul><li><strong>Beyond the Generalization Illusion: A Production MLOps Framework for Federated Behavioral Malware Detection with Real-Time Drift<\/strong><br \/>Mohammed Ibrahim El-hajj (Arab Open University &#8211; Lebanon (AOU), Lebanon)<\/li><\/ul>\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t13:30 &#8211; 14:30\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"2\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\tLunch Break\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t14:30 &#8211; 15:30\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"2\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"has-inline-color has-vivid-cyan-blue-color\"><a href=\"https:\/\/csnet-conference.org\/2025\/keynotes\/#keynote3\"><b><i>Keynote 3: <strong><em>Securing the Skies: Advanced Technologies for Airspace Protection<\/em><\/strong><\/i><\/b><\/a><\/p><p>Speaker: <strong>Abdulhadi Shoufan<\/strong> (Professor at Khalifa University, UAE)<br \/><br \/>Chaired by: <span data-sheets-root=\"1\">Nour El Madhoun (LISITE &#8211; Isep, France)<\/span><\/p>\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t15:30 &#8211; 17:10\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol2Span\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"has-inline-color has-vivid-cyan-blue-color\"><b><i>TS 9: Secure Media, Cryptography, and Trustworthy AI<\/i><\/b><\/p><p>Chaired by: <span data-sheets-root=\"1\">Richard Ikuesan (Zayed University, UAE)<\/span><\/p><ul><li><strong>Enhanced RC4 Stream Encryption Algorithm Using SHAKE256<br \/><\/strong>Md Mostafizur Rahman (Concordia University of Edmonton, Canada)<\/li><\/ul><br \/><ul><li><strong>FucoPVA: An Efficient Video Analytics Framework with Full-Content Privacy Preservation<br \/><\/strong>Tian Zhou (Xi&#8217;an Jiaotong University, China); Lixin Gao (University of Massachusetts at Amherst, USA); Bo Han (Xian Jiaotong University, China); Changpeng Zhu (Chongqing University of Technology, China); Mujing Li (Ohio State University, USA)<\/li><\/ul><br \/><ul><li><strong>Comparisons Between Open-LLMs for Fake News Detection<br \/><\/strong>Rachel Ladouceur and Chaima Njeh (UQAC, Canada); Fehmi Jaafar (Universit\u00e9 du Qu\u00e9bec \u00e0 Chicoutimi, Canada); Ha\u00effa Nakouri (University of Tunis, Tunisia)<\/li><\/ul><br \/><ul><li><strong>Quantum-Resilient Security for 5G\/6G Networks: Reviewing the Integration of Post-Quantum Cryptography with Quantum Key Distribution <br \/><\/strong>Onkar Garg (M.Tech Researach at IIT Mandi, India); Awaneesh Kumar Yadav (Indian Institute of Technology Mandi (IIT Mandi), India); Ravi Kumar (IIT Roorkee, India); Rajiv Misra (Indian Institute of Technology Patna, India); Sugata Gangopadhyay (Indian Institute of Technology Roorkee, India &amp; IIT Roorkee, India)<\/li><\/ul>\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol2Span\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"has-inline-color has-vivid-cyan-blue-color\"><b><i>1st Workshop on Generative Artificial Intelligence and Cybersecurity on the Internet of Things (GenAICIoT 2025) &#8211; Part 2<\/i><\/b><\/p><p>Chaired by: Ponciano Jorge Escamilla-Ambrosio (Instituto Politecnico Nacional, Mexico)<\/p><br \/><ul><li><strong>Attention-Based Bi-LSTM for Continuous Authentication Using Touch Dynamics<\/strong><br \/>Ahmed Mahfouz (AOU, Oman &amp; Minia University, Egypt); Mohammed Abdullah Salim Al Husaini and Alaa A. K. Ismaeel (Arab Open University Oman, Oman)<\/li><\/ul><br \/><ul><li><strong>SPN-Based Lightweight Cryptographic Scheme for Resource-Constrained Ecosystems<\/strong><br \/>Jes\u00fas A. Aboytes (Centro de Investigaci\u00f3n en Computaci\u00f3n, Instituto Polit\u00e9cnico Nacional, Mexico &amp; Academia de Ciencias de la Universidad Polit\u00e9cnica de San Luis Potos\u00ed, Mexico); Gina Gallegos-Garcia (Instituto Polit\u00e9cnico Nacional, Mexico); Marco T. Ram\u00edrez-Torres (Universidad Aut\u00f3noma de San Luis Potos\u00ed, Mexico); Ponciano Jorge Escamilla-Ambrosio (Instituto Politecnico Nacional, Mexico)<\/li><\/ul><br \/><ul><li><strong>Hybrid Convolutional-Recurrent Models for Side-Channel Attacks<\/strong><br \/>Luis Ramos and Ariadna I. Rodriguez-Gomez (Centro de Investigaci\u00f3n en Computaci\u00f3n, Instituto Polit\u00e9cnico Nacional, Mexico); Kevin A. Palacios Elizondo (Escuela Superior de C\u00f3mputo, Instituto Polit\u00e9cnico Nacional, Mexico); Kevin A. Delgado-Vargas (Centro de Investigaci\u00f3n en Computaci\u00f3n, Instituto Polit\u00e9cnico Nacional, Mexico); Gina Gallegos-Garcia (Instituto Polit\u00e9cnico Nacional, Mexico); Olga Kolesnikova (Instituto Politecnico Nacional, Mexico); Hiram Calvo (Instituto Polit\u00e9cnico Nacional, Mexico)<\/li><\/ul><br \/><ul><li><strong>Overcoming Legal Barriers to the Safe Use of Agentic Artificial Intelligence in Mediation and Dispute Resolution<\/strong><br \/>Salissou Alio Sanda (Djibo Hamani University of Tahoua &amp; Abdou Moumouni University of Niamey, Niger)<\/li><\/ul>\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"progCol1\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t17:10\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"2\" rowspan=\"\" class=\"progCol2\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"has-inline-color has-vivid-cyan-blue-color\"><b><i>Activity<br \/><\/i><\/b><\/p>\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t    <\/tbody>\n\t\t\t<\/table>\n\t\t<\/div>\n\t  \t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Program You can find here a &hellip; <a href=\"https:\/\/csnet-conference.org\/2025\/program\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-413","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Program - CSNet 2025<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/csnet-conference.org\/2025\/program\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Program - CSNet 2025\" \/>\n<meta property=\"og:description\" content=\"Program You can find here a &hellip; Continue reading &rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/csnet-conference.org\/2025\/program\/\" \/>\n<meta property=\"og:site_name\" content=\"CSNet 2025\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-18T09:58:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/csnet-conference.org\/2025\/wp-content\/uploads\/2025\/10\/program_at_a_glance_v4.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1611\" \/>\n\t<meta property=\"og:image:height\" content=\"1160\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/csnet-conference.org\/2025\/program\/\",\"url\":\"https:\/\/csnet-conference.org\/2025\/program\/\",\"name\":\"Program - CSNet 2025\",\"isPartOf\":{\"@id\":\"https:\/\/csnet-conference.org\/2025\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/csnet-conference.org\/2025\/program\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/csnet-conference.org\/2025\/program\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/csnet-conference.org\/2025\/wp-content\/uploads\/2025\/10\/program_at_a_glance_v4-1024x737.png\",\"datePublished\":\"2025-09-27T11:13:28+00:00\",\"dateModified\":\"2025-10-18T09:58:10+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/csnet-conference.org\/2025\/program\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/csnet-conference.org\/2025\/program\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/csnet-conference.org\/2025\/program\/#primaryimage\",\"url\":\"https:\/\/csnet-conference.org\/2025\/wp-content\/uploads\/2025\/10\/program_at_a_glance_v4.png\",\"contentUrl\":\"https:\/\/csnet-conference.org\/2025\/wp-content\/uploads\/2025\/10\/program_at_a_glance_v4.png\",\"width\":1611,\"height\":1160},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/csnet-conference.org\/2025\/program\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/csnet-conference.org\/2025\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Program\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/csnet-conference.org\/2025\/#website\",\"url\":\"https:\/\/csnet-conference.org\/2025\/\",\"name\":\"CSNet 2025\",\"description\":\"9th Cyber Security in Networking Conference\",\"publisher\":{\"@id\":\"https:\/\/csnet-conference.org\/2025\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/csnet-conference.org\/2025\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/csnet-conference.org\/2025\/#organization\",\"name\":\"CSNet 2025\",\"url\":\"https:\/\/csnet-conference.org\/2025\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/csnet-conference.org\/2025\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/csnet-conference.org\/2025\/wp-content\/uploads\/2025\/01\/cropped-csnet_logo_2025.png\",\"contentUrl\":\"https:\/\/csnet-conference.org\/2025\/wp-content\/uploads\/2025\/01\/cropped-csnet_logo_2025.png\",\"width\":500,\"height\":500,\"caption\":\"CSNet 2025\"},\"image\":{\"@id\":\"https:\/\/csnet-conference.org\/2025\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Program - CSNet 2025","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/csnet-conference.org\/2025\/program\/","og_locale":"en_US","og_type":"article","og_title":"Program - CSNet 2025","og_description":"Program You can find here a &hellip; Continue reading &rarr;","og_url":"https:\/\/csnet-conference.org\/2025\/program\/","og_site_name":"CSNet 2025","article_modified_time":"2025-10-18T09:58:10+00:00","og_image":[{"width":1611,"height":1160,"url":"https:\/\/csnet-conference.org\/2025\/wp-content\/uploads\/2025\/10\/program_at_a_glance_v4.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/csnet-conference.org\/2025\/program\/","url":"https:\/\/csnet-conference.org\/2025\/program\/","name":"Program - CSNet 2025","isPartOf":{"@id":"https:\/\/csnet-conference.org\/2025\/#website"},"primaryImageOfPage":{"@id":"https:\/\/csnet-conference.org\/2025\/program\/#primaryimage"},"image":{"@id":"https:\/\/csnet-conference.org\/2025\/program\/#primaryimage"},"thumbnailUrl":"https:\/\/csnet-conference.org\/2025\/wp-content\/uploads\/2025\/10\/program_at_a_glance_v4-1024x737.png","datePublished":"2025-09-27T11:13:28+00:00","dateModified":"2025-10-18T09:58:10+00:00","breadcrumb":{"@id":"https:\/\/csnet-conference.org\/2025\/program\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/csnet-conference.org\/2025\/program\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/csnet-conference.org\/2025\/program\/#primaryimage","url":"https:\/\/csnet-conference.org\/2025\/wp-content\/uploads\/2025\/10\/program_at_a_glance_v4.png","contentUrl":"https:\/\/csnet-conference.org\/2025\/wp-content\/uploads\/2025\/10\/program_at_a_glance_v4.png","width":1611,"height":1160},{"@type":"BreadcrumbList","@id":"https:\/\/csnet-conference.org\/2025\/program\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/csnet-conference.org\/2025\/"},{"@type":"ListItem","position":2,"name":"Program"}]},{"@type":"WebSite","@id":"https:\/\/csnet-conference.org\/2025\/#website","url":"https:\/\/csnet-conference.org\/2025\/","name":"CSNet 2025","description":"9th Cyber Security in Networking Conference","publisher":{"@id":"https:\/\/csnet-conference.org\/2025\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/csnet-conference.org\/2025\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/csnet-conference.org\/2025\/#organization","name":"CSNet 2025","url":"https:\/\/csnet-conference.org\/2025\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/csnet-conference.org\/2025\/#\/schema\/logo\/image\/","url":"https:\/\/csnet-conference.org\/2025\/wp-content\/uploads\/2025\/01\/cropped-csnet_logo_2025.png","contentUrl":"https:\/\/csnet-conference.org\/2025\/wp-content\/uploads\/2025\/01\/cropped-csnet_logo_2025.png","width":500,"height":500,"caption":"CSNet 2025"},"image":{"@id":"https:\/\/csnet-conference.org\/2025\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/csnet-conference.org\/2025\/wp-json\/wp\/v2\/pages\/413","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/csnet-conference.org\/2025\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/csnet-conference.org\/2025\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/csnet-conference.org\/2025\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/csnet-conference.org\/2025\/wp-json\/wp\/v2\/comments?post=413"}],"version-history":[{"count":63,"href":"https:\/\/csnet-conference.org\/2025\/wp-json\/wp\/v2\/pages\/413\/revisions"}],"predecessor-version":[{"id":519,"href":"https:\/\/csnet-conference.org\/2025\/wp-json\/wp\/v2\/pages\/413\/revisions\/519"}],"wp:attachment":[{"href":"https:\/\/csnet-conference.org\/2025\/wp-json\/wp\/v2\/media?parent=413"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}