12th IFIP International Conference on New Technologies, Mobility and Security

June 18-20, 2025
Paris, France

  • Technical Sponsors

     

     

     

  • Important dates

    • Paper Submission Due
      March 2, 2025 (Firm deadline)
    • Notification of Acceptance
      April 3, 2025
    • Camera-Ready Papers due
      April 21, 2025
    • Conference Date
      June 18 - 20, 2025
  • Submissions

  • Organized by

Program NTMS 2025

Provisional program subject to change

Day #1: June 18th, 2025 (Workshops)

SRC-DAV Workshop

CID Workshop

9:00 – 09:30
Registration
9:30 – 10:00
Opening (Conference & Workshops)
10:00 – 11:00

Keynote 1: 

Speaker: Erol Gelenbe 

Title: AI and Queueing Theory Combine Forces for the Detection and Mitigation of Cyberattacks

Chaired by:

11:00 – 11:30
Coffee Break
11:30 – 12:30

SRC-DAV

Technical Session 1: Security and Privacy in UAV and IoT Systems

  • Drone Security in Connected Agriculture: Threats, Datasets, and AI-Driven Solutions
    (Anis Charfi (Université de Technologie de Troyes, France & UTT, France); Samiha Ayed (Université Technologique de Troyes, France); Lamia Chaari (CRNS, Tunisia)

  • Towards a Secure Modular Drone-Based Hardware Architecture for IoT-Enabled Traffic Safety in Intelligent Transportation Systems
    Younes Ifourah (École Nationale Supérieure d’Informatique (ESI), France & Conservatoire National Des Arts et Métiers, France); Landry Tchouapi Pouyap (Ecole d’Ingénieurs du CNAM, France & EICNAM, France); Saadi Boudjit (University of Rouen Normandy, France); Samia Bouzefrane (CNAM, France); Amar Balla (Computer Science, Algeria); Ryma Boussaha (École nationale supérieure d’informatique, Algeria)

  • A Novel SDN-Driven IDS Framework for the Internet of Vehicles
    Amal Hbaieb (University of Technology of Troyes, France); Samiha Ayed (Université Technologique de Troyes, France); Lamia Chaari Fourati (Institut Supérieur d’Informatique et de Multimédia de Sfax, Tunisia)

CID Workshop

Technical Session 1: TBD

12:30 – 13:30
Lunch Break
13:30 – 14:30

SRC-DAV

Technical Session 2: AI and Optimization in UAV Networks

  • Multi-Modal Deep Reinforcement Learning Framework for Interference-Limited RIS-Assisted UAV Wireless Network
    Mamadou Aliou Diallo (Chongqing University of Posts and Telecommunications, China); Mohamed Amine Ouamri, Amine (Université Sorbone paris nord, France & L2ti laboratory, France); Muhammad Imran Khalid and Asma Komal (Chongqing University Posts and Telecommunications, China); ELhadj Moustapha Diallo (Chongqing University of Post and Telecommunications, China); Abuzar Babikir Mohammad Adam (University of Luxembourg, Luxembourg)

  • Quantum Deep Reinforcement Learning for Secure Multi-User UAV RSMA Networks
    Mohamed Amine Ouamri, Amine (Université Sorbone paris nord, France & L2ti laboratory, France); Abuzar Babikir Mohammad Adam (University of Luxembourg, Luxembourg); Mohammed A. M. Elhassan (Zhejiang Normal University, China)

  • A Case for Enabling Delegation of 5G Core Decisions to the RAN
    Lucas N Vancina and Geoffrey G Xie (Naval Postgraduate School, USA)

CID Workshop

Technical Session 2: TBD

14:30 – 15:00
Coffee Break
15:00 – 16:00

SRC-DAV

Technical Session 3: Cryptography, Blockchain, and Quantum-Resilience

    • Digital Signature Quantification in the Bitcoin Blockchain: A Statistical Approach
      Hussein Kazem (Consevatoir National des Arts et Métiers, France & ISEP. Sopra Steria I2S, France); Youakim Badr (Pennsylvania State University at Great Valley, USA); Nour El Madhoun (LISITE – Isep, France & Sorbonne Université, France); Pierrick Conord (Sopra Steria I2S, France)

    • Hybrid Key Exchange & Signature Design for Quantum-safe C-ITS
      Brigitte Lonc (IRT SystemX, France); Farah-Emma Braiteh (LTCI, Télécom Paris, Institut Polytechnique de Paris, France & Renault Group, France); Francesca Bassi (IRT, France)

    • Advances in Lightweight Cross-Architecture Procedural Debugging
      Jonathan Brossard (Conservatoire National des Arts et Métiers & MOABI, France)

CID Workshop

Technical Session 3: TBD

16:00 – 16:30
Closing Workshop
17:00
Welcome Reception
Day #2: June 19th, 2025
9:00 – 10:00

Keynote 2: 

Speaker: TBD

Title: TBD

Chaired by: TBD

10:00 – 11:00

Technical Session 1 (A): Edge, 5G, and Blockchain-Driven Wireless Architectures

  • Distinguishing Signal from Noise in 5G MIMO Systems Using Generative Adversarial Networks
    Damianos Diasakos and Nikolaos Prodromos (University of Patras, Greece); Apostolos Gkamas (University of Ioannina, Greece); Vasileios Kokkinos (University of Patras, Greece); Christos J Bouras (University of Patras – ELKE, Greece); Philippos Pouyioutas (University of Nicosia, Cyprus)

  • Coded caching in Wireless Local Area Networks
    Mirna Hamad Haidar (Lebanese University, Belgium & Saint Joseph University, Lebanon); Yasser Fadlallah (University of Sciences and Arts in Lebanon, Lebanon); Hadi Edmond Sawaya (Saint Joseph University, Lebanon); Abed Ellatif Samhat (Lebanese University, Lebanon)

  • Hybrid Metaheuristics-Driven Distributed Task Scheduling for Latency-Sensitive Edge Data Processing
    Achraf Sayah (University HASSAN II of Casablanca, Morocco); Said Aqil (University of Casablanca, Morocco); Lahby Mohamed (Ecole Normale Supérieure (ENS) de Casablanca, Morocco)

Technical Session 1 (B): Edge Systems and Secure Protocols for 5G and Tactical Networks

  • Blockchain-based data management approach for swarm-edge computing
    Adnan Imeri (Luxembourg Institute of Science and Technology & LIST, Luxembourg); Oussema Gharsallaoui (Luxembourg Institute of Science and Technology, Luxembourg); Thierry Grandjean and Uwe Roth (Luxembourg Institute of Science and Technology (LIST), Luxembourg)

  • Energy-Efficient Cryptography for Green Computing: Optimizing Algorithms to Reduce Energy Consumption Without Sacrificing Security
    Mohammed Ibrahim El-hajj (Arab Open University – Lebanon (AOU), Lebanon); Ahmad Fadlallah (University of Sciences and Arts in Lebanon (USAL), Lebanon); Ali El Attar (Arab Open University (AOU), Lebanon); Rida Khatoun (Telecom Paris, France)

  • Edge Computing with Kubernetes: KubeEdge in 5G, SATCOM, and Tactical Networks
    Emil Paulin Andersen (Norwegian Defence Research Establishment (FFI), Norway); Ola Flaata (Norwegian University of Science and Technology (NTNU), Norway); Frank T. Johnsen (Norwegian Defence Research Establishment (FFI), Norway)
11:00 – 11:30
Coffee Break
11:30 – 12:30

Technical Session 2: Security Engineering for Embedded, Vehicular, and Critical Systems

  • Enhancing Security and Privacy in 5G Bubbles with Zero-Knowledge Proofs: A Comparative Analysis
    Flavien Dermigny (Conservatoire National des Arts et Métiers, France & Thales SIX GTS France, France); Vania Conan (CNAM Paris, France); Samia Bouzefrane (Conservatoire National des Arts et Métiers, France); Pengwenlong Gu (CNAM, France); Youakim Badr (Pennsylvania State University at Great Valley, USA); Jean-Marc Montenot (Thales SIX GTS France, France)

  • Towards a situational aware-based cybersecurity remediation
    Rayan Kanawati (Conservatoire national des art et métier, France); Nadira Lammari, Adam Faci and Nada Mimouni (Conservatoire National des Arts et Métiers, France)

  • A Secure and Cooperative Departure Protocol for Connected Automated Platoons
    Farah-Emma Braiteh (LTCI, Télécom Paris, Institut Polytechnique de Paris, France & Renault Group, France); Davy Tse and Ounas Yhia (Sorbonne University, France); Francesca Bassi (IRT, France); Rida Khatoun (Telecom Paris, France)
12:30 – 13:30

Lunch Break / Posters & Demos

  • Biometric Private Embedding
    Hervé Chabanne (Idemia); Vincent Despiegel and Damien Monet (Idemia, France)

  • Turnstile cookies: A new root of trust for personhood credentials
    Hervé Chabanne (Idemia); Alberto Ibarrondo (Arcium, France)
13:30 – 14:30

Technical Session 3: Large Language Models and Intelligent Network Management

  • Analysis of Propagation of Regular, Extended, and Large BGP Communities
    Lilia Hannachi

  • A Survey on Large Language Models in Phishing Detection
    Muharrem Atakan Şentürk (Istanbul University, Turkey); Serif Bahtiyar (Istanbul Technical University, Turkey)

  • Quantization Effects on Large Language Models for Intent-Based Network Management
    Nicollas R. de Oliveira (Universidade Federal Fluminense, Brazil); Gabriel Campos and Igor Rodrigues (Universidade Federal Fluminense (UFF), Brazil); João André C. Watanabe (UFF, Brazil); Rodrigo S. Couto (Universidade Federal do Rio de Janeiro, Brazil); Igor Monteiro Moraes and Dianne Medeiros (Universidade Federal Fluminense, Brazil); Diogo M. F. Mattos (Universidade Federal Fluminense & MídiaCom, Brazil)

  • Traffic Prediction Improvement in 5G and beyond: AI and Self-Controlled Components (Short Paper)
    Thierry Isaac N’kouka (Cnam (Conservatoire national des arts et métiers), France); Tatiana Aubonnet (CNAM, CEDRIC, France); Frédéric Lemoine (CNAM, France); Mounir Kellil (CEA LIST, France); Noëmie Simoni (Telecom Paristech, France)
14:30 – 15:00
Coffee Break
15:00 – 16:00

Technical Session 4 (A): AI and Reinforcement Learning for Intrusion Detection and Wireless Intelligence

  • Refining Intrusion Detection in the Age of QUIC: Leveraging Machine Learning for Enhanced Security
    Adam Kadi and Lyes Khoukhi (ENSICAEN, France); Jouni Viinikka and Pierre-Edouard Fabre (6Cure, France)

  • Enhancing IIoT Security with Deep Reinforcement Learning for Intrusion Detection
    Aymene Selamnia (University of Caen Normandie & UNICAEN, Ensicaen, France); Lyes Khoukhi (ENSICAEN, France); Mondher Ayadi (Numeryx, France); Zakaria Abou El Houda (INRS, Canada)

  • Leveraging Zero Trust for Enhanced Security and Connectivity in Ad-Hoc Mesh Networks
    Guilherme Nunes Nasseh Barbosa (Universidade Federal Fluminense, Brazil); Martin Andreoni (Technology Innovation Institute (TII), United Arab Emirates & Khalifa University, United Arab Emirates); Diogo M. F. Mattos (Universidade Federal Fluminense & MídiaCom, Brazil)

Technical Session 4 (B): Advanced Cybersecurity Frameworks and Trust in Distributed Systems

  • Enhancing Maritime Cybersecurity with Advanced Anomaly Detection using Semi-Markov Processes
    Kamel Abbad (Ensicaen, France); Lyes Khoukhi (ENSICAEN, France); Lionnel Mesnil and Alain Alliot (NEAC Industry, France)

  • DAPIS: A Secure Proxy Re-encryption Protocol for Delegated Authentication and Privacy Management
    Abdou-Essamad Jabri (Matsi Laboratory – UMP Oujda, Morocco); Cyril Drocourt (Mis Laboratory / University of Picardie Jules Verne, France); Mostafa Azizi (MATSI Laboratory – UMP Oujda, Morocco); Gil Utard (MIS Laboratory – UPJV Amiens, France)

  • Revisiting Atomic Patterns for Elliptic Curve Scalar Multiplication Revealing Inherent Vulnerability to Simple SCA
    Alkistis Aikaterini Sigourou (IHP GmbH – Leibniz Institute for High Performance Microelectronics, Germany); Zoya Dyka (Innovations for High Performance Microelectronics & IHP, Germany); Sze Hei Li (IHP GmbH – Leibniz Institute for High Performance Microelectronics, Germany); Peter Langendoerfer (IHP Microelectronics, Germany); Ievgen Kabin (IHP, Germany)
16:00 – 16:30
Coffee Break
16:30 – 18:00

Technical Session 5 (A): Cybersecurity in Diverse and Cross-Domain Systems

  • A Novel Clustering Framework for Military High Performance Mobile Ad-Hoc Networks
    Mehmet Semih Saydam (ASELSAN Inc., Turkey); Seyyit Alper Sert (Middle East Technical University, Turkey); Güven Yenihayat and Ege Orkun Gamgam (ASELSAN Inc., Turkey)

  • Evaluating Emotional Responses to Experimental Video Art
    Konstantinos G Tsioutas (Athens University of Economics and Business, Greece); Ioannis Doumanis (University of Central Lancashire, United Kingdom (Great Britain)); Konstantinos Dalezios (Greece); Dora Siafla (Ionian University, Greece); Konstantinos Tiligadis (Ionian University Corfu, Greece)

  • A Novel Framework for Adversarial DoS Attack Generation on UAVs
    Burcu Sonmez and Serif Bahtiyar (Istanbul Technical University, Turkey)

  • Securing Fault Diagnosis in IoT-Enabled Industrial Systems Using Homomorphic Encryption
    Mohammed Ibrahim El-hajj (Arab Open University – Lebanon (AOU), Lebanon); Ali El Attar (Arab Open University (AOU), Lebanon); Ahmad Fadlallah (University of Sciences and Arts in Lebanon (USAL), Lebanon); Rida Khatoun (Telecom Paris, France)

  • Counter-Argument: Ecuador’s Progress in Cyberpolicy and Cybersecurity Strategy (ShortPaper)
    Roberto Andrade (Universidad San Francisco, Ecuador); Jenny Torres and Patricio Zambrano (Escuela Politécnica Nacional, Ecuador)

Technical Session 5 (B): Advanced Cybersecurity Frameworks and Trust in Distributed Systems

  • A Smart System for Detecting High-Risk Areas of Epidemic Spread
    Khaled Abbaci (University of Science and Technology Houari Boumediene, Algeria); Fayçal M’hamed Bouyakoub (University of Sciences and Technology Houari Boumediene, Algeria); Ikram Chegroune and Massinissa Mouhoub (University of Science and Technology Houari Boumediene, Algeria)

  • Enhancing Digital Product Passport Through Decentralized Digital Twins
    Ranjit Kannappan (Telecom Sud Paris & Orange Innovation, France); Julien Hatin (Orange Innovation, France); Emmanuel Bertin (Orange Labs, France); Noel Crespi (Institut Mines-Télécom, Télécom SudParis, France)

  • Multi-Centered Attack-Surface-Driven Threat Modeling: Securing Healthcare Systems
    Rachid Rebiha (CNAM, France); Sofia Rebiha Decesaro (Charles University Prague, Czech Republic)

  • Federated Secure Intelligent Intrusion Detection and Mitigation Framework for SD-IoT Networks using ViT-GraphSAGE and Automated Attack Reporting
    Walid El Gadal and Sudhakar Ganti (University of Victoria, Canada)

  • WebScan: A Comprehensive Static and Dynamic Analysis Approach for Web Application Security (Short Paper)
    Ahmet Eren Gündoğdu (Istinye University, Turkey); Ebu Yusuf Güven (Istanbul University – Cerrahpasa, Turkey)
20:00
Conference Dinner
Day #3: June 20th, 2025
9:30 – 10:00
Registration
10:00 – 11:00

Technical Session 6: ML and Vision Applications in IoT and UAVs

  • Adversarial Attacks on Faster R-CNN Model for Object Detection in Autonomous Vehicles
    Melike Başer (Istanbul University – Cerrahpasa, Turkey); Serif Bahtiyar (Istanbul Technical University, Turkey)

  • DCA-Net: Advanced Small Object Detection Scheme for UAVs Using Contextual Feature Extraction
    Maham Misbah and Haleema Sadia (UAE University, United Arab Emirates); Nasir Saeed (United Arab Emirates University, United Arab Emirates)

  • Fuzzy Logic-Based IoT Object Integrity Self-Management
    Abdelhamid Garah, Nader Mbarek and Sergey Kirgizov (LIB, Université Bourgogne Europe, France)
11:00 – 11:30
Coffee Break
11:30 – 12:30

Keynote 3

Speaker:Josep Domingo-Ferrer (Distinguished Full Professor of Computer Science and an ICREA-Acadèmia Researcher at Universitat Rovira i Virgili, Tarragona, Catalonia)

Title: TBD

Chaired by: TBD 

12:30 – 13:30
Lunch Break
13:30 – 14:30

Keynote 4:

Speaker: José Lopes Esteves (Deputy Head of the Wireless Security Lab at Agence Nationale de la Sécurité des Systèmes d’Information (ANSSI), France)

Title: TBD

Chaired by: TBD 

14:30 – 15:00
Coffee Break
15:00 – 16:00

Technical Session 7: AI and Reinforcement Learning for Intrusion Detection and Wireless Intelligence

  • User Association in Wireless Networks with Distributed GNN-Based Reinforcement Learning
    Martín Randall (Universidad de la República, Uruguay); Santiago Paternain (Rensselaer Polytechnic Institute, USA); Pedro Casas (Austrian Institute of Technology (AIT), Austria); Federico Larroca (Universidad de la República, Uruguay); Pablo Belzarena (Universidad de la Republica, Uruguay)

  • Network Traffic Fingerprinting for IoT Device Identification Using Machine Learning
    Jamal Haydar (Islamic University of Lebanon, Lebanon); Linda Kanaan (IUL, Lebanon); Ali Mokdad (Islamic University of Lebanon, Lebanon); Ali Beydoun (Lebanese University, Lebanon)

  • Advancing Intrusion Detection: A Deep Analysis of Anomalies and Network Protocol Vulnerabilities
    Ali Rachini (Lebanese University, Lebanon & Holy Spirit University of Kaslik, Lebanon); Souheil Taouk (Lebanese University, Lebanon); Maroun Abi Assaf (USEK, Lebanon); Rida Khatoun (Telecom Paris, France)

  • CD2A: Continuous Device-to-Device Authentication Exploiting Crystal Oscillator Impurities
    Muthupavithran Selvam (City, University of London, United Kingdom (Great Britain)); Zeba Khanam (British Telecom, United Kingdom (Great Britain)); Amit Singh (University of Essex, United Kingdom (Great Britain)); Zhan Cui (British Telecom, United Kingdom (Great Britain)); Muttukrishnan Rajarajan (City University London, United Kingdom (Great Britain))
16:00
Closing Conference & Awards
  • Technical Sponsors

     

     

     

  • Important dates

    • Paper Submission Due
      March 2, 2025 (Firm deadline)
    • Notification of Acceptance
      April 3, 2025
    • Camera-Ready Papers due
      April 21, 2025
    • Conference Date
      June 18 - 20, 2025
  • Submissions

  • Organized by