Program
Please, consider Macau Time zone (GMT+8)
- Short Papers: 15min presentation + 5min questions
- Full Papers: 20min presentation + 5min questions
Caption
| #I0 | Room 8 |
|---|
| 14:00 |
Live
Opening Remarks
|
|
|---|---|---|
| :5 | ||
| :10 |
Live
Measuring Onion Website Discovery and Tor Users Interests with Honeypots Arttu Paju, Waris Abdullah, and Juha Nurmi Full Paper |
|
| :15 | ||
| :20 | ||
| :25 | ||
| :30 | ||
| :35 |
Live
Uncovering the Darknet: A Hybrid Intelligence Framework for Drug Market Surveillance Diogo Rio, Krishna Teja Atluri, Giuseppe Cascavilla, and Jessica De Pascale Full Paper |
|
| :40 | ||
| :45 | ||
| :50 | ||
| :55 | ||
| 15:00 |
Live
An Empirical Investigation of Ransomware Encryption Techniques and Forensic Evidence Availability Tjielke Nabuurs, Cristoffer Leite, Indika Kumara, Roya Nasiri, Matthijs Vos, and Justin Hende Full Paper |
|
| :5 | ||
| :10 | ||
| :15 | ||
| :20 |
| #I0 | Room 8 |
|---|
| :55 |
Live
Pedro Gontijo, Robson Albuquerque, and João Gondim Short Paper |
|
|---|---|---|
| 16:00 | ||
| :5 | ||
| :10 | ||
| :15 |
Live
Design and Implementation of a Multi-Agent Threat Intelligence Assistant based on Generative AI Francesco Saccone, Alessandro Manzi, Andrea Di Sorbo, Elisa Costante, and Corrado Aaron Visaggio Short Paper |
|
| :20 | ||
| :25 | ||
| :30 | ||
| :35 |
Live
Scam Shield: Multi-Model Voting and Fine-Tuned LLMs Against Adversarial Attacks Chen-Wei Chang, Shailik Sarkar, Hossein Salemi, Hyungmin Kim, Shutonu Mitra, Hemant Purohit, Fengxiu Zhang, Michin Hong, Jin-Hee Cho, and Chang-Tien Lu Full Paper |
|
| :40 | ||
| :45 | ||
| :50 | ||
| :55 | ||
| 17:00 |
Live
|
|
| :5 | ||
| :10 | ||
| :15 | ||
| :20 | ||
| :25 |
Live
Closing Remarks
|