List of Accepted Papers

    1) Multimodal LLMs for Zero-Shot Intrusion Detection Using NetFlow Visualisations

    Majed Luay, University of Queensland, Australia
    Siamak Layeghy, The University of Queensland, Australia
    Gayan Kincy Kulatilleke, University of Queensland
    Yash Pandey, University of Queensland, Australia
    Marius Portmann, University of Queensland

    2) SIMCODE: A Benchmark for Natural Language to ns-3 Network Simulation Code Generation

    Tasnim Ahmed, Queen’s University, Canada
    Mizra Mohammad Azwad, Queen’s University, Canada
    Salimur Choudhury, Queen’s University, Canada

    3) Two-Sided Matching for Batch-Aware LLM Request Scheduling in Edge Networks

    Tan Li, The Hang Seng University of Hong Kong, Hong Kong
    Yanming Gong, The Hang Seng University of Hong Kong, Hong Kong

    4) Pythia: Facilitating Access to Internet Data Using LLMs and IYP

    Dimitrios Giakatos, IIJ Research Laboratory, Japan
    Malte Tashiro, IIJ Research Laboratory, Japan
    Romain Fontugne, Internet Initiative Japan Inc., Japan

    5) LLM-Driven Causal Discovery for Monitoring Metrics in Computing Continuum Systems: A Comparative Study

    Ahmad Atwi Université de Lorraine, CNRS, Inria, LORIA, France
    Abdelkader Lahmadi University of Lorraine, France

    6) Can LLM-Embeddings Detect Phishing URLs?

    Sineefa Rauf, University of Ruhuna, Sri Lanka
    Munzir Muneer, University of Ruhuna, Sri Lanka
    Kajavahini Suseenthiran, University of Ruhuna, Sri Lanka
    Thilina Weerasinghe, University of Ruhuna, Sri Lanka
    Fariza Rashid, The University of Sydney, Australia

    7) Agentic Generative AI for Automation of Cyber Security Attack Chains in Tactical MANETs

    Johannes Franz Loevenich, Thales Germany & University of Osnabrück, Germany
    Roberto Rigolin F. Lopes, Thales, Germany