| 0 | -- | 0 | Moya Kate Baldry, Jassim Happa, Anthony Steed, Simon Smith 0002, Mashhuda Glencross. From Embodied Abuse to Mass Disruption: Generative, Inter-Reality Threats in Social, Mixed-Reality Platforms |
| 0 | -- | 0 | Nanda Rani, Bikash Saha, Vikas Maurya, Sandeep Kumar Shukla. TTPXHunter: Actionable Threat Intelligence Extraction as TTPs from Finished Cyber Threat Reports |
| 0 | -- | 0 | Robin Buchta, Georgios Gkoktsis, Felix Heine, Carsten Kleiner. Advanced Persistent Threat Attack Detection Systems: A Review of Approaches, Challenges, and Trends |
| 0 | -- | 0 | Akaki Tsunoda. Investigating Threats Posed by SMS Origin Spoofing to IoT Devices |
| 0 | -- | 0 | Luke Harrison, Samiran Bag, Hang Luo 0001, Feng Hao 0001. VERICONDOR: End-to-End Verifiable Condorcet Voting with support for Strict Preference and Indifference |
| 0 | -- | 0 | Marcus Botacin. Fuzzing and Symbolic Execution for Multipath Malware Tracing: Bridging Theory and Practice via Survey and Experiments |
| 0 | -- | 0 | Aakash Varma Nadimpalli, Ajita Rattani. Social Media Authentication and Combating Deepfakes Using Semi-Fragile Invisible Image Watermarking |