| 1 | -- | 12 | Maryam Rajabzadeh Asaar, Mustafa Husam Shareef Alrzij. An Authenticated Key Establishment Protocol with Perfect Forward Secrecy in Smart Grids |
| 13 | -- | 23 | Sedigheh Khajouei Nejad, Sam Jabbehdari, Hamid Haj Seyyed Javadi, Seyed Mohammad Hossein Moattar. Enhancing Lattice-Based Attribute-Based Encryption with Robust Fine-Grained Access Policies |
| 25 | -- | 41 | Motahareh Dehghan, Babak Sadeghiyan, Erfan Khosravian, Alireza Sedighi Moghadam, Farshid Nooshi. ProAPT: Projection of APTs with Deep Reinforcement Learning |
| 43 | -- | 57 | Ala Ekramifard, Haleh Amintoosi, Seyed-Amin Hosseini-Seno. Detection of Membership Inference Attacks on GAN Models |
| 59 | -- | 73 | Navid Shirmohammadi, Behrouz Tork Ladani. CST-SDL: A Scenario Description Language for Collaborative Security Training in Cyber Ranges |
| 75 | -- | 106 | Gholam Reza Moghissi, Ali Payandeh. Design of an Accurate BKZ Simulation |