1 | -- | 0 | Cristina Regueiro, Borja Urquizu. Blockchain-Based Evidence Trustworthiness System in Certification |
2 | -- | 0 | Vedran Dakic, Zlatan Moric, Ana Kapulica, Damir Regvart. Analysis of Azure Zero Trust Architecture Implementation for Mid-Size Organizations |
3 | -- | 0 | Dharani Kanta Roy, Hemanta Kumar Kalita. Enhanced Deep Autoencoder-Based Reinforcement Learning Model with Improved Flamingo Search Policy Selection for Attack Classification |
4 | -- | 0 | Mohamed Ali Kazi. Detecting Malware C&C Communication Traffic Using Artificial Intelligence Techniques |
5 | -- | 0 | K. C. Lalropuia, Sanjeev Goyal, Borja Garcia de Soto, Dongchi Yao, Muammer Semih Sonkor. Mitigating Malicious Insider Threats to Common Data Environments in the Architecture, Engineering, and Construction Industry: An Incomplete Information Game Approach |
6 | -- | 0 | Abdulazeez AlAli, George Theodorakopoulos 0001. Partial Fake Speech Attacks in the Real World Using Deepfake Audio |
7 | -- | 0 | Anna Thomaidou, Konstantinos Limniotis. Navigating Through Human Rights in AI: Exploring the Interplay Between GDPR and Fundamental Rights Impact Assessment |
8 | -- | 0 | Abeer Y. Al-Hyari, Mua'ad Abu-Faraj, Charlie Obimbo, Moutaz Alazab. Chaotic Hénon-Logistic Map Integration: A Powerful Approach for Safeguarding Digital Images |
9 | -- | 0 | Mohammed Tayebi, Said El Kafhali. Generative Modeling for Imbalanced Credit Card Fraud Transaction Detection |
10 | -- | 0 | A. Binod Sapkota, Arjun Ray, Manish Kumar Yadav, Babu R. Dawadi, Shashidhar R. Joshi. Machine Learning-Based Attack Detection and Mitigation with Multi-Controller Placement Optimization over SDN Environment |