Abstract is missing.
- FL-AdvGNN: A Federated Privacy-Preserving Framework of Adversarial Graph Neural NetworksJingyan Zhang, Irina Tal. 5-22 [doi]
- Digital Twin Technology for Sustainable Shipping: Establishing Cyber-Security Challenges and OpportunitiesAthanasios Chalmoukis, Maria Lambrou. 23-36 [doi]
- Red vs. Blue Team Training Scenarios for 5G/6G NetworksStylianos Karagiannis, Antonios Kasotakis, Emmanouil Magkos, Christoforos Ntantogian. 37-54 [doi]
- LLM-Enhanced Intrusion Detection for Containerized Applications: A Two-Tier Strategy for SDN and Kubernetes EnvironmentsSarantis Kalafatidis, Nikos Papageorgopoulos, Andreas Kartakoullis, Giannis Ledakis 0001. 55-73 [doi]
- A Cyber-Resilient DICE Architecture for Resource-Constrained DevicesUtku Budak, Malek Safieh, Fabrizio De Santis, Georg Sigl. 74-91 [doi]
- NullJack: An Open Approach for Undetectable Ethernet Port ScanningAntónio Deus, Luís Miguel Batista, Dimitri Silva, João Rafael Almeida. 92-109 [doi]
- Group Signatures for Secure and Reliable Industrial Data CollaborationAndy Ludwig, Alexander Giehl, Felix Myhsok. 110-127 [doi]
- Real-Time Digital Ecosystems: Integrating Virtual Personas and Digital Twins Through MicroservicesCosmina Stalidi, Eduard Cristian Popovici, George Suciu. 128-141 [doi]
- Behind Enemy Lines: Strengthening Android Malware Detection with Adversarial TrainingSonia Laudanna, Mattia Marino, Andrea Di Sorbo, P. Vinod 0001, Corrado Aaron Visaggio, Gerardo Canfora. 142-160 [doi]
- Novel Approximations of Elementary Functions in Zero-Knowledge ProofsKaarel August Kurik, Peeter Laud. 165-182 [doi]
- Relaxing the Single Point of Failure in Quantum Key Distribution Networks: An Overview of Multi-path ApproachesFederico Valbusa, Thomas Lorünser, Gabriele Spini, Stephan Laschet. 183-200 [doi]
- b4M: Holistic Benchmarking for MPCKarl W. Koch, Christian Rechberger, Dragos Rotaru. 201-216 [doi]
- A Cloud-Based Multifactor Authentication Scheme Using Post-Quantum Cryptography and Trusted Execution EnvironmentsClaudia Franco, Rosario Arjona, Iluminada Baturone. 217-234 [doi]
- Data Poisoning in FL: Clipping Malicious UpdatesGeorgios P. Spathoulas, Athanasia Kollarou. 239-253 [doi]
- Supporting Human-Robot Collaboration and Safety with the Proposed Explainable Neuro-Symbolic ReasoningRafal Kozik, Aleksandra Pawlicka, Marek Pawlicki, Michal Choras. 254-271 [doi]
- Towards a Metric to Assess Neural Network Resilience Against Adversarial SamplesJohannes Geier, Patrizia Heinl. 272-290 [doi]
- Evaluating Fine-Tuned LLMs for AI Text DetectionMarco Murgia, Diego Reforgiato Recupero, Georgios Spathoulas. 291-302 [doi]
- Side-Channel Analysis of OpenVINO-Based Neural Network ModelsZdenko Lehocký, Jakub Breier, Dirmanto Jap, Shivam Bhasin, Xiaolu Hou. 307-324 [doi]
- Optimizing IoT Attack Detection in Edge AI: A Comparison of Lightweight Machine Learning Models and Feature Reduction TechniquesViet-Anh Phan, Jan Jerabek, Lukas Malina. 325-342 [doi]
- Zero-Knowledge Proof-of-Location Protocols for Vehicle Subsidies and Taxation ComplianceDan Bogdanov, Eduardo Brito, Annika Jaakson, Peeter Laud, Raul-Martin Rebane. 343-360 [doi]
- Integrating Quantum Key Distribution Into Academic Network: Practical Challenges and SolutionsOndrej Klicnik, Klara Turcanova, Petr Munster, Tomás Horváth. 361-369 [doi]