Abstract is missing.
- Zero Trust Network Intrusion Detection System (NIDS) using Auto Encoder for Attention-based CNN-BiLSTMAbeer Z. Alalmaie, Priyadarsi Nanda, Xiangjian He. 1-9 [doi]
- Early Detection of Ransomware Activity based on Hardware Performance CountersMohan Anand Putrevu, Venkata Sai Charan Putrevu, Sandeep Kumar Shukla. 10-17 [doi]
- A two-pass approach for minimising error in synthetically generated network traffic data setsJacob Soper, Yue Xu 0001, Kien Nguyen 0001, Ernest Foo, Zahra Jadidi. 18-27 [doi]
- ABISchain: Towards a Secure and Scalable Blockchain Using Swarm-based PruningMohamed Moetez Abdelhamid, Layth Sliman, Raoudha Ben Djemaa, Boussad Ait Salem. 28-35 [doi]
- Towards Mission Aware Cyber-Resiliency with Autonomous AgentsGeorgios Gkoktsis, Hagen Lauer, Lukas Jäger. 36-39 [doi]
- Task-based Parallelization Approach for Attacking the Supersingular Isogeny Path ProblemGiang Nam Nguyen, Christian H. Bischof. 40-49 [doi]
- To breach or not? Profiling students' likelihood of breaching university ICT Codes of Conduct: Student Profiling of Breach of ICT Codes of ConductSalma Banu Nazeer Khan, Debbie Richards 0001, Paul Formosa, Sarah Bankins. 50-57 [doi]
- Multi-Featured Anomaly Detection for Mobile Edge Computing Based UAV Delivery SystemsLeilei Xu, Xiao Liu 0004, Frank Jiang 0001, Yi Xu, Aiting Yao, Jia Xu 0010, Xuejun Li. 58-65 [doi]
- Empowering Patients to Delegate and Revoke Access to Blockchain-based Electronic Health RecordsFariza Sabrina, Tony Sahama, Md. Mamunur Rashid 0001, Steven Gordon. 66-71 [doi]
- Rug-pull malicious token detection on blockchain using supervised learning with feature engineeringMinh Hoang Nguyen, Phuong Duy Huynh, Son Hoang Dau, Xiaodong Li. 72-81 [doi]
- AProctor - A practical on-device antidote for Android malwareAkash Patel, Nitesh Kumar, Anand Handa, Sandeep K. Shukla. 82-91 [doi]
- Digital Forensics based on Federated Learning in IoT EnvironmentHania Mohamed, Nickolaos Koroniotis, Nour Moustafa. 92-101 [doi]
- A Comparative Study on Design and Usability of Cryptographic LibrariesJunwei Luo, Xuechao Yang, Xun Yi, Fengling Han, Iqbal Gondal, Guang-Bin Huang. 102-111 [doi]
- Demystifying Threshold Elliptic Curve Digital Signature Algorithm for MultiParty ApplicationsBachar Kachouh, Layth Sliman, Abed Ellatif Samhat, Kamel Barkaoui. 112-121 [doi]
- USB ProxyRobbie Dumitru, Mark R. Beaumont, Bradley D. Hopkins, Simon Windows. 122-125 [doi]
- TTPHunter: Automated Extraction of Actionable Intelligence as TTPs from Narrative Threat ReportsNanda Rani, Bikash Saha, Vikas Maurya, Sandeep Kumar Shukla. 126-134 [doi]
- ICB FL: Implicit Class Balancing Towards Fairness in Federated LearningYanli Li, Laicheng Zhong, Dong Yuan, Huaming Chen, Wei Bao. 135-142 [doi]
- Motif-based Graph Attention Network for Web Service RecommendationYuqi Zhang, Jian Yu, Ji Ruan, Nancy Wang, Sam Madanian, Guiling Wang. 143-146 [doi]
- Improving Connectivity in Multiprocessor Architectures using Rectangular Twisted Torus NetworksSonal Gupta, Subrat Kar. 147-150 [doi]
- Synthetic High-Resolution COVID-19 Chest X-Ray GenerationSehajpreet Kaur, Shivansh Kumar, Hajar Homayouni. 151-159 [doi]
- Development of a Virtual Reality Treatment for Tinnitus - A User StudyCorban Draper, Joe Ee Cheung, Burkhard Wuensche, Philip J. Sanders. 160-169 [doi]
- Stress Detection on Social Network: Public Mental Health Surveillance: Public mental health surveillanceSamaneh Madanian, Hamidreza Rasoulipanah, Jian Yu. 170-175 [doi]
- Exercise Speed Analysis Based on Head Mounted Display OrientationAlex Shaw, Burkhard Claus Wünsche, Christof Lutteroth, Jude Buckley, Paul M. Corballis. 176-182 [doi]
- IR-ER- A Hybrid Pipeline for Classifying COVID-19 RNA Seq DataGirija Rani Karetla, Daniel R. Catchpoole, Paul J. Kennedy, Simeon Simoff, Quang Vinh Nguyen. 183-189 [doi]
- Learning from Machines? Social Bots Influence on COVID-19 Vaccination-Related Discussions: 2021 in ReviewMuhammad Javed, Gerardo Luis Dimaguila, Sedigheh Khademi Habibabadi, Christopher Palmer, Jim Buttery. 190-197 [doi]
- Data augmentation to improve syndromic detection from emergency department notesSedigheh Khademi, Christopher Palmer, Gerardo Luis Dimaguila, Muhammad Javed, Jim Buttery, Jim Black. 198-205 [doi]
- Electronic Master Problem List in Hospital Authority - its development, implementation and challengesMaggie Lau, Vicky Fung, Ngai-Tseung Cheung. 206-211 [doi]
- Dragon Hunter: Loss Aversion for Increasing Physical Activity in AR ExergamesYashi Lin, Jiaxuan Wang, Zihao Luo, Shaojun Li, Yidan Zhang, Burkhard Claus Wünsche. 212-221 [doi]
- Sleep Patterns of Adults with Chronic Insomnia and their Bed Partners During the Weekdays and on Weekends Using Actigraphy DataSunita Rani, Sergiy Shelyag, Maia Angelova. 222-226 [doi]
- Mining adverse drug events from patients' disease histories via a GNN-based subgraph prediction methodFangyu Zhou, Shahadat Uddin. 227-230 [doi]
- How could a weighted drug-drug network help improve adverse drug reaction predictions? Machine learning reveals the importance of edge weightsFangyu Zhou, Shahadat Uddin. 231-233 [doi]
- Developing an anomaly detection framework for Medicare claimsJames Kemp, Christopher Barker, Norm Good, Michael Bain. 234-237 [doi]
- A Case for Causal Loop Diagrams to Model Electronic Health Records EcosystemsMustafa Hashmi, Angelique N. McInnes, Tony Sahama, Andrew Stranieri. 238-239 [doi]
- Using AI-Driven Triaging to Optimise Clinical Workflows in Non-Emergency Outpatient Settings: A Real-World Case Study Concerning the Screening of TuberculosisDavid Hua, Neysa Petrina, Noel Young, Jin-Gun Cho, Alan Sacks, Simon Poon. 240-243 [doi]
- Exploring the Relationship between Testosterone and Diabetes within the UK Biobank DataGiles Oatley. 244-247 [doi]
- A Data-Driven Framework to Test Validity of the Discovered Clinical Process Based on Selected Patient OutcomesQifan Chen, Yang Lu, Charmaine S. Tam, Simon K. Poon. 248-251 [doi]
- A Study Into the Impact of Data Breaches of Electronic Health RecordsRavi Pilla, Taiwo Oseni, Andrew Stranieri. 252-254 [doi]
- Improving the social inclusion of people with disabilities in the remote workplace: Digital assistive technologiesNicola Shaw, Kevin Vinsen. 255-256 [doi]
- Investigating Changes in Hand-Eye Coordination and Reaction Time Using a VR Squash SimulationAkash Ashok, Mazen Darwish, Burkhard Claus Wünsche. 257-260 [doi]