Abstract is missing.
- The Final Round: Benchmarking NIST LWC Ciphers on MicrocontrollersSebastian Renner, Enrico Pozzobon, Jürgen Mottok. 1-20 [doi]
- Evolving a Boolean Masked Adder Using NeuroevolutionSebastian Renner, Enrico Pozzobon, Jürgen Mottok. 21-40 [doi]
- Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract)Chathuranga Sampath Kalutharage, Xiaodong Liu 0002, Christos Chrysoulas. 41-50 [doi]
- Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing FunctionalityRyu Ishii, Kyosuke Yamashita, Zihao Song, Yusuke Sakai 0001, Tadanori Teruya, Goichiro Hanaoka, Kanta Matsuura, Tsutomu Matsumoto. 51-71 [doi]
- Post-quantum Secure Communication with IoT Devices Using Kyber and SRAM Behavioral and Physical Unclonable Functions (Extended Abstract)Roberto Román, Rosario Arjona, Iluminada Baturone. 72-83 [doi]
- Effective Segmentation of RSSI Timeseries Produced by Stationary IoT Nodes: Comparative StudyPooria Madani, Natalija Vlajic. 84-101 [doi]
- Consumer-Friendly Methods for Privacy Protection Against Cleaning RobotsYanxiu Wuwang, Gunther Schiefer. 102-121 [doi]
- Resource Efficient Federated Deep Learning for IoT Security MonitoringIdris Zakariyya, Harsha K. Kalutarage, M. Omar Al-Kadri. 122-142 [doi]
- Man-in-the-OBD: A Modular, Protocol Agnostic Firewall for Automotive Dongles to Enhance Privacy and SecurityFelix Klement, Henrich C. Pöhls, Stefan Katzenbeisser 0001. 143-164 [doi]
- Mapping the Security Events to the MITRE ATT &CK Attack Patterns to Forecast Attack Propagation (Extended Abstract)Roman Kryukov, Vladimir Zima, Elena Fedorchenko, Evgenia Novikova, Igor V. Kotenko. 165-176 [doi]