Abstract is missing.
- The Deployment of E-Learning Application as a Web Service in a Cloud Broker ArchitectureRihem Zorgati, Hamdi Hassen, Kahlil Ahmad Alsulbi. 1-12 [doi]
- CarbonApp: Blockchain Enabled Carbon Offset Project ManagementYining Hu, Alistair McFarlane, Farookh Hussain. 13-25 [doi]
- Investigating the Impact of Congestion Control Algorithms on Edge-Cloud ContinuumNicolas Keiji Cattani Sakashita, Maurício Aronne Pillon, Charles Christian Miers, Guilherme Piêgas Koslovski. 26-37 [doi]
- Design and Implementation of a Fuzzy-Based System for Assessment of Relational TrustShunya Higashi, Phudit Ampririt, Ermioni Qafzezi, Makoto Ikeda, Keita Matsuo, Leonard Barolli. 38-47 [doi]
- BarongTrace: A Malware Event Log Dataset for LinuxBaskoro Adi Pratomo, Stefanus A. Kosim, Hudan Studiawan, Angela O. Prabowo. 48-60 [doi]
- Specifying SSI over EAP: Towards an Even Better Eduroam in the FutureRonald Petrlic. 61-73 [doi]
- FastSGX: A Message-Passing Based Runtime for SGXSubashiny Tanigassalame, Yohan Pipereau, Adam Chader, Jana Toljaga, Gaël Thomas 0001. 74-85 [doi]
- Leveraging Chat-Based Large Vision Language Models for Multimodal Out-of-Context DetectionFatma Shalabi, Hichem Felouat, Huy H. Nguyen, Isao Echizen. 86-98 [doi]
- Enhancing the 5G-AKA Protocol with Post-quantum Digital Signature MethodGabriel Rossi Figlarz, Fabiano Passuelo Hessel. 99-110 [doi]
- SoK: Directions and Issues in Formal Verification of Payment ProtocolsHideki Sakurada, Kouichi Sakurai. 111-119 [doi]
- PCPR: Plaintext Compression and Plaintext Reconstruction for Reducing Memory Consumption on Homomorphically Encrypted CNNTakuya Suzuki, Hayato Yamana. 120-132 [doi]
- Design and Performance Evaluation of a Two-Stage Detection of DDoS Attacks Using a Trigger with a Feature on Riemannian ManifoldsYang Lyu, Yaokai Feng, Kouichi Sakurai. 133-144 [doi]
- Discovering Personally Identifiable Information in Textual Data - A Case Study with Automated Concatenation of EmbeddingsMd Hasan Shahriar, Abrar Hasin Kamal, Anne V. D. M. Kayem. 145-158 [doi]
- Towards User-Oriented SteganographyUrszula Ogiela, Marek R. Ogiela. 159-165 [doi]
- AI-Based Cybersecurity SystemsMarek R. Ogiela, Lidia Ogiela. 166-173 [doi]
- Enhancing Mobile Crowdsensing Security: A Proof of Stake-Based Publisher Selection Algorithm to Combat Sybil Attacks in Blockchain-Assisted MCS SystemsAnkit Agrawal, Ashutosh Bhatia, Kamlesh Tiwari. 174-186 [doi]
- Messages and Incentives to Promote Updating of Software on SmartphonesAyane Sano, Yukiko Sawaya, Takamasa Isohara, Masakatsu Nishigaki. 187-200 [doi]
- A Non-interactive One-Time Password-Based Method to Enhance the Vault SecurityJuarez Oliveira, Altair O. Santin, Eduardo Viegas 0001, Pedro Horchulhack. 201-213 [doi]
- Causal Inference to Enhance AI Trustworthiness in Environmental Decision-MakingSuleyman Uslu, Davinder Kaur, Samuel J. Rivera, Arjan Durresi, Meghna Babbar-Sebens. 214-225 [doi]
- Forecasting Malware Incident Rates in Higher Education InstitutionsRildo Antonio de Souza, Vitor de Castro-Silva, Sylvio Barbon Junior, Bruno Bogaz Zarpelão. 226-237 [doi]
- Detecting Malicious Android Game Applications on Third-Party Stores Using Machine LearningThanaporn Sanamontre, Vasaka Visoottiviseth, Chaiyong Ragkhitwetsagul. 238-251 [doi]
- Neural Network Innovations in Image-Based Malware Classification: A Comparative StudyHamzah Al-Qadasi, Djafer Yahia Messaoud Benchadi, Salim Chehida, Kazuhiro Fukui, Saddek Bensalem. 252-265 [doi]
- Enhancing Robustness of LLM-Synthetic Text Detectors for Academic Writing: A Comprehensive AnalysisZhicheng Dou, Yuchen Guo, Ching-Chun Chang, Huy H. Nguyen, Isao Echizen. 266-277 [doi]
- Cognitive Blind Blockchain CAPTCHA ArchitectureNghia Dinh, Huy Tran Tien, Viet-Tuan Le, Huu-Thanh Duong, Lidia Ogiela, Vinh Truong Hoang. 278-288 [doi]
- DVID: Adding Delegated Authentication to SPIFFE Trusted DomainsAndrew Jessup, Henrique Zanela Cochak, Guilherme P. Koslovski, Maurício A. Pillon, Charles Christian Miers, Pedro H. B. Correia, Marco A. Marques, Marcos A. Simplício Jr.. 289-300 [doi]
- Transparent Encryption for IoT Using Offline Key Exchange over Public BlockchainsMamun I. Abu-Tair, Unsub Zia, Jamshed Memon, Bryan W. Scotney, Jorge Martínez Carracedo, Ali Sajjad. 301-313 [doi]
- An End-to-End Approach for the Detection of Phishing AttacksBadis Hammi, Tristan Bilot, Danyil Bazain, Nicolas Binand, Maxime Jaen, Chems Mitta, Nour El Madhoun. 314-325 [doi]
- Efficient Inner-Product Argument from Compressed Σ-Protocols and ApplicationsEmanuele Scala, Leonardo Mostarda. 326-337 [doi]
- A Decentralized Blockchain-Based Platform for Secure Data Sharing in Cloud Storage ModelHouaida Ghanmi, Nasreddine Hajlaoui, Haifa Touati, Mohamed Hadded, Paul Muhlethaler, Saadi Boudjit. 338-348 [doi]
- Enhancing Security and Efficiency: A Lightweight Federated Learning ApproachChunlu Chen, Kevin I-Kai Wang, Peng Li 0017, Kouichi Sakurai. 349-359 [doi]
- Using Biometric Data to Authenticate Tactical Edge Network UsersGuilherme Falcão da Silva Campos, Jovani Dalzochio, Raul Ceretta Nunes, Luís Alvaro de Lima Silva, Edison Pignaton de Freitas, Rafael Kunst. 360-371 [doi]
- SovereignRx: An Electronic Prescription System Based on High Privacy, Blockchain, and Self-Sovereign IdentityMaurício de Vasconcelos Barros, Jean Everson Martina. 372-383 [doi]
- Privacy-Preserving Location-Based Services: A DQN Algorithmic PerspectiveManish Pandey, Harkeerat Kaur, Sudipta Basak, Isao Echizen. 384-399 [doi]
- Knowledge Empowered Deep Reinforcement Learning to Prioritize Alerts Generated by Intrusion Detection SystemsLalitha Chavali, Paresh Saxena, Barsha Mitra. 400-411 [doi]
- Container-Level Auditing in Container Orchestrators with eBPFFabio Junior Bertinatto, Daniel Arioza, Jéferson Campos Nobre, Lisandro Zambenedetti Granville. 412-423 [doi]
- A Study on Privacy-Preserving Transformer Model for Cross-Domain RecommendationJing Ning, Kin Fun Li. 424-435 [doi]
- Exploring SDN Based Firewall and NAPT: A Comparative Analysis with Iptables and OVS in MininetMd Fahad Monir, Azwad Fawad Hasan. 436-447 [doi]
- SDN Supported Network State Aware Command and Control Application FrameworkCarlos André Rodrigues da Silva, Lauro de Souza Silva, Julio Cesar Santos dos Anjos, Jorgito Matiuzzi Stocchero, Juliano Araujo Wickboldt, Edison Pignaton de Freitas. 448-459 [doi]
- Reliability-Aware SFC Protection by Using Nodes with Spare ResourcesHung-You Chen, Pi-Chung Wang. 460-470 [doi]
- Highly Reliable Communication Using Multipath Slices with Alternating TransmissionItalo Tiago da Cunha, Eduardo Castilho Rosa, Rodrigo Moreira, Flávio de Oliveira Silva 0001. 471-482 [doi]