Abstract is missing.
- We're eBPF'd: Exploring Adversarial Manipulation of ELF Files in eBPF-Based Programmable Network StacksJoe Rose, Marco M. Cook, Filip Holík, Dimitrios Pezaros. 1-9 [doi]
- GANFUSION: GAN-Fused Synthetic Injection for Obfuscating Network Traffic AnalysisLalith Medury, Luke Robinson, Farah I. Kandah. 1-9 [doi]
- Operational Impact-Driven Cybersecurity Risk Assessment for Industrial Cyber-Physical SystemsBruno Paes Leao, Jagannadh Vempati, Gaurav Kumar Srivastava, Siddharth Bhela, Jesse Keller, Priyanjan Sharma. 1-9 [doi]
- Split Happens: Combating Advanced Threats with Split Learning and Function Secret SharingTanveer Khan, Mindaugas Budzys, Antonis Michalas. 1-9 [doi]
- LAMLAD: LLM-Based Adversarial Attack Against Machine Learning for Android Malware DetectionTianwei Lan, Farid Naït-Abdesselam. 1-9 [doi]
- Applying Prompt-Based Mitigation of Gender-Role Bias in Large Language Models for SecurityKyle Stein, Brandon Blackwell, Ernest Funue, Matthew Dees, Shari Watkins, Lanier A. Watkins. 1-6 [doi]
- Fission: Distributed Privacy-Preserving Large Language Model InferenceMehmet Ugurbil, Dimitris Mouris, Manuel B. Santos, José Cabrero-Holgueras, Miguel de Vega, Shubho Sengupta. 1-9 [doi]
- Seeing Through the Threat: Adaptive Attention-Guided Backdoor Defense in Non-IID Federated LearningXiang-Cian You, Arijit Karati. 1-9 [doi]
- Enabling Hybrid Edge-Level Threat Detection in O-RAN Private Networks for Resilience EnhancementTsung-Yen Hsieh, Po-Hung Chen, Cheng-Feng Hung, Shin-Ming Cheng. 1-6 [doi]
- Anticipating the Evolution of APT Variants Using Generative AI and Reinforcement LearningOsama Iskandarani, Boubakr Nour, Makan Pourzandi, Mourad Debbabi, Chadi Assi. 1-10 [doi]
- Real-Time Detection of Multi-Stage Attacks Using Kill Chain State MachinesLiliana Kistenmacher, Anum Talpur, Mathias Fischer 0001. 1-9 [doi]
- Analysis of SRAM-Based PUFs on AMD Xilinx UltraScale+ FPGAs IEEE CNS 25 PosterWakiya Schulz, Clemens Fritzsch, Tobias Rosenkranz, Pascal Ahr, Antonio Saavedra, Lars Renkes, Christoph Lipps, Jörn Hoffmann 0001. 1-3 [doi]
- Collusion-Driven Impersonation Attack on Channel-Resistant RF FingerprintingZhou Xu, Guyue Li, Zhe Peng, Aiqun Hu. 1-9 [doi]
- Logic, Belief Propagation and MisinformationAaron Hunter 0001. 1-2 [doi]
- Enhancing Privacy Through Unlinkable Data Sharing with User-in-the-Loop Access ControlKevin Röbert, Dominik Kaaser, Mathias Fischer 0001. 1-9 [doi]
- Securing Cellular Availability: The Wireless Blackhole Threat and DefenseSang-Yoon Chang, Sourav Purification. 1-9 [doi]
- Non-Linear Polynomial Approximations of the Sigmoid for Plain and Encrypted ModelsSudeepa Panta, Qinghua Li. 1-9 [doi]
- Causal Graph-Based Root Cause Analysis for ICS Sensor StreamsWoo-Hyun Choi, SunWoo Lee, Hyuk Lim, Seunghyun Yoon. 1-2 [doi]
- Reconfiguration of Firewall Filter Rules as a Response to Industrial Control System IntrusionJolahn Vaudey, Stéphane Mocanu, Gwenaël Delaval, Éric Rutten. 1-6 [doi]
- Intelligent Security Operation Centre Services for Critical National InfrastructuresAlexios Lekidis, Maka Karalashvili, Leandros Maglaras, Konstantinos Karantzalos, George Spanoudakis. 1-2 [doi]
- Real-Time Risk Scoring of Ongoing Cyber AttacksHeeyun Kim, Fabian Zuluaga Zuluaga, Collins Evans, Siddhartha R. Dalal, Vishal Misra, Dan Rubenstein. 1-6 [doi]
- An Autonomic Resilient Electrical Grid for a University CampusJam Mogavero, Rebecca Belval, Erwin Franz, Christopher Rouff, Ali Tekeoglu. 1-6 [doi]
- Secret-Key Agreement Through Hidden Markov Modeling of Wavelet Scattering EmbeddingsNora Basha, Bechir Hamdaoui, Attila A. Yavuz, Thang Hoang, Mehran Mozaffari Kermani. 1-9 [doi]
- Dual-Branch Transformer for Anomaly-Based Intrusion Detection from Multivariate KPIs in the 5G User PlaneZixu Tian, Rishika Varma Kalidindi, Mohan Gurusamy. 1-9 [doi]
- A Bayesian Trust-Based Secured Routing Protocol for Opportunistic NetworksJagdeep Singh 0003, Sanjay K. Dhurandher, Isaac Woungang. 1-6 [doi]
- CAPTure: Classifying APT Stages and Techniques via Graph-Enhanced Network Flow RepresentationsMd Taef Uddin Nadim, Qinghua Li. 1-9 [doi]
- Bluetooth Fingerprint Identification Under Domain Shift Through Transient Phase DerivativeHaytham Albousayri, Bechir Hamdaoui, Weng-Keen Wong, Nora Basha. 1-9 [doi]
- UAVIDS-2025: A Benchmark Dataset for Intrusion Detection in UAV Networks Using Machine Learning TechniquesQingli Zeng, Abdalrahman Bashir, Farid Naït-Abdesselam. 1-9 [doi]
- Securing OFDM-Based ISAC Systems Against Sensing AttacksJingcheng Li, Loukas Lazos, Ming Li. 1-9 [doi]
- Evaluating Post-Quantum Cryptography for Resource-Constrained AMI GatewaysSunWoo Lee, Woo-Hyun Choi, Hyuk Lim, Seunghyun Yoon. 1-2 [doi]
- Explainable AI in Tabular Medical Data: A Path to Trustworthy Healthcare DecisionsMaham Aurang Zaib, Shams-ur-Rehman, Erum Malik, Qurat-Ul-Ain Mastoi. 1-9 [doi]
- Hardware Trojan Detection with Machine Learning and Power Side-Channels: A Post-Deployment AnalysisAshwin Koshy John, Sai Tarrun Pitta, Jaya Dofe, Jai Gopal Pandey. 1-6 [doi]
- XCId: An SSI-Based Cross-Cloud Identity WalletMohamed Amine Ben Haj Salah, Romain Laborde, Daniele Canavese, Abdelmalek Benzekri, Mohamed Ali Kandi, Afonso Ferreira. 1-9 [doi]
- SemPerGe: Unveiling Text-Based Adversarial Attacks on Semantic CommunicationAfia Anjum, Arkajyoti Mitra, Paul Agbaje, Md. Ahanaful Alam, Debashri Roy, Md. Salik Parwez, Habeeb Olufowobi. 1-9 [doi]
- Verifiable Alerts for 4G/5G Public Warning SystemSourav Purification, Sang-Yoon Chang. 1-9 [doi]
- MetaHeart: Spoofing Vibrational Biometrics via Dynamic MetasurfacesDora Zivanovic, Jy-Chin Liao, Zhambyl Shaikhanov, Hou-Tong Chen, Chun-Chieh Chang, Sadhvikas Addamane, Daniel M. Mittleman, Edward W. Knightly. 1-9 [doi]
- PlasTrack: Path-Independent Plasma-Induced Attacks on mmWave Sensing TrackingZheshuo Li, Lingfeng Tao, Yidian Hu, Zhengxiong Li. 1-9 [doi]
- iThelma: An Autonomous LLM Agent for Cyber Threat Hunting via Playbook-Driven IntelligenceNick Y. P. Cheng, Raymund Lin, Dean Xie, Hank Lin, Sally Chen. 1-6 [doi]
- Optimizing the Selection of Vulnerability Remediation Actions in Operational Technology EnvironmentsKylie McClanahan, Marie Louise Uwibambe, Qinghua Li. 1-6 [doi]
- Are Flow Correlation Attacks Effective on Tor? A Critical Evaluation of State-of-the-Art ProposalsAlessandro Brighente, Leonardo Cipolletta, Mauro Conti, Ludovico Latini. 1-9 [doi]
- Sec5GLoc: Securing 5G Indoor Localization via Adversary-Resilient Deep Learning ArchitectureIldi Alla, Valeria Loscrì. 1-9 [doi]
- ranDecepter: Real-Time Identification and Deterrence of Ransomware AttacksMd Sajidul Islam Sajid, Jinpeng Wei, Ehab Al-Shaer. 1-9 [doi]
- Post-Quantum Secure Lattice-Based 5G-AKA Protocol Resistant to Malicious Serving Networks with Perfect Forward SecrecyAwaneesh Kumar Yadav, Eshika Choudhary, Onkar Garg, Madhusanka Liyanage. 1-9 [doi]
- Comprehensive Post-Quantum Cryptography Performance Evaluations for QUIC ProtocolPedro Rigon, Honghao Fu, Weverton Cordeiro, Carol Fung. 1-9 [doi]
- UDS Attack Taxonomy: Systematic Classification of Vehicle Diagnostic ThreatsAli Recai Yekta, Nicolas Loza, Jens Gramm, Michael Peter Schneider, Stefan Katzenbeisser 0001. 1-8 [doi]
- ICS-SimLab: A Containerized Approach for Simulating Industrial Control Systems for Cyber Security ResearchJaxson Brown, Duc-Son Pham 0001, Sieteng Soh, Foad Motalebi, Sivaraman Eswaran, Mahathir Almashor. 1-6 [doi]
- ARGOS: Anomaly Recognition and Guarding through O-RAN SensingStavros Dimou, Guevara Noubir. 1-11 [doi]
- Impact of Acoustic Injection Attacks on Micro-UAVsJorrit Olthuis, Bas Arendsen, Savio Sciancalepore, Nicola Zannone. 1-11 [doi]
- A Minimal Overlay-Based Framework for Transitioning Legacy Infrastructure to Zero TrustWenjia Wang, Seyed Masoud Sadjadi, Naphtali Rishe, Arpan Mahara. 1-6 [doi]
- DistilGuard - Large Language Models for Poisoning Detection in Federated LearningTharushi Nehara, Chanmini Kavinya Samaraweera, Oshan Nettasinghe, Ashen Nethsara, Chamara Sandeepa, Tharindu Gamage, Madhusanka Liyanage. 1-9 [doi]
- Tagging Alerts to Adversaries: ML-Enabled Classification Using MITRE ATT&CKAnum Talpur, Jannik Schröder, Liliana Kistenmacher, Georg T. Becker, Wolfram Wingerath, Mathias Fischer 0001. 1-9 [doi]
- Safeguarding Federated Learning-Based Road Condition ClassificationSheng Liu, Panos Papadimitratos. 1-9 [doi]
- Securing xApps in Open RAN: A Hierarchical Approach to Authentication and AuthorisationPramitha Fernando, Pawani Porambage, Madhusanka Liyanage, Kris Steenhaut, An Braeken. 1-9 [doi]
- Energy-Aware Smart Routing for Biomedical Waste Management via Secure Edge Intelligence in 6G-Enabled CPSYasaman Vaziri, Ali Hassan Sodhro. 1-5 [doi]
- PROCATCH: Detecting Execution-Based Anomalies in Single-Instance MicroservicesAsbat EI Khairi, Andreas Peter, Andrea Continella. 1-9 [doi]
- Closing the Visibility Gap: A Monitoring Framework for Verifiable Open RAN OperationsHexuan Yu, Md Mohaimin Al Barat, Yang Xiao 0010, Y. Thomas Hou 0001, Wenjing Lou. 1-9 [doi]
- Dynamic Trust Scoring for Zero Trust at the Edge: A Multi-Factor, Context-Aware ApproachShengjie Xu, Yi Qian. 1-6 [doi]
- A Trust-Aware POMDP Framework for Thwarting Data Falsification Attacks in Cooperative DrivingZiqi Xu, Jingcheng Li, Loukas Lazos, Ming Li. 1-9 [doi]
- Optimizing Local LLM Deployment for 5G CVE Classification Avoiding External Data ExposurePierpaolo Bene, Andrea Bernardini, Leonardo Sagratella, Nicolò Maunero, Marina Settembre. 1-3 [doi]
- Shifting Signatures: The Ephemeral Nature of the Radio Fingerprint on the USRP X310Muhammad Irfan, Gabriele Oligeri, Savio Sciancalepore. 1-6 [doi]
- MulShare: A Multi-Receiver Encrypted Search Scheme to Secure Cloud-Assisted EMRs SharingShiyuan Xu, Xue Chen, Yan Zhao, Shang Gao 0006, Jing Wang, Siu-Ming Yiu. 1-9 [doi]
- Dark Drones: Can They Be Automatically Detected and Mitigated?Isaiah Henry-Simpson, Hortencia Mendoza, Anjie Shen, Xuecheng Wang, Yinzhi Cao, Lanier Watkins. 1-6 [doi]
- Confundus: Mitigating Hostile Wireless Source LocalizationSaiqin Xu, Shuo Wang, Savio Sciancalepore, Alessandro Brighente, Mauro Conti. 1-10 [doi]
- GNN-Based Self-Healing for Detection and Recovery of Compromised Nodes in Mission-Critical Supply ChainsUttam Ghosh, Laurent Njilla, Kristen E. Oguno, Debashis Das. 1-6 [doi]
- Analysis of QoS Degradation Attacks in Multi-Slice Containerized 5G Core NetworksJihyeon Song, Kyungmin Park, Cheolhee Park, Ikkyun Kim. 1-6 [doi]
- Guardians of Privacy: Leveraging LLMs in Assistive Robotic Systems for HealthcareKavyan Zoughalian, Muhammad Aitsam, Jims Marchang, Alessandro G. Di Nuovo. 1-6 [doi]
- Lightweight Biometric Authentication Mechanism Using PPG Signals for WBAN: IEEE CNS 25 PosterIchrak Eddor Mnijli, Amal Sammoud, Guillaume Terrasson, Nicolas Huloux, Mariem El Feki. 1-2 [doi]
- Adversarial Graph Perturbation for Smart Contract Vulnerability DetectionQi Han, Jiamin Deng, Shichang Huang, Yu Lit, Guyue Li, Shan Jiang, Zhe Peng. 1-9 [doi]
- Statistical Model Checking for the Analysis of Attacks in Connected Autonomous VehiclesCinzia Bernardeschi, Adriano Fagiolini, Dario Pagani, Christian Quadri. 1-6 [doi]
- A Federated Flower Learning-Empowered Intrusion Detection System for Vehicle 6G Fog NetworksPattaraporn Khuwuthyakorn, Orawit Thinnukool, Abdullah Lakhan. 1-6 [doi]
- Silver Linings in the Shadows: Harnessing Membership Fingerprinting for Machine UnlearningNexhi Sula, Abhinav Kumar 0007, Han Wang 0021, Jie Hou 0001, Reza Tourani. 1-9 [doi]
- Gender and Intersectional Bias in Cybersecurity for Next Generation Wireless NetworksSonay Caner-Yildirim, Isabella Corradini, Vesna Dimitrova, Valeria Loscrì, Miranda Harizaj. 1-6 [doi]
- HITL-EdgeSec: A Human-in-the-Loop Autoencoder Framework for Anomaly Detection in 6G Edge NetworksEvangelia Konstantopoulou, Valeria Loscrì, Nicolas Sklavos 0001. 1-5 [doi]
- Dearming Android Apps at Install Time: The StegoDefender Case: IEEE CNS 25 PosterAndrea De Filippis, Danilo Dell'Orco, Lorenzo Valeriani, Alessio Merlo, Giuseppe Bianchi 0001. 1-2 [doi]
- Echo: On the Limitations of Noise-Based Radio Fingerprinting ObfuscationOmar Adel Ibrahim, Roberto Di Pietro. 1-9 [doi]
- Energy-Efficient Workload orchestration for 6G Vehicular Edge ComputingNawaz Ali, Fiza Siyal, Gianluca Aloi, Fahed Alkhabbas, Raffaele Gravina, Ali Hassan Sodhro. 1-6 [doi]
- Lightening Encrypted Convolutions: A GPU-Optimized Approach to Private InferenceMenatallah Fadoua Slama, Hiba Guerrouache, Yacine Challal, Karima Benatchba, Riyadh Baghdadi. 1-9 [doi]
- Cybersecurity Awareness and Education for Young Internet Users: A Comprehensive Analysis of Prevention StrategiesDolantina Hyka, Jurgen Meçaj, Festim Kodra, Marija S. Milosevic, Vladimir M. Ciric. 1-5 [doi]
- A Strategic Roadmap for Phased Zero Trust Architecture Implementation in OrganizationsAdrian Rosén, Gurjot Singh Gaba, Andrei V. Gurtov. 1-6 [doi]
- Analyzing Sustainable Security for 6G NetworksTanesh Kumar, Zainab Alwaisi, Abhishek K. Gupta, Nitin Auluck, Petri Mähönen. 1-7 [doi]
- Embedding Covert Signals in Federated Learning: IEEE CNS 25 PosterSang Wu Kim, Chenyu Xu. 1-2 [doi]
- Explainable AI-Driven Threat Detection and Response for Industrial IoTShokooh Khandan, Deniz Beyazgul, Olamide Jogunola, Yakubu Tsado, Tooska Dargahi. 1-6 [doi]
- From Uptime to Remediation Speed: Advancing DNS Abuse Mitigation MetricsCarlos Hernandez Gañán, Siôn Lloyd, Sam Cheadle, Samaneh Tajalizadehkhoob. 1-9 [doi]
- Next-Generation Deep Learning Integrated Drone Security: A 6G-Powered Enabled Edge Cloud ArchitectureJia Wang, Ruitao Cheng, Abdullah Lakhan. 1-6 [doi]
- Performance Evaluation of 5G Roaming Security Based on PRINSOliver Zeidler, Daniel Fraunholz, Julian Sturm, Hartmut König, Wolfgang Kellerer. 1-10 [doi]
- An Effective and Robust Similarity-Based Phishing Website Detector in Cyber-Physical SystemsHiu Chi Sit, Aysan Esmradi, Daniel Wankit Yip, Peng Sun. 1-6 [doi]
- Applicability of LLM in Assessing the Reliability of Members to Mitigate Internal ThreatsMasahito Kumazaki, Hirokazu Hasegawa, Hiroki Takakura. 1-6 [doi]
- Practical Reflection Manipulation on mmWave-Based Physical Intrusion DetectionAliu Akinwale, Wentao Gao, Jiawei Li 0010, Ang Li 0013, Xiaojun Shang, Yanchao Zhang, Dianqi Han. 1-9 [doi]
- IoT - FedMalDetect: Federated Learning Based Malware Detection for IoT Edge DevicesHeetkumar Patel, Suresh Kumar Amalapuram, Saurabh Kumar, Bheemarjuna Reddy Tamma. 1-9 [doi]
- A Physical Layer Chaotic Encryption Method for a Wireless OFDM systemHelena Celestino Maia, Calum Brown, John Dooley. 1-6 [doi]