Abstract is missing.
- A secure blockchain-based architecture for the COVID-19 data networkDarine Al-Mohtar, Amani Ramzi Daou, Nour El Madhoun, Rachad Maallawi. 1-5 [doi]
- Authenticating IDS autoencoders using multipath neural networksRaphaël M. J. I. Larsen, Marc-Oliver Pahl, Gouenou Coatrieux. 1-9 [doi]
- Mitigation of poisoning attack in federated learning by using historical distance detectionZhaosen Shi, Xuyang Ding, Fagen Li, Yingni Chen, Canran Li. 10-17 [doi]
- Advances in ML-Based Anomaly Detection for the IoTChristian Lübben, Marc-Oliver Pahl. 18-22 [doi]
- Inferring Legacy IoT Device Behavior over a Layer 2 TLS TunnelRodrigo Caldas, Carlos Novo, Ricardo Morla, Luis Cruz 0007, António Carvalho, David Campelo. 23-30 [doi]
- Classification of malicious and benign websites by network features using supervised machine learning algorithmsSanaa Kaddoura. 36-40 [doi]
- Intrusion detection systems in in-vehicle networks based on bag-of-wordsGianmarco Baldini. 41-48 [doi]
- Innovative Countermeasures to Defeat Cyber Attacks Against Blockchain WalletsPascal Urien. 49-54 [doi]
- Incremental code updates exploitation as a basis for return oriented programming attacks on resource-constrained devicesAbdElaziz Saad AbdElaziz AbdElaal, Kai Lehniger, Peter Langendörfer. 55-62 [doi]
- Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP SystemsMwrwan Abubakar, Zakwan Jaroucheh, Ahmed Yassin Al-Dubai, William J. Buchanan. 63-70 [doi]
- Modeling Evasive Malware Authoring TechniquesMathew Nicho, Maitha Alkhateri. 71-75 [doi]
- State of the art: Cross chain communicationsPedro B. Velloso, David Cordova Morales, Thi Mai Trang Nguyen, Guy Pujolle. 76-81 [doi]
- C4M: A Partition-Robust Consensus Algorithm for Blockgraph in Mesh NetworkDavid Cordova Morales, Pedro B. Velloso, Alexandre Laube, Thi Mai Trang Nguyen, Guy Pujolle. 82-89 [doi]
- Forensic Analysis of the Cisco WebEx ApplicationZainab Khalid, Farkhund Iqbal, Faouzi Kamoun, Mohammed Hussain, Liaqat Ali Khan. 90-97 [doi]
- Real Time Detection of Social Bots on Twitter Using Machine Learning and Apache KafkaEiman Alothali, Hany Alashwal, Motamen Salih, Kadhim Hayawi. 98-102 [doi]
- Blockchain-based Secure CIDS OperationImran Makhdoom, Kadhim Hayawi, Mohammed Kaosar, Sujith Samuel Mathew, Mohammad Mehedy Masud. 103-106 [doi]
- AI based Login System using Facial RecognitionSiem Girmay, Faniel Samsom, Asad Masood Khattak. 107-109 [doi]