Abstract is missing.
- A Robust Anonymous Authentication Scheme for Securing IoT-Enabled Healthcare ServicesSana Ullah, Shanshan Tu, Akhtar Badshah, Muhammad Waqas 0001. 1-6 [doi]
- Optimising Intrusion Detection in Cyber-Physical SystemsHenry Chima Ukwuoma, Gilles Dusserre, Gouenou Coatrieux, Johanne Vincent, Nasir Baba Ahmed. 7-14 [doi]
- Advanced Anomaly Detection in Energy Control Systems Using Machine Learning and Feature EngineeringZaid Allal, Hassan Noura 0001, Ola Salman, Ali Chehab. 15-21 [doi]
- Dynamic Defense Framework: A Unified Approach for Intrusion Detection and Mitigation in SDNWalid El Gadal, Sudhakar Ganti. 22-27 [doi]
- Introspective Intrusion Detection System Through Explainable AIBetül Güvenç Paltun, Ramin Fuladi. 28-32 [doi]
- Lightweight Machine Learning-Based IDS for IoT EnvironmentsZakaria Alomari, Zhida Li, Adetokunbo Makanju. 33-37 [doi]
- Effective Anomaly Detection in 5G Networks via Transformer-Based Models and Contrastive LearningSaeid Sheikhi, Panos Kostakos 0001, Susanna Pirttikangas. 38-43 [doi]
- Blockchain-Enabled Digital Product Passports for Enhancing Security and Lifecycle Management in Healthcare DevicesFatemeh Stodt, Philipp Ruf, Christoph Reich. 44-51 [doi]
- Blockchain-Enhanced E-Ticket Distribution System to Effective Transactions, Validation, and AuditsAdrián Guayasamín, Walter Fuertes, Nahir Carrera, Luis Tello-Oquendo, Valeria Suango. 52-59 [doi]
- Blockchain-Enabled Collaborative Forged Message Detection in RSU-Based VANETsAli Jalooli, Huzaif Khan, Lokesh Purohit. 60-67 [doi]
- SDN-API-Sec: A Conflict-Free BC-Based Authorization for Cross-Domain SDNsMajd Latah, Kübra Kalkan. 68-75 [doi]
- Keystroke Dynamics Authentication with MLP, CNN, and LSTM on a Fixed-Text Data SetHalvor Nybø Risto, Steven Bos, Olaf Hallan Graven. 76-82 [doi]
- Detecting DNS Tunnelling and Data Exfiltration Using Dynamic Time WarpingStefan Machmeier, Vincent Heuveline. 83-91 [doi]
- Chat or Trap? Detecting Scams in Messaging Applications with Large Language ModelsYuan-Chen Chang, Esma Aïmeur. 92-99 [doi]
- Ransomwise: A Transaction-Based Dataset for Ransomware Bitcoin Wallet DetectionIoannis Arakas, Nikolaos Myrtakis, Thomas Marchioro, Evangelos P. Markatos. 100-107 [doi]
- VishGuard: Defending Against VishingZi Heng Phang, Wei Ming Tan, Joshua Sheng Xiong Choo, Zhi Kang Ong, Weng Hong Isaac Tan, Huaqun Guo. 108-115 [doi]
- Spam No More: A Cross-Model Analysis of Machine Learning Techniques and Large Language Model EfficaciesRobin Chataut, Aadesh Upadhyay, Yusuf Usman, Mary Nankya, Prashnna K. Gyawali. 116-122 [doi]
- Predicting User Activities and Device Interactions Using Adversarial Sensor Data: A Machine Learning ApproachRizwan Ahmed Kango, Mehak Fatima Qureshi, Wai-Yiu Keung, Umair Mujtaba Qureshi, Zuneera Umair, Ho Chuen Kam. 123-127 [doi]
- Anticipating Cyber Threats: Deep Learning Approaches for DDoS Attacks ForecastingDhia Ben Ali, Mohamed Belaoued, Samir Dawaliby. 128-132 [doi]
- Identifying APT Attack Stages Using Anomaly Score CalibrationOrnella Lucresse Soh, Issa Traoré, Isaac Woungang, Wei Lu, Marcelo L. Brocardo. 133-137 [doi]
- Convergence of AI for Secure Software DevelopmentRoberto O. Andrade, Jenny Torres 0001, Pamela Flores, Erick Cabezas, Jorge Segovia. 138-142 [doi]
- A Multi-Level Network Traffic Classification in Combating Cyberattacks Using Stack Deep Learning ModelsBelieve Ayodele, Victor Buttigieg. 143-146 [doi]
- Password Classification Using Machine Learning and Natural Language Processing Techniques: Methods and EvaluationsBinh Le Thanh Thai, Tsubasa Takii, Hidema Tanaka. 147-150 [doi]
- Detecting Spam Emails Using Machine Learning and Lemmatization vs Traditional MethodsJun Peng, Derick Kwok, Huaqun Guo. 151-152 [doi]
- A Machine Learning Approach of Predicting Ransomware Addresses in BlockChain NetworksAnika Maisha Tasnim, Amrin Hassan Heya, Md Maraj Rashid, Nafis Shahriar, Raqeebir Rab, Abderrahmane Leshob. 153-156 [doi]
- Towards an Unsupervised Reward Function for a Deep Reinforcement Learning Based Intrusion Detection SystemBilel Saghrouchni, Frédéric Le Mouël, Bogdan Szanto. 157-160 [doi]
- A New Generation of Security for the 6GGuy Pujolle, Pascal Urien. 161-164 [doi]
- AsIf: Asset Interface Analysis of Industrial Automation DevicesThomas Rosenstatter, Christian Schäfer, Olaf Saßnick, Stefan Huber 0001. 165-172 [doi]
- An Efficient Explainable Artificial Intelligence (XAI)-Based Framework for a Robust and Explainable IDSBeny Nugraha, Abhishek Venkatesh Jnanashree, Thomas Bauschert. 173-181 [doi]
- FASIL: A Challenge-Based Framework for Secure and Privacy-Preserving Federated LearningFerhat Karakoç, Betül Güvenç Paltun, Leyli Karaçay, Ömer Faruk Tuna, Ramin Fuladi, Utku Gülen. 182-189 [doi]
- APT Warfare: Technical Arsenal and Target Profiles of Linux Malware in Advanced Persistent ThreatsJayanthi Ramamoorthy, Cihan Varol, Narasimha K. Shashidhar. 190-196 [doi]
- Security and Privacy-Preserving for Machine Learning Models: Attacks, Countermeasures, and Future DirectionsFatema El Husseini, Hassan Noura 0001, Flavien Vernier. 197-204 [doi]
- DID U Misbehave? A New Dataset for In-Depth Understanding of Inconspicuous SoftwareAntonin Verdier, Romain Laborde, Abir Laraba, Abdelmalek Benzekri. 205-212 [doi]
- Towards Identification of Network Applications in Encrypted TrafficIvana Burgetova, Ondrej Rysavý, Petr Matousek. 213-221 [doi]
- An Autonomic Chess Bot Detection & Defeat SystemAndrew Bengtson, Christopher Rouff, Ali Tekeoglu. 222-227 [doi]
- A Hybrid Machine Learning - Fuzzy Cognitive Map Approach for Fast, Reliable DDoS Attack DetectionPrathibha Keshavamurthy, Sarvesh Kulkarni. 228-235 [doi]
- Kubernetes-Driven Network Security for Distributed ACL ManagementTushar Gupta. 236-242 [doi]
- Towards the Removal of Identification and Authentication Authority from IM SystemsDavid A. Cordova Morales, Ahmad Samer Wazan, Romain Laborde, Muhammad Imran Taj 0001, Adib Habbal, Gina Gallegos-García. 243-247 [doi]
- Pirates of the MQTT: Raiding IIoT Systems with a Rogue ClientWael Alsabbagh, Samuel Amogbonjaye, Chaerin Kim, Peter Langendörfer. 248-253 [doi]
- A New Similarity-Based Classification Scheme of Drone Network AttacksSalah Dine Maham, Guy Pujolle, Atiq Ahmed, Dominique Gaïti. 254-258 [doi]
- Blockchain and Biometric Systems Integration for IoMT SecurityIlham Laabab, Abdellatif Ezzouhairi, Nour El Madhoun, Muhammad Haris Khan. 259-262 [doi]
- Regulatory Compliance Verification: A Privacy Preserving ApproachMassimo Morello, Petri Sainio, Mohammed Alshawki. 263-267 [doi]
- Interdisciplinary Research Project 'AI Shield'Thijs van Ede, Trix Mulder, Evgeni Moyakine. 268-271 [doi]
- Adaptive Optimization of TLS Overhead for Wireless Communication in Critical InfrastructureJörn Bodenhausen, Laurenz Grote, Michael Rademacher, Martin Henze. 272-275 [doi]
- A Situational Assessment Module for CCAM ApplicationsEnes Begecarslan, Burcu Ozbay. 276-277 [doi]
- Mobbing: AI-Powered Cyberthreat Behavior Analysis and ModelingPatricio Zambrano, Jenny Torres 0001, Carlos E. Anchundia, Johan Illicachi. 278-281 [doi]
- Cross ML for Io(H)T Network Traffic Classification: A New Approach Towards StandardizationEmmanuel Song Shombot, Gilles Dusserre, Robert Bestak, Nasir Baba Ahmed. 282-288 [doi]
- Advanced Smart Contract Vulnerability Detection Using Large Language ModelsFatemeh Erfan, Mohammad Yahyatabar, Martine Bellaïche, Talal Halabi. 289-296 [doi]
- Advanced Machine Learning Approaches for Zero-Day Attack Detection: A ReviewFatema El Husseini, Hassan Noura 0001, Ola Salman, Ali Chehab. 297-304 [doi]
- AI Security: Cyber Threats and Threat-Informed DefenseKamal Singh, Rohit Saxena, Brijesh Kumar 0002. 305-312 [doi]