Abstract is missing.
- SafetilBERT: an efficient and explained LLM for IoMT attacks classificationMamadou Niang, Haïfa Nakouri, Fehmi Jaafar. 1-8 [doi]
- Reimagining the Usermode Process Space by Utilizing Hardware-Enforced Sub-Process IsolationMark Nelson, Mehdi Mirakhorli. 9-16 [doi]
- Evasion of Deep Learning Malware Detection via Adversarial Selective ObfuscationClaudia Greco, Michele Ianni, Antonella Guzzo, Giancarlo Fortino. 17-22 [doi]
- DP-Tabula: Differentially Private Synthetic Tabular Data Generation with Large Language ModelsWeijie Niu, Zehao Zhang, Alberto Huertas Celdrán, Chao Feng 0001, Jan von der Assen, Nasim Nezhadsistani, Burkhard Stiller. 23-28 [doi]
- A Machine Learning Approach to Automate Greybox TestingAlaa Hijazi, Dany Mezher, Elie Zeidan, Carole Bassil. 29-35 [doi]
- Offloading Key Switching on GPUs: A Path towards Seamless Acceleration of FHEOrion Papadakis, Michail Papadimitriou, Athanasios Stratikopoulos, Maria Xekalaki, Juan Fumero, Christos Kotselidis. 36-41 [doi]
- Towards DoS Attack Detection for IoT Systems: A Cross-Layer Oriented Approach Based on Machine Learning TechniquesDimitrios Tasiopoulos, Apostolos Xenakis, Alexios Lekidis, Dimitrios Kosmanos, Costas Chaikalis, Vasileios Vlachos. 42-49 [doi]
- Audio-deepfake: Generation Methods, Legitimate Applications and the Potential for MisuseGueltoum Bendiab, Kamel Zeltni, Mohamed Bader-El-Den, Stavros Shiaeles. 50-56 [doi]
- Enhancing Deep Learning Based IDS Adversarial Robustness With Causal InferenceFrançois Marin, Pierre-Emmanuel Arduin, Myriam Merad. 57-62 [doi]
- Defending Against Beta Poisoning Attacks in Machine Learning ModelsNilufer Gulciftci, Mehmet Emre Gursoy. 63-70 [doi]
- Reducing Human-Induced Label Bias in SMS Spam with Context-Enhanced Clustering (CEC)Gerard Shu Fuhnwi, Ann Marie Reinhold, Clemente Izurieta. 71-76 [doi]
- A Novel GNN-based Approach for Detection of Prompt Injection AttacksGaurav Jadhav, Amit Kumar Singh 0002, Zeba Khanam, Robert Hercock. 77-82 [doi]
- Enhancing Cyber Threat Intelligence Sharing through Data Spaces in Critical InfrastructuresMehdi Akbari Gurabi, Ömer Sen, Navid Rahimidanesh, Andreas Ulbig, Stefan Decker. 83-90 [doi]
- Explainable Ransomware Detection through Static Analysis and Machine LearningGiovanni Ciaramella, Fabio Martinelli, Antonella Santone, Francesco Mercaldo. 91-98 [doi]
- Space Cyber Risk Management: Desired PropertiesEkzhin Ear, Brandon Bailey, Shouhuai Xu. 99-104 [doi]
- Machine-Learning Anomaly Detection for Early Identification of DDoS in Smart Home IoT DevicesRoland Lamptey, Mohammad Saedi, Vladimir Stankovic 0002. 105-110 [doi]
- 3: An Extensible and Multi-Threaded Toolkit for Local Differential Privacy Protocols and Post-Processing MethodsBerkay Kemal Balioglu, Alireza Khodaie, Mehmet Emre Gursoy. 111-118 [doi]
- Efficient and Privacy-Preserving Authentication Using Verifiable CredentialsAytaj Badirova, Shirin Dabbaghi Varnosfaderani, Ramin Yahyapour. 119-124 [doi]
- Evasive Ransomware Attacks Using Low-level Behavioral Adversarial ExamplesManabu Hirano, Ryotaro Kobayashi. 125-132 [doi]
- Integrating Cyber Threat Intelligence into Threat Modeling for Autonomous Ships Using PASTA and MISPMuhammed Erbas, Jani Vanharanta, Jarkko Paavola, Leonidas Tsiopoulos, Risto Vaarandi. 133-139 [doi]
- Budget-Conscious Differentially Private Aggregation of Power Data TimeseriesFawaz Kserawi, Gabriel Ghinita. 140-145 [doi]
- Technological Framework for a Secure and Resilient Food Supply ChainMarten Fischer, Ralf Tönjes, Rohit Bohara, Mirko Ross, Achyut Hegde, Christian Wressnegger, Matthias Brunner. 146-152 [doi]
- Classification of Software Vulnerability Artifacts Using Public Internet DataLeonardo Ambrus de Lima, Estevão Rabello Ussler, Miguel Angelo Santos Bicudo, Daniel Sadoc Menasché, Anton Kocheturov, Gaurav Kumar Srivastava. 153-158 [doi]
- PCIe Monitoring for Secure Code Execution in Heterogeneous System ArchitecturesIasonas Georgakas, Eva Papadogiannaki, Konstantinos Georgopoulos, Sotiris Ioannidis. 159-165 [doi]
- Abstract Attack Intention Inference Using Low-Rank Gated Arithmetic Interactive AttentionWanrong Yang, Manhui Wang, Dominik Wojtczak. 166-173 [doi]
- A Reinforcement Learning Approach to Multi-Parametric Input Mutation for FuzzingMarie Louise Uwibambe, Akanksha Tyagi, Qinghua Li. 174-179 [doi]
- The Notional Risk Scores Approach to Space Cyber Risk ManagementEkzhin Ear, Brandon Bailey, Shouhuai Xu. 180-185 [doi]
- Optimized Security Measure Selection: Leveraging MILP Solvers To Balance Risk And CostPierre Fobougong Saha, Mohamed Mejri, Kamel Adi. 186-193 [doi]
- Large Scale Cyber Security Log Classification Using Semi-Supervised ClusteringPeng Cai, Mihai Lazarescu, Sie Teng Soh, Reza Ryan. 194-199 [doi]
- Security Vulnerabilities in AI-Generated JavaScript: A Comparative Study of Large Language ModelsDeniz Aydin, Serif Bahtiyar. 200-205 [doi]
- Contrastive Self-Supervised Network Intrusion Detection Using Augmented Negative PairsJack Wilkie 0002, Hanan Hindy, Christos Tachtatzis, Robert C. Atkinson. 206-213 [doi]
- Design and implementation of a tool to improve error reporting for eBPF codeRosario Rizza, Riccardo Sisto, Fulvio Valenza. 214-219 [doi]
- FE4MQTT - Using Functional Encryption to Improve the Privacy in Publish-Subscribe Communication SchemesMarten Fischer, Ralf Tönjes. 220-225 [doi]
- Metamorphic Relation Prediction for Security Vulnerability Testing of Online Banking ApplicationsKarishma Rahman, Ann Marie Reinhold, Clemente Izurieta. 226-233 [doi]
- A Collusion-Resistant DECO-Based Attestation Protocol for Practical ApplicationsUgur Sen, Murat Osmanoglu, Ali Aydin Selçuk. 234-239 [doi]
- An Efficient Methodology for Real-Time Risk and Impact Assessment in 5G NetworksDionysia Varvarigou, Konstantinos Lampropoulos 0001, Odysseas G. Koufopavlou, Spyros G. Denazis, Paris Kitsos. 240-247 [doi]
- Adaptive Weighted Ensemble Learning for Intrusion Detection in Industrial IoT and Edge ComputingSergio Ruiz-Villafranca, Luis Miguel García-Sáez, José Roldán Gómez, Javier Carrillo Mondéjar, Juan Manuel Castelo Gómez, José Luis Martínez 0001. 248-253 [doi]
- CONSENTIS - An Innovative Framework for Identity and Consent Management for EU Digital and Data StrategiesNikos Kyriakoulis, Charis Dimopoulos, George Daniil, Konstantinos Lampropoulos 0001, Vassilis Prevelakis, Panos Karantzias, Andreea Bianca Popescu, Angeles Fuentes-Exposito, Nikos Nikolaou, Spyridon Papastergiou, George Alexandris, Maria Tasouli, Georgios Karavias, Eleni Kosta, Ovidiu Mihaila. 254-259 [doi]
- MiniLib: A flow analysis-based approach for attack surface reduction through software debloatingLoukas Kopanias, Panagiotis Sotiropoulos, Nicholas Kolokotronis, Costas Vassilakis 0001. 260-266 [doi]
- RuleXploit: A Framework for Generating Suricata Rules from Exploits Using Generative AIAngelos Papoutsis, Athanasios Dimitriadis, Ilias Koritsas, Dimitrios Kavallieros, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris. 267-274 [doi]
- C2-based Malware Detection Through Network Analysis Using Machine LearningMartin Martijan, Virgilijus Krinickij, Linas Bukauskas. 275-280 [doi]
- A Bayesian-Markov Framework for Proactive and Dynamic Cyber Risk Assessment Driven by EPSSPavlos Cheimonidis, Konstantinos Rantos. 281-286 [doi]
- From One Network to Another: Transfer Learning for IoT Malware DetectionKonstantina Bosinaki, Dimosthenis Natsos, Giorgos Siachamis, Andreas L. Symeonidis. 287-294 [doi]
- Post-Quantum Security Evaluation of Aeronautical CommunicationsKonstantinos Spalas, Nicholas Kolokotronis. 295-301 [doi]
- Trusted Identity Authentication for Digital Scholarship Participants Based on Verifiable CredentialXinyu Wu, Zhenxin Wu, Hanyu Li. 302-307 [doi]
- HyperDtct: Hypervisor-based Ransomware Detection using System CallsJan von der Assen, Alberto Huertas Celdrán, Jan Marc Lüthi, José María Jorquera Valero, Francisco Enguix, Gérôme Bovet, Burkhard Stiller. 308-313 [doi]
- Using Topic Modeling and LLMs to Recommend CAPEC Attack Patterns: A Comparative StudyUriah Vendell Moore, Xiaohong Yuan, Hamidreza Moradi. 314-319 [doi]
- A Multi-level User Identity Authentication Scheme Based on Environmental DetectionNida Zeeshan, Luigi La Spada, Makhabbat Bakyt. 320-325 [doi]
- A Comprehensive 5G Dataset for Control and Data Plane Security and Resource ManagementBeny Nugraha, Mehrdad Hajizadeh, Tim Niehoff, Abhishek Venkatesh Jnanashree, Trung V. Phan, Dionysia Triantafyllopoulou, Oliver Krause, Martin Mieth, Klaus Moessner, Thomas Bauschert. 326-333 [doi]
- CTI-GEN: A Framework for Generating STIX 2.1 Compliant CTI Using Generative AIAngelos Papoutsis, Athanasios Dimitriadis, Dimitrios Kavallieros, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris, Georgios Meditskos. 334-341 [doi]
- Practical confidential data cleaning using trusted execution environmentsAnirban Basu, Masayuki Yoshino, Minako Toba. 342-349 [doi]
- Scalable and Adaptive Security Framework for the IoT-Edge-Cloud ContinuumSalvador Cuñnat Neguerole, Ioannis Makropodis, Lucía Cabanillas Rodríguez, Christos Xenakis, Ioannis Chouchoulis, Carlos Enrique Palau, Ignacio Lacalle. 350-357 [doi]
- PASTA Threat Modeling for Cyber Resilience and COLREG Compliance in Autonomous Ship SystemsMuhammed Erbas, Gábor Visky, Olaf Maennel, Leonidas Tsiopoulos, Risto Vaarandi. 358-365 [doi]
- ResViT: A Hybrid Model for Robust Deepfake Video DetectionAnahita Aria, Seyedeh Leili Mirtaheri, Seyyed Amir Asghari, Reza Shahbazian, Andrea Pugliese 0001. 366-371 [doi]
- eIDPS: A Comprehensive Comparative Analysis of Packet-Level and Flow-Level Intrusion Detection and PreventionStamatios Kostopoulos, Dimitra Papatsaroucha, Ioannis Kefaloukos, Evangelos K. Markakis. 372-378 [doi]
- An AI-powered pipeline for enabling Self-Healing in Software SystemsGeorgios Siachamis, Georgios Papadopoulos, Andreas L. Symeonidis. 379-386 [doi]
- Designing AI Systems with Correction Mechanisms Towards Attack-Resilient ArchitecturesEfi Kafali, Christoforos N. Spartalis, Theodoros Semertzidis, Charalampos Z. Patrikakis, Petros Daras. 387-392 [doi]
- Accounting for the Impact of Real-World Data and Costs in Autonomous Cyber DefenceAdam Neal, Alberto Acuto 0001, Peter L. Green, Chris Lear, Nick Hare, Simon Maskell. 393-400 [doi]
- A Lightweight Firmware Resilience Engine for Real-Time Operating SystemsUtku Budak, Fabrizio De Santis, Osman Yasar, Malek Safieh, Georg Sigl. 401-406 [doi]
- Adapt-LFA: Adaptive Gradient-Guided Label Flipping Attack Against Federated Learning-based Intrusion Detection in IoTHadiseh Rezaei, Rahim Taheri, Ivan Jordanov, Stavros Shiaeles. 407-412 [doi]
- A Structured Process for Scenario-Based Gamification of Cyber Threat Intelligence for Space System SecurityMona Kriesten, Mamello Thinyane, David Ormrod. 413-418 [doi]
- ReLATE: Resilient Learner Selection for Multivariate Time-Series Classification Against Adversarial AttacksCagla Ipek Kocal, Onat Güngör, Aaron Tartz, Tajana Rosing, Baris Aksanli. 419-424 [doi]
- Mapping of Maritime Ecosystem Components in the Cybersecurity LandscapeEvita Roponena, Sandra Lielbarde, Elizabete Citskovska, Agne Brilingaite, Linas Bukauskas, Ruta Pirta. 425-432 [doi]
- A Novel MQTT-ZT Secure Broker: Zero Trust Architecture for IoT SecurityMeha James, Thomas Newe, Donna O'Shea, George D. O'Mahony. 433-439 [doi]
- Cybersecurity Mesh Architecture for Electric Vehicle Charging InfrastructureRohit Bohara, Mirko Ross, Omkar Joglekar. 440-446 [doi]
- Optimizing Network Services with Quantum Dynamic Programming and Grover's SearchEngin Zeydan, Josep Mangues-Bafalluy, Yekta Turk, Abdullah Aydeger, Madhusanka Liyanage. 447-452 [doi]
- Informed Defense: How Attacker Profiles Transform Vulnerability AssessmentsMuhammad Zeshan Naseer, Viktoria Fodor, Mathias Ekstedt. 453-460 [doi]
- Sunburst Vapor - A Cybersecurity Prompted Case Study of National-Scale Organizational TransformationErik L. Moore, Steven Fulton, Tristen K. Amador, Roberta A. Mancuso, Isaac Martinez, Daniel M. Likarish. 461-468 [doi]
- Machine Learning Model Complexity as a Mitigation Strategy Against Industrial Espionage through Membership Inference AttacksRustem Dautov, Hui Song, Christian Schaefer, Seonghyun Kim, Verena Pietsch. 469-475 [doi]
- Composite Product Cybersecurity Certification Using Explainable AI Based Dynamic Risk AssessmentNihala Basheer, Shareeful Islam, Spyridon Papastergiou, Eleni-Maria Kalogeraki. 476-481 [doi]
- An Approach for a Supporting Multi-LLM System for Automated Certification Based on the German IT-GrundschutzLea R. Muth, Marian Margraf. 482-489 [doi]
- A Preliminary Ontology for 5G Network Resilience: Hybrid Threats, Risk Reduction, ComplianceR. Andrew Paskauskas. 490-497 [doi]
- Using Legends Into AI-Based Business Decision Making: Embedding Ethics, Cybersecurity and ResilienceGohar Sargsyan, Ernesto Damiani. 498-503 [doi]
- Cyber Resilience Strategies Throughout the System Development LifecycleGrant Deffenbaugh, Srinidhi Kameneni. 504-509 [doi]
- A Proposal for an Ontology to Enhance IT Architecture ResilienceBabacar Mbaye, Mohamed Mejri, Pierre Fobougong Saha. 510-517 [doi]
- FAIR: Facilitating Artificial Intelligence Resilience in Manufacturing Industrial InternetYingyan Zeng, Ismini Lourentzou, Xinwei Deng, Ran Jin. 518-523 [doi]
- Development of an SDN-based Space System Simulation Framework for Intrusion DetectionUakomba Uhongora, Mamello Thinyane, Yee Wei Law. 524-529 [doi]
- Anomaly Identification in Power Systems Using Dynamic State Estimation and Deep LearningFahad Alsaeed, Emad Abukhousa, Syed Sohail Feroz Syed Afroz, Abdulaziz Qwbaiban, A. P. Sakis Meliopoulos. 530-536 [doi]
- Driving Resilience: Assessing Security Incidents' Criticality in Autonomous VehiclesYaman Qendah, Stefan Katzenbeisser 0001. 537-543 [doi]
- A Lightweight IDS Framework Using FPGA-Based Hardware Fingerprinting on Zynq SoCAbdul Waheed Mohammed, Abbas Ali, Hasan Arif, Fazal Rahaman Pasha Mohammed, Hafiz Malik. 544-549 [doi]
- DFA: Dynamic Frame Alteration For Video Manipulation Attack in IoT EnvironmentsBuduka Cherish Nchelem, Amit Kumar Singh, Haralambos Mouratidis. 550-555 [doi]
- Fault Tolerance vs. Attack Detection in Industrial Control Systems: A Deep Learning ApproachHoda Mehrpouyan. 556-561 [doi]
- Security Risk Analysis of Logistical Support Solutions for MaaS and DLT-based MitigationsGizay Kisa Isik, Akin Eker, Theo Tryfonas, George Oikonomou. 562-569 [doi]
- CAN-MAID: An Intrusion Detection Protocol for CAN BusL. W. Kevin Marquis, John A. Chandy. 570-577 [doi]
- Application and Evaluation of a Substation Threat Modeling Language for Automatic Attack Graph GenerationEngla Rencelj Ling, Mathias Ekstedt. 578-585 [doi]
- TPKEY: Using TPMS Signals for Secure and Usable Intra-Vehicle Device AuthenticationOmar Achkar, Larry Nissen, Shahryar Raza, Rushikesh Shirsat, Neil Klingensmith, George Zouridakis, Kyuin Lee. 586-591 [doi]
- Not-so-Secret Authentication: The SyncBleed Attacks and Defenses for Zero-Involvement Authentication SystemsIsaac Ahlgren, Rushikesh Shirsat, Omar Achkar, George K. Thiruvathukal, Kyuin Lee, Neil Klingensmith. 592-599 [doi]
- Ontology-driven Threat Modeling Analysis of CPSsMarzieh Kordi, Nicolò Maunero. 600-605 [doi]
- Vulnerability Assessment Combining CVSS Temporal Metrics and Bayesian NetworksStefano Perone, Simone Guarino, Luca Faramondi, Roberto Setola. 606-611 [doi]
- Securing DRL-Based Traffic Signal Control Against Experience Replay Manipulation AttacksMyria Bouhaddi. 612-618 [doi]
- ThreatSpider: CTI-Driven Semi-Automated Threat Modelling for Cybersecurity CertificationAhmed Amro, Georgios Kavallieratos. 619-625 [doi]
- Cybersecurity-oriented Digital Twins: A Double-Edged Sword or a Game Changer?Sani M. Abdullahi, Sanja Lazarova-Molnar. 626-631 [doi]
- Towards Safety and Security Testing of Cyberphysical Power Systems by Shape ValidationAlexander Geiger, Immanuel Hacker, Ömer Sen, Andreas Ulbig. 632-637 [doi]
- Evaluating Smart Home Privacy: The Relationship Between Encrypted Sensor Data and Occupancy Prediction Through Machine LearningSneha Mohanty, Demetrios N. Papadopoulos, Christian Schindelhauer. 638-645 [doi]
- Strategic Interactions in Multi-Sensor Networks Against False Data InjectionValeria Bonagura, Chiara Foglietta, Stefano Panzieri, Federica Pascucci, Leonardo Badia. 646-651 [doi]
- Lessons Learned from a Cybersecurity Risk Assessment of OpenADR in Smart Grid PlanningGencer Erdogan, Aida Omerovic, Eivind Solvang, Andreas Killingberg, Are Kvinnesland, Inge Abrahamsen Avinor. 652-659 [doi]
- Post-Quantum Cryptography for Maritime SystemsDaniel Berger, Aaron Lye, Anton Maidl, Jannis Stoppe, Aljoscha Windhorst. 660-665 [doi]
- Indepth Analysis of a Side-Channel Message Recovery Attack Against FrodoKEMPierre-Augustin Berthet. 666-671 [doi]
- Knowledge Systematization for Security Orchestration in CPS and IoT SystemsPhu Hong Nguyen, Hui Song, Rustem Dautov, Nicolas Ferry 0001, Angel Rego, Erkuden Rios, Eider Iturbe, Valeria Valdés, Ana Rosa Cavalli, Wissam Mallouli. 672-678 [doi]
- Wicked Problem, Parsimonious Solution: Securing Electric Vehicle Charging Station SoftwareEmma Sheppard, Zachary Wadhams, Dalton Arford, Clemente Izurieta, Ann Marie Reinhold. 679-686 [doi]
- NetPacketformer: Real-Time, Context-Aware Network Intrusion Detection with TransformersArmando Domi, Christos Zonios, Giorgos Tatsis, Anastasios Drosou, Dimitrios Tzovaras. 687-692 [doi]
- Data Manipulation Attack Mitigation in Power Systems Using Physics-Informed Neural NetworksSolon Falas, Markos Asprou, Charalambos Konstantinou, Maria K. Michael. 693-698 [doi]
- The Invisible Threat: Simulating and Analyzing the Coordinated Sensor Manipulation Attack (CSMA) on UAVsshadi sadeghpour, Pooria Madani. 699-706 [doi]
- A Real-Time Data Capture Probe for Anomaly Detection in Industrial Cyber-Physical SystemsRocco Francisco Salazar Buttiglione, Alessandro Gallo, Stefano Perone, Ernesto Del Prete, Roberto Setola. 707-712 [doi]
- Implementation and Experimental Evaluation of Defense Techniques against Adversarial AttacksGiovanni Maria Cristiano, Salvatore D'Antonio, Jonah Giglio, Giovanni Mazzeo. 713-719 [doi]
- Security Challenges and Solutions in Containerized Environments: A Comprehensive ReviewRoberto Bagnato, Luca Notarianni, Anna Sabatini, Luca Vollero. 720-724 [doi]
- Towards a Privacy-Preserving Health Data Sharing: Architecture and Critical Implementation FactorsAlfredo Petruolo, Antonio Iannaccone, Salvatore D'Antonio. 725-730 [doi]
- A Game-Theoretic Multi-Patroller Approach for Critical Infrastructure MonitoringGennaro Pio Rimoli, Vittorio U. Castrillo, Domenico Pascarella, Massimo Ficco. 731-736 [doi]
- Addressing the Economics of Critical National Infrastructure (CNI) SecuritySiraj Ahmed Shaikh. 737-744 [doi]
- Cybersecurity for Sustainability: A Path for Strategic ResilienceJulija Saveljeva, Inga Uvarova, Liga Peiseniece, Tatjana Volkova, Jekaterina Novicka, Gatis Polis, Silvija Kristapsone, Aivars Vembris. 745-752 [doi]
- LLM-Powered Intent-Based Categorization of Phishing EmailsEven Eilertsen, Vasileios Mavroeidis, Gudmund Grov. 753-758 [doi]
- CYBERUNITY: A Federated Architecture for Next-Generation Cybersecurity TrainingChhagan Lal, Athanasios Vasileios Grammatopoulos, Michail Takaronis, Muhammad Mudassar Yamin, Georgios Spathoulas, Christos Xenakis. 759-764 [doi]
- ERMIS: A Cybersecurity Market for Assurance and Insurance-as-a-ServiceAntonios Paragioudakis, Michail Smyrlis, Georgios Spanoudakis. 765-770 [doi]
- Modelling Attack and Defense Scenarios on Federated Cyber RangesMuhammad Mudassar Yamin, Basel Katt. 771-776 [doi]
- From Concept to Deployment: An AI Assistant for Generating and Configuring Cyber Range ScenariosGeorgios Rizos, Nikos Kopalidis, Notis Mengidis, Antonios Lalas, Konstantinos Votis. 777-782 [doi]
- The Challenges of Cyber-Insurance: The Case of GreeceEmmanouil Vergis, Elli Alimperti, Stergios Asteriou. 783-788 [doi]
- Cyber Insurance in Emerging European Markets: A Case Study of Greece and CyprusDimitra Smyrli, Vasilis Kakariaris, Michail Smyrlis. 789-794 [doi]
- Integration of Forensic Analysis and Event Data Recorders in Automotive Regulation: A Proposed ApproachFaraz Bashir Soomro, Roberto Caviglia, Giovanni Battista Gaggero, Mageni Djihadi, Mario Marchese. 795-800 [doi]
- Detection of C-V2X Spoofing Attacks using Physical Layer Features and Graph Neural NetworksDanilo Greco, Muhammad Saad Sohail, Mario Marchese. 801-806 [doi]
- Cybersecurity for Connected Vehicle Networks: Leveraging Sampled Network Traffic Beyond the CAN ProtocolAviv Yehezkel, Eyal Elyashiv. 807-811 [doi]
- VPTaaS: An AI-Driven Cybersecurity Framework for Connected Vehicles - Concept, Validation, and Feasibility StudySze Wei Tan, Md. Arafatur Rahman, Nadia Refat, Prashant Pillai. 812-817 [doi]
- CyberVehiCare: A Testbed for Cybersecurity of Vehicle to Everything (V2X) Automotive SystemsMd. Arafatur Rahman, Sze Wei Tan, Muhammad Saad Sohail, Giovanni Battista Gaggero, Fabio Patrone, Mario Marchese, Prashant Pillai. 818-823 [doi]
- A PUF-based Root-of-Trust for resource-constrained IoT devicesEvgenia-Niovi Sassalou, Stefanos Vasileiadis, Stylianos A. Kazazis, Georgia Protogerou, Nikos Varvitsiotis, Dimitrios S. Karas, Thanassis Giannetsos, Symeon Tsintzos. 824-831 [doi]
- CYRUS - A personalised, customised, work-based training framework for enhanced CYbeR-security skills across indUstrial SectorsEnrico Frumento, Katharina Lange, Alessia Golfetti. 832-837 [doi]
- CoEvolution: A Comprehensive Trustworthy Framework For Connected Machine Learning And Secure Interconnected AI SolutionsAntonios Makris, Apostolos P. Fournaris, Anita Aghaie, Ioannis Arakas, Anna Maria Anaxagorou, Ioannis Arapakis, Davide Bacciu, Battista Biggio, Georgios Bouloukakis, Stavros Bouras, Arne Bröring, Antonio Carta, Marco Caselli, Olympia Giannakopoulou, Nikolaos Gkatzios, Alexandros Gkillas, Evangelos Haleplidis, Sotiris Ioannidis, Eleni-Maria Kalogeraki, Panagiotis Karantzias, Emmanouil Kritharakis, Aris S. Lalos, David Lenk, Stella Markopoulou, Entrit Metai, Andreas Miaoudakis, Haralambos Mouratidis, Jihane Najar, Theodor Panagiotakopoulos, Bernhard Peischl, Maura Pintor, Nikos Piperigkos, Vassilis Prevelakis, Carlos Segura, Georgios Spanoudakis, Orestis Tsirakis, Omar Veledar, Konstantinos Tserpes. 838-845 [doi]
- C-Shield: A Holistic Solution for Secure End-to-End Kubernetes Multi-Cluster Management and Online Threat Mitigation using LLMsSarantis Kalafatidis, George Kitsos, Nikos Papageorgopoulos. 846-853 [doi]
- Hypervisor-based Double Extortion Ransomware Detection Method Using Kitsune Network FeaturesManabu Hirano, Ryotaro Kobayashi. 854-860 [doi]
- On Learning with Confidentiality through Encrypted AI PipelinesTheodora Anastasiou, Stavroula Iatropoulou, Sophia Karagiorgou. 861-866 [doi]
- Trust or Bust: Reinforcing Trust-Aware Path Establishment with Implicit Attestation CapabilitiesNikolaos Fotos, Stefanos Vasileiadis, Thanassis Giannetsos. 867-874 [doi]
- Feature-Enhanced Deep Learning Models for Cyber-Physical System SecurityJaveyon Vaughn, Yaa Takyiwaa Acquaah, Kaushik Roy 0003. 875-880 [doi]
- MOMENT: A Multi-Objective Mitigation Engine using NSGA-II Techniques for Cyber Threat ResponseKonstantina Milousi, Nikolaos Vakakis, Aristeidis Mystakidis, Mariana S. Mazi, Antonis Voulgaridis, Christos Tjortjis, Konstantinos Votis, Dimitrios Tzovaras. 881-886 [doi]
- Deciphering Standards for cybersecurity in Industry 4.0: Advisory AI for Cybersecure IIoTAsterios Mpatziakas, Ioannis Schoinas, Antonios Lalas, Anastasios Drosou, Nestor D. Chatzidiamantis, Dimitrios Tzovaras. 887-892 [doi]
- Quantifying Cascading Impacts of Natural Hazards on Power-Communication Interdependent NetworksBalaji Venkateswaran Venkatasubramanian, Christos Laoudias, Mathaios Panteli. 893-898 [doi]
- Towards a new taxonomy of infrastructures: implications for resilienceJosé Palma-Oliveira, Dalila Antunes, Beatriz Rosa, David Garcia Sanchez, Ana Sarroeira, Alessandro Cardoni. 899-904 [doi]
- Beyond Technical Skills: Human, Emotional, and Resilience Demands in CSIRT OperationsDalila Antunes, Alexandre Salgado, Vasco Figueiredo, Nádia Oliveira, José Ferreira, Gonçalo Santos-Jorge, José Palma-Oliveira. 905-910 [doi]
- Smart Cities Under Threat: A Systematic Review and Conceptual Risk ModelEvita Roponena, Ralfs Matisons, Elizabete Citskovska, Patriks Gustavs Rinkevics, Ruta Pirta, Girts Priedols. 911-916 [doi]
- Advancing B5G Security: An AI-Augmented Intrusion Detection System using a Real-Time Attack GeneratorGeorge Lazaridis, Amalia Damianou, Antonios Lalas, Periklis Chatzimisios, Konstantinos Votis, Dimitrios Tzovaras. 917-922 [doi]
- Evaluating 5G-enabled EV Charging Infrastructure's Resilience Through Stealthy Cyber-AttacksDimitrios Psaltis, Konstantinos Ntouros, Alexios Lekidis, Sotirios Brotsis, Nicholas Kolokotronis. 923-928 [doi]
- Detection of Masquerade Attacks on Protection of Digital Substations Using Real-Time MeasurementsMohamed Faisal Elrawy, Lenos Hadjidemetriou, Christos Laoudias, Maria K. Michael. 929-935 [doi]
- Neural Cryptanalysis of Lightweight Block Ciphers Using Residual MLPsCharis Eleftheriadis, Georgios Andronikidis, Anastasios Lytos, Eleftherios Fountoukidis, Paris-Alexandros Karypidis, Thomas Lagkas, Vasileios Argyriou, Ioannis Nanos, Panagiotis G. Sarigiannidis. 936-943 [doi]
- Fortified Control-Plane Encapsulation with Session-Key Derivation for Secure IP Mesh RoutingGeorge Amponis, Panagiotis I. Radoglou-Grammatikis, Thomas Lagkas, Vasileios Argyriou, Antonios Sarigiannidis, Natasa Kazakli, Thomas Boufikos, Panagiotis G. Sarigiannidis. 944-949 [doi]
- Surrogate-Guided Adversarial Attacks: Enabling White-Box Methods in Black-Box ScenariosDimitrios Christos Asimopoulos, Panagiotis I. Radoglou-Grammatikis, Panagiotis E. Fouliras, Konstandinos Panitsidis, Georgios Efstathopoulos, Thomas Lagkas, Vasileios Argyriou, Igor Kotsiuba, Panagiotis G. Sarigiannidis. 950-956 [doi]
- LLM-based Generation of Formal Specification for Run-time Security Monitoring of ICSGeorge E. Raptis, Muhammad Taimoor Khan 0001, Christos Koulamas, Dimitrios Serpanos. 957-962 [doi]
- Efficient Classification of Partially Faked Audio Using Deep LearningAbdulazeez AlAli, George Theodorakopoulos 0001, Abdullah Emad. 963-968 [doi]
- Data Generation and Cybersecurity: A Major Opportunity or the Next Nightmare?Fiammetta Marulli, Lelio Campanile, Gennaro Ragucci, Sabatino Carbone, Marianna Bifulco. 969-974 [doi]
- Explainable Malware Detection by means of Federated Machine LearningGiovanni Ciaramella, Fabio Martinelli, Antonella Santone, Francesco Mercaldo. 975-982 [doi]
- An Explainable Method for Access Control Policies ClassificationLuca Petrillo, Fabio Martinelli, Antonella Santone, Francesco Mercaldo. 983-989 [doi]
- Atomic Patterns: Field Operation Distinguishability on Cryptographic ASICsAlkistis Aikaterini Sigourou, Zoya Dyka, Peter Langendoerfer, Ievgen Kabin. 990-995 [doi]
- Acceleration of McEliece Cryptosystem with Instruction Set Extension for RISC-VSamuel Kennedy, Basel Halak. 996-1001 [doi]
- Miti-CAT: Mitigating Power Side-Channel Vulnerabilities in FPGA-Based CNN Accelerators Through Distributed Convolution ComputationJing He, Mark Zwolinski. 1002-1007 [doi]
- SpectreShield: Design and Analysis of Spectre Countermeasures on RISC-V Using gem5Mahreen Khan, Maria Mushtaq, Renaud Pacalet, Ludovic Apvrille. 1008-1015 [doi]
- A Hardware-Efficient AEAD Stream Cipher Based on a Hybrid Nonlinear Feedback Register StructureArman Allahverdi, Vincent John Mooney. 1016-1023 [doi]
- Protection of the Digital Circuitry of a Single-Slope ADC Against Side-Channel AttacksKareem Ahmad, Ece Öztürk, Ceyda Körpe, Hyunsoo Yang, Junbin Yang, Kanishk Tihaiya, Ryanh Tran, Günhan Dündar, Vincent John Mooney, Kemal Ozanoglu. 1024-1030 [doi]
- Attacking the DLMS/COSEM Advanced Metering InfrastructureIoannis Papadopoulos, Dimitris Merkouris, Christos Dalamagkas, Nikolaos Nikoloudakis, Athanasios Arvanitis. 1031-1036 [doi]
- ATHENA: A Federated Architecture for Cross-Border Cybersecurity Operations and Situational AwarenessAdamantini Peratikou, Evagoras Charalambous, Panayiota Smyrli, Stavros Stavrou. 1037-1042 [doi]
- A Hybrid Transformer-LLM Pipeline for Function Name Recovery in Stripped BinariesRemus M. Petrache, Camelia Lemnaru. 1043-1048 [doi]
- Privacy-Preserving Classification of Partially Encrypted Feature Vectors using Multi-Key Homomorphic EncryptionDiana-Elena Petrean, Rodica Potolea. 1049-1056 [doi]
- DISTIL: Digital Identities for the Evaluation of Job SkillsDimitrios Kasimatis, Pavlos Papadopoulos, William J. Buchanan, Christos Chrysoulas, Sarwar Sayeed, Alexios Mylonas, Nikolaos Pitropakis. 1057-1062 [doi]
- SecAwarenessTruss: A Federated Cyber Range Solution for Critical InfrastructuresMichail Smyrlis, Evangelos Floros, Nikolaos Nikoloudakis, Eliana Stavrou, Dimitris Merkouris, Athanasios Arvanitis, Georgios Spanoudakis, Stelios E. Papadakis, Georgios Potamos, Stavros Stavrou. 1063-1068 [doi]
- Fraud Detection in Web Content Using Machine Learning and Natural Language ProcessingAndreea Dance, Andreas Fraticiu, Ciprian Oprisa. 1069-1074 [doi]
- DLT-EVA: Hardening O-RAN Auditing and Digital Evidence Preservation Through BlockchainKonstantinos Ntouros, Eleftherios Poulitsis, Sotirios Brotsis, Konstantinos-Panagiotis Grammatikakis, Nicholas Kolokotronis. 1075-1081 [doi]
- Zero-Trust and Reinforcement Learning for Secure Federated Intelligence in 6G Edge NetworksGueltoum Bendiab, Meriem Guerar, Houda Haiouni, Luca Verderame. 1082-1087 [doi]
- AI-Enhanced Hybrid CFAR for 6G Integrated Sensing and Communication (ISAC)Khadidja Belhi, Souad Chabbi, Meriem Guerar. 1088-1093 [doi]
- Evaluating Forensic Log Readiness in Simulated 6G NetworksSyed Rizvi 0002, Bander Ali Saleh Al-rimy, Nasreen Anjum, Aikaterini Kanta. 1094-1099 [doi]
- Federated Learning for Securing Medical Imaging Against Deepfakes in 6G Smart HospitalsEmma Perales, Romain Verdy-Ricard, Mohamed Aymen Labiod, Gueltoum Bendiab, Yasmina Chenoune. 1100-1105 [doi]
- Vulnerability Analysis of Web 3.0 based Decentralised Oracle NetworksDaniel Zhukovsky, Muhammad Taimoor Khan. 1106-1112 [doi]
- CyberHeraclius: Cyber Defence Evaluation MethodologyGeorge Hatzivasilis, Sotiris Ioannidis. 1113-1118 [doi]
- Simulation-Based Analysis of OPC UA Set-Up Vulnerability and Its Security Risks in Cyber-Physical Manufacturing SystemsSani M. Abdullahi, Manuel Götz, Sanja Lazarova-Molnar. 1119-1126 [doi]
- Securing firmware updates using Transparency and Traceability servicesNikos Fotiou, Lefteris Georgiadis, George C. Polyzos, Vasilios A. Siris. 1127-1132 [doi]