Abstract is missing.
- A Graph-Based Framework for ABAC Policy Enforcement and AnalysisMian Yang, Vijayalakshmi Atluri, Shamik Sural, Jaideep Vaidya. 3-23 [doi]
- Human Digital Twins: Efficient Privacy-Preserving Access Control Through Views Pre-materialisationGiorgia Sirigu, Barbara Carminati, Elena Ferrari. 24-43 [doi]
- IAM Meets CTI: Make Identity and Access Management Ready for Cyber Threat IntelligenceAlexander Puchta, Thomas Baumer, Mathis Müller, Günther Pernul. 44-52 [doi]
- SmartSSD-Accelerated Cryptographic Shuffling for Enhancing Database SecurityTieming Geng, Chin-Tser Huang. 55-70 [doi]
- Ensuring End-to-End IoT Data Security and Privacy Through Cloud-Enhanced Confidential ComputingMd Shihabul Islam, Mahmoud Zamani, Kevin W. Hamlen, Latifur Khan, Murat Kantarcioglu. 71-91 [doi]
- Towards Atomicity and Composability in Cross-Chain NFTsYong Zhi Lim, Wen Qing Ong Perry, Jianying Zhou. 92-100 [doi]
- A Privacy-Preserving Graph Encryption Scheme Based on Oblivious RAMSeyni Kane, Anis Bkakria. 101-108 [doi]
- DT-Anon: Decision Tree Target-Driven AnonymizationSabrina De Capitani di Vimercati, Sara Foresti, Valerio Ghirimoldi, Pierangela Samarati. 111-130 [doi]
- Visor: Privacy-Preserving Reputation for Decentralized MarketplacesTassos Dimitriou. 131-150 [doi]
- Resiliency Analysis of Mission-Critical System of Systems Using Formal MethodsMahmoud Abdelgawad, Indrakshi Ray. 153-170 [doi]
- Enhancing EV Charging Station Security Using a Multi-dimensional Dataset: CICEVSE2024Emmanuel Dana Buedi, Ali A. Ghorbani 0001, Sajjad Dadkhah, Raphael Ferreira. 171-190 [doi]
- Optimal Automated Generation of PlaybooksKéren Saint-Hilaire, Christopher Neal, Frédéric Cuppens, Nora Boulahia-Cuppens, Makhlouf Hadji. 191-199 [doi]
- ALERT: A Framework for Efficient Extraction of Attack Techniques from Cyber Threat Intelligence Reports Using Active LearningFariha Ishrat Rahman, Sadaf Md. Halim, Anoop Singhal, Latifur Khan. 203-220 [doi]
- VulPrompt: Prompt-Based Vulnerability Detection Using Few-Shot Graph LearningSaquib Irtiza, Xiaodi Li, Mahmoud Zamani, Latifur Khan, Kevin W. Hamlen. 221-240 [doi]
- All Your LLMs Belong to Us: Experiments with a New Extortion Phishing DatasetFatima Zahra Qachfar, Rakesh M. Verma. 241-258 [doi]
- Adaptive Image Adversarial Example Detection Based on Class Activation MappingXiujuan Wang, Qipeng Li, Shuaibing Lu. 259-266 [doi]
- From Play to Profession: A Serious Game to Raise Awareness on Digital ForensicsSabrina Friedl, Tobias Reittinger, Günther Pernul. 269-289 [doi]
- User Perceptions of CAPTCHAs: University vs. Internet UsersArun Reddy, Yuan Cheng 0002. 290-297 [doi]
- Incentivized Federated Learning with Local Differential Privacy Using Permissioned BlockchainsSaptarshi De Chaudhury, Likhith Reddy, Matta Varun, Tirthankar Sengupta, Sandip Chakraborty, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri. 301-319 [doi]
- Does Differential Privacy Prevent Backdoor Attacks in Practice?Fereshteh Razmi, Jian Lou 0001, Li Xiong 0001. 320-340 [doi]