Abstract is missing.
- Jibber-Jabber!: Encoding the (Un-)Natural Language of Network Devices and ApplicationsMaxwel Bar-on, Kiley Krosky, Federico Larrieu, Bruhadeshwar Bezawada, Indrakshi Ray, Indrajit Ray. 3-22 [doi]
- Automated Privacy Policy Analysis Using Large Language ModelsMian Yang, Vijayalakshmi Atluri, Shamik Sural, Ashish Kundu. 23-43 [doi]
- Data Chameleon: A Self-adaptive Synthetic Data Management SystemQianying Liao, Maarten Kesters, Dimitri Van Landuyt, Wouter Joosen. 44-56 [doi]
- Operating Under Constraints: Identifying Requirements for Enhanced Cyber Resilience ManagementFrancis Wanko Naa, Nora Boulahia-Cuppens, Frédéric Cuppens. 57-72 [doi]
- Towards the Identification of Vulnerability-Fixing Code Lines in OSS Security Patches Using Lexical Code Segmentation and LLMsReika Nishimura Arakawa, Yo Kanemoto, Mitsuaki Akiyama. 73-95 [doi]
- Encrypt What Matters: Selective Model Encryption for More Efficient Secure Federated LearningFederico Mazzone, Ahmad Al Badawi, Yuriy Polyakov, Maarten H. Everts, Florian Hahn 0001, Andreas Peter 0001. 96-115 [doi]
- Hallucination Detection in Large Language Models Using Diversion DecodingBasel Abdeen, S. M. Tahmid Siddiqui, Meah Tahmeed Ahmed, Anoop Singhal, Latifur Khan, Punya Parag Modi, Ehab Al-Shaer. 116-133 [doi]
- Blockchain-Enhanced User Consent for GDPR-Compliant Real-Time BiddingCristòfol Daudén-Esmel, Jordi Castellà-Roca, Alexandre Viejo, Vicenç Torra. 137-155 [doi]
- Enabling Right to be Forgotten in a Collaborative Environment Using Permissioned BlockchainsAnand Manojkumar Parikh, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya. 156-175 [doi]
- P-EDR: Privacy-Preserving Event-Driven Data Release Using Smart ContractsJingzhe Wang, Balaji Palanisamy. 176-195 [doi]
- Performance-Efficient Anti-fingerprinting for PrivacyLars Tomer Yavor, Anne V. D. M. Kayem. 196-210 [doi]
- Trusted Platform and Privacy Management in Cyber Physical Systems: The DUCA FrameworkAntonio Muñoz 0001, Javier López 0001, Cristina Alcaraz, Fabio Martinelli. 211-230 [doi]
- Bloom Filter Look-Up Tables for Private and Secure Distributed Databases in Web3Shlomi Dolev, Ehud Gudes, Daniel Shlomo. 233-250 [doi]
- Purpose Filter: A Space-efficient Purpose Metadata StoragePaulo R. P. Amora, Francisco D. B. S. Praciano, Javam C. Machado. 251-270 [doi]
- Secure and Reliable Digital Wallets: A Threat Model for Secure Storage in eIDAS 2.0Zahra Ebadi Ansaroudi, Amir Sharif, Giada Sciarretta, Francesco Antonio Marino, Silvio Ranise. 271-289 [doi]
- Facility Location Problem Under Local Differential Privacy Without Super-Set AssumptionKevin Pfisterer, Quentin Hillebrand, Vorapong Suppakitpaisarn. 293-310 [doi]
- Can Differentially Private Fine-Tuning LLMs Protect Against Privacy Attacks?Hao Du, Shang Liu, Yang Cao. 311-329 [doi]
- Metadata Assisted Supply-Chain Attack Detection for AnsiblePandu Ranga Reddy Konala, Vimal Kumar 0001, David Bainbridge 0001, Junaid Haseeb. 333-350 [doi]
- Diffusion-Based Adversarial Purification for Intrusion DetectionMohamed Amine Merzouk, Erwan Beurier, Reda Yaich, Nora Boulahia-Cuppens, Frédéric Cuppens, Foutse Khomh. 351-370 [doi]
- Feature Identification and Study of Attackers' Behaviours Using HoneypotsJunaid Haseeb, Masood Mansoori, Ian Welch. 371-389 [doi]
- Supporting Delegation in Outsourced ICA ProcessSabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Sara Petrilli, Pierangela Samarati. 393-412 [doi]
- Transaction Logs in Access Control: Leveraging an Under-Utilized Data SourceSascha Kern, Thomas Baumer, Raphael Neudert, Günther Pernul. 413-424 [doi]
- The Privacy Impact of Dash Mixing Fee PaymentsMichael H. Ziegler, Mariusz Nowostawski, Basel Katt. 427-438 [doi]
- Cryptanalysis and Modification of a Variant of Matrix Operation for Randomization or Encryption (v-MORE)Sona Alex, Bian Yang. 439-455 [doi]