Abstract is missing.
- Capturing Malware Behaviour with Ontology-based Knowledge GraphsIpshita Roy Chowdhury, Deepayan Bhowmik. 1-7 [doi]
- Symbolon: Enabling Flexible Multi-device-based User AuthenticationThalia Laing, Eduard Marin, Mark D. Ryan, Joshua Schiffman, Gaëtan Wattiau. 1-12 [doi]
- Optimising user security recommendations for AI-powered smart-homesEmma Scott, Sakshyam Panda, George Loukas, Emmanouil Panaousis. 1-8 [doi]
- A Novel Chaos-based Light-weight Image Encryption Scheme for Multi-modal Hearing AidsAwais Aziz Shah, Ahsan Adeel, Jawad Ahmad 0001, Ahmed Yassin Al-Dubai, Mandar Gogate, Abhijeet Bishnu, Muhammad Diyan 0002, Tassadaq Hussain, Kia Dashtipour, Tharm Ratnarajah, Amir Hussain 0001. 1-6 [doi]
- Using Poisson Distribution to Enhance CNN-based NB-IoT LDoS Attack DetectionJiang-Yi Zeng, Li-En Chang, Hsin-Hung Cho, Chi-Yuan Chen, Han-Chieh Chao, Kuo-Hui Yeh. 1-7 [doi]
- A Node-Embedding Features Based Machine Learning Technique for Dynamic Malware DetectionSudhir Kumar Rai, Ashish Mittal, Sparsh Mittal. 1-8 [doi]
- A Co-evolutionary Algorithm-Based Malware Adversarial Sample Generation MethodFangwei Wang, Yuanyuan Lu, Qingru Li, Changguang Wang, Yonglei Bai. 1-8 [doi]
- Protecting White-Box Block Ciphers with Galois/Counter ModeNanjiang Xie, Zheng Gong, Yufeng Tang, Lei Wang, Yamin Wen. 1-7 [doi]
- Device-to-Device Task Offloading in a Stochastic Invalid-Device Scenario with Social AwarenessMingChu Li, Linlin Yang, Kun Lu 0003, Syed Bilal Hussain Shah, Xiao Zheng. 1-7 [doi]
- A Hybrid Graph Neural Network Approach for Detecting PHP VulnerabilitiesRishi Rabheru, Hazim Hanif, Sergio Maffeis. 1-9 [doi]
- Discovering Exfiltration Paths Using Reinforcement Learning with Attack GraphsTyler Cody, Abdul-Rahman, Christopher Redino, Lanxiao Huang, Ryan Clark, Akshay Kakkar, Deepak Kushwaha, Paul Park, Peter A. Beling, Edward Bowen. 1-8 [doi]
- A Generative Neural Network for Enhancing Android Metamorphic Malware Detection based on Behaviour ProfilingLeigh Turnbull, Zhiyuan Tan 0001, Kehinde O. Babaagba. 1-9 [doi]
- Malicious and Benign URL Dataset Generation Using Character-Level LSTM ModelsSpencer Vecile, Kyle Lacroix, Katarina Grolinger, Jagath Samarabandu. 1-8 [doi]
- Reliability Models and Analysis for Triple-model with Triple-input Machine Learning SystemsQiang Wen, Fumio Machida. 1-8 [doi]
- A Scary Peek into The Future: Advanced Persistent Threats in Emerging Computing EnvironmentsTalal Halabi, Aawista Chaudhry, Sarra Alqahtani, Mohammad Zulkernine. 1-8 [doi]
- Design and Analysis of Novel Bit-flip Attacks and Defense Strategies for DNNsYash Khare, Kumud Lakara, Maruthi S. Inukonda, Sparsh Mittal, Mahesh Chandra, Arvind Kaushik. 1-8 [doi]
- Network Intrusion Detection in Encrypted TrafficEva Papadogiannaki, Giorgos Tsirantonakis, Sotiris Ioannidis. 1-8 [doi]
- A Low Cost Blockchain-Based Framework for Preserving Critical Data in Health-Care IoT Systems Using ClassificationHeba Takruri Tamemi, Manar Rabayah, Kareem Abu Raad, Mai Kanaan, Ahmed Awad. 1-8 [doi]
- Clustering-Based Network Intrusion Detection SystemChun-I Fan, Yen-Lin Lai, Cheng-Han Shie. 1-8 [doi]
- LAEG: Leak-based AEG using Dynamic Binary Analysis to Defeat ASLRWei-Loon Mow, Shih-Kun Huang, Hsu-Chun Hsiao. 1-8 [doi]
- FREED: An Efficient Privacy-Preserving Solution for Person Re-IDentificationBowen Zhao, Yingjiu Li, Ximeng Liu, Hwee Hua Pang, Robert H. Deng. 1-8 [doi]
- An Engineering Process Framework for Cybersecurity Incident Response AssessmentRobert L. Freas, Heather F. Adair, Eman M. Hammad. 1-8 [doi]
- ELSA: Edge Lightweight Searchable Attribute-based encryption Multi-keyword ScalabilityJawhara Aljabri, Anna Lito Michala, Jeremy Singer. 1-4 [doi]
- Automated Anomaly Detection Tool for Industrial Control SystemMariam Varkey, Jacob John, Umadevi K. S.. 1-6 [doi]
- Graph Neural Network-based Android Malware Classification with Jumping KnowledgeWai Weng Lo, Siamak Layeghy, Mohanad Sarhan, Marcus Gallagher, Marius Portmann. 1-9 [doi]
- Defending OC-SVM based IDS from poisoning attacksLu Zhang 0046, Reginald Cushing, Paola Grosso. 1-8 [doi]
- A Survey on Explainable Anomaly Detection for Industrial Internet of ThingsZijie Huang 0003, Yulei Wu. 1-9 [doi]
- A Call for a New Privacy & Security Regime for IoT Smart ToysJoshua Streiff, Naheem Noah, Sanchari Das. 1-8 [doi]
- Curse of System Complexity and Virtue of Operational Invariants: Machine Learning based System Modeling and Attack Detection in CPSMuhammad Omer Shahid, Chuadhry Mujeeb Ahmed, Venkata Reddy Palleti, Jianying Zhou 0001. 1-8 [doi]
- A Digital Forensics Live Suspicious Activity Toolkit To Assist Investigators With Sexual Harm Prevention Order MonitoringAndrew Scholey, Pooneh Bagheri Zadeh. 1-6 [doi]
- Linux Kernel Module Development with RustShao-Fu Chen, Yu-Sung Wu. 1-2 [doi]
- Enabling Device Trustworthiness for SDN-Enabled Internet -of- Battlefield ThingsAbel O. Gomez Rivera, Evan M. White, Jaime C. Acosta, Deepak K. Tosh. 1-7 [doi]
- Cache Locking and Encryption to Prevent Memory Snooping in Embedded SystemsJason DeJesus, John A. Chandy. 1-8 [doi]
- Show Me Your Attach Request and I'll Tell You Who You Are: Practical Fingerprinting Attacks in 4G and 5G Mobile NetworksDaniel Fraunholz, Richard Schörghofer-Vrinssen, Hartmut König, Richard M. Zahoransky. 1-8 [doi]
- How National CSIRTs Operate: Personal Observations and Opinions from MyCERTSharifah Roziah Binti Mohd Kassim, Solahuddin bin Shamsuddin, Shujun Li, Budi Arief. 1-2 [doi]
- High Speed Encrypted Computing: Stochastic Confusion and Lies in a Secret ComputerPeter T. Breuer. 1-8 [doi]
- Cyber Security Risks of Net Zero TechnologiesHaiyue Yuan, Shujun Li. 1-11 [doi]
- Shodan Indicators Used to Detect Standard Conpot Implementations and Their Improvement Through Sophisticated CustomizationWarren Z. Cabral, Leslie F. Sikos, Craig Valli. 1-7 [doi]
- Security Orchestration, Automation, and Response Engine for Deployment of Behavioural HoneypotsUpendra Bartwal, Subhasis Mukhopadhyay, Rohit Negi, Sandeep K. Shukla. 1-8 [doi]
- Securing Password Authentication for Web-based ApplicationsTeik Guan Tan, Pawel Szalachowski, Jianying Zhou 0001. 1-10 [doi]
- Facilitating Deep Learning for Edge Computing: A Case Study on Data ClassificationAbdullah Alsalemi, Abbes Amira, Hossein Malekmohamadi, Kegong Diao. 1-4 [doi]
- A Novel Approach for Providing Client-Verifiable and Efficient Access to Private Smart ContractsAlexander Köberl, Holger Bock, Christian Steger. 1-8 [doi]
- IoT Botnet Detection Based on the Behaviors of DNS QueriesChun-I Fan, Cheng-Han Shie, Che-Ming Hsu, Tao Ban, Tomohiro Morikawa, Takeshi Takahashi 0001. 1-7 [doi]
- Multi-task Learning Model based on Multiple Characteristics and Multiple Interests for CTR predictionYufeng Xie, MingChu Li, Kun Lu 0003, Syed Bilal Hussain Shah, Xiao Zheng. 1-7 [doi]
- Towards Secure Multi-Agent Deep Reinforcement Learning: Adversarial Attacks and CountermeasuresChanggang Zheng, Chen Zhen, Haiyong Xie, Shufan Yang. 1-8 [doi]