Abstract is missing.
- Cyber Risk Evaluation for Android-based DevicesOcheme Anthony Ekle, Denis A. Ulybyshev. 1-8 [doi]
- RIDE: Real-time Intrusion Detection via Explainable Machine Learning Implemented in a Memristor Hardware ArchitectureJingdi Chen, Lei Zhang, Joseph Riem, Gina C. Adam, Nathaniel D. Bastian, Tian Lan. 1-8 [doi]
- Automatic Conversion of ABAC Policies for RBAC SystemsMaryam Davari, Mohammad Zulkernine. 1-7 [doi]
- Secure Outsourcing of Boolean Formulas Truth Assignment ProblemAlbert Guan. 1-5 [doi]
- Impact of Topology Noise on Power Systems State Estimation Using a Temporal GCN FrameworkSeyed Hamed Haghshenas, Mia Naeini. 1-5 [doi]
- A Study on the Forensic Analysis of Airlines Applications on Android Operating SystemUrva Maryam, Mehdi Hussain. 1-9 [doi]
- SRAM and Generative Network-based Physical Fingerprinting for Trust Management in the Internet of ThingsVarun Kohli, Muhammad Naveed Aman, Biplab Sikdar 0001. 1-8 [doi]
- The Substitution-Boxes Incompatibility in JPEG Image EncryptionManuel Alejandro Cardona-López, Juan Carlos Chimal-Eguía, Víctor Manuel Silva García, Rolando Flores-Carapia. 1-7 [doi]
- Detecting Web Application DAST Attacks with Machine LearningPojan Shahrivar, Stuart Millar, Ezzeldin Shereen. 1-8 [doi]
- Detection of Ransomware Attack Using Deep LearningMuna Jemal, Dan Chia-Tien Lo. 1-9 [doi]
- AI Techniques for Software Vulnerability Detection and MitigationHeba M. Khater, Mohamad Khayat, Saed Alrabaee, Mohamed Adel Serhani, Ezedin Barka, Farag Sallabi. 1-10 [doi]
- Towards Robust Learning using Diametrical Risk Minimization for Network Intrusion DetectionKelson J. McCollum, Nathaniel D. Bastian, Johannes O. Royset. 1-8 [doi]
- Designing and Testing A Secure Cooperative Adaptive Cruise Control under False Data Injection AttackJonas Cunningham-Rush, James Holland, Shirin Noei, Arman Sargolzaei. 1-8 [doi]
- APTer: Towards the Investigation of APT AttributionVinay Sachidananda, Rajendra Patil, Akshay Sachdeva, Kwok-Yan Lam, Yang Liu 0003. 1-10 [doi]
- Cyber Security in BlockchainEric Cooper, Eric Weese, Alex Fortson, Dan Lo 0001, Yong Shi 0002. 1-11 [doi]
- Empirical Evaluation of Autoencoder Models for Anomaly Detection in Packet-based NIDSSoumyadeep Hore, Quoc H. Nguyen, Yulun Xu, Ankit Shah 0002, Nathaniel D. Bastian, Trung Le. 1-8 [doi]
- Exploiting Hardware Imperfections for GPS Spoofing Detection using Clock VariationsMirza Athar Baig, Muhammad Naveed Aman. 1-7 [doi]
- Highly Optimized Curve448 and Ed448 design in wolfSSL and Side-Channel Evaluation on Cortex-M4Mila Anastasova, Rabih El Khatib, Aimee Laclaustra, Reza Azarderakhsh, Mehran Mozaffari Kermani. 1-8 [doi]
- FLID: Intrusion Attack and Defense Mechanism for Federated Learning Empowered Connected Autonomous Vehicles (CAVs) ApplicationMd. Zarif Hossain, Ahmed Imteaj, Saika Zaman, Abdur R. Shahid, Sajedul Talukder, M. Hadi Amini. 1-8 [doi]
- Privacy-Preserving Video Understanding via Transformer-based Federated LearningKeval Doshi, Yasin Yilmaz. 1-8 [doi]
- Decentralized and Incentivized Voting System with Web3 Technology Ensuring Anonymity and Preventing Double VotingLo-Yao Yeh, Jun-Qian Jian, Jen-Wei Hu. 1-8 [doi]
- ML based Detection and Mitigation Scheme for DoS attacks on SDN ControllersTamer Omar, Barret Griffin, Jose Garcia. 1-6 [doi]
- Malicious Cyber Activity Detection using Zigzag PersistenceAudun Myers, Alyson Bittner, Sinan Aksoy, Daniel M. Best, Gregory Henselman-Petrusek, Helen Jenne, Cliff A. Joslyn, Bill Kay, Garret Seppala, Stephen J. Young, Emilie Purvine. 1-8 [doi]
- SepMM: A General Matrix Multiplication Optimization Approach for Privacy-Preserving Machine LearningTung-Lin Tsai, Pei Yuan Wu. 1-10 [doi]
- Lightweight Digital Signatures for Internet of Things: Current and Post-Quantum Trends and VisionsSaif E. Nouma, Attila A. Yavuz. 1-2 [doi]
- Semantic Video Transformer for Robust Action RecognitionKeval Doshi, Yasin Yilmaz. 1-5 [doi]
- Enriching the Semantics of Information Flow Tracking with Source-Level Memory Allocation Event LoggingSanoop Mallissery, Yu-Sung Wu. 1-10 [doi]
- CoDex: Cross-Tactic Correlation System for Data Exfiltration DetectionShanhsin Lee, Yung-Shiu Chen, Shiuhpyng Winston Shieh. 1-8 [doi]
- An Observer-Based Control for a Networked Control of Permanent Magnet Linear Motors under a False-Data-Injection AttackParisa Ansari Bonab, James Holland, Arman Sargolzaei. 1-8 [doi]
- Compiler-Supported Selective Software Fault ToleranceTuncer Turhan, Hakan Tekgul, Ozcan Ozturk 0001. 1-6 [doi]
- Preprocessing Network Traffic using Topological Data Analysis for Data Poisoning DetectionGalamo Monkam, Michael J. De Lucia, Nathaniel D. Bastian. 1-8 [doi]
- Privacy-Preserving and Fault-Tolerant Data Aggregation Protocol for Internet of DronesCong Pu. 1-8 [doi]