Abstract is missing.
- Chronohunt: Determining Optimal Pace for Automated Alert Analysis in Threat Hunting Using Reinforcement LearningBoubakr Nour, Makan Pourzandi, Jesus Alatorre, Jan Willekens, Mourad Debbabi. 1-8 [doi]
- Inherited Threat Reproduction on Open Source 5G TestbedToshiro Sawamoto, Mio Suzuki, Yutaro Osako, Takahiro Kasama, Daisuke Inoue, Koji Nakao. 9-16 [doi]
- Traceability Measurement Analysis of Sustained Internet-Wide Scanners via DarknetChansu Han, Akira Tanaka, Takeshi Takahashi 0001, Sajjad Dadkhah, Ali A. Ghorbani 0001, Tsung-Nan Lin. 17-22 [doi]
- One Pixel Adversarial Attack for Fooling Deep Learning-Based Facial Expression Recognition SystemsPramod Kumar, Ayan Seal, Sraban Kumar Mohanty, Haibo Zhang 0008, Kouichi Sakurai. 23-30 [doi]
- Enhancing Cybersecurity with Transformers: Preventing Phishing Emails and Social Media ScamsEssam Al-Daoud, Laith Al Daoud, Mahmoud Asassfeh, Ala'a Al-Shaikh, Ala'a Saeb Al-Sherideh, Suha Afaneh. 31-36 [doi]
- Sockpuppets Detection Using Markov-Driven Graph Convolutional Networks with Ensemble LearningChun-I Fan, Ming-Feng Tsai, Chun-Pin Hu, Ming-Hung Wang. 37-44 [doi]
- Fine-Tuning Large Language Models for Network Traffic Analysis in Cyber SecurityOrtal Lavi, Ofir Manor, Tomer Schwartz, Andrés F. Murillo, Ayoub Messous, Motoyoshi Sekiya, Junichi Suga, Kenji Hikichi, Yuki Unno. 45-50 [doi]
- Information Flow Tracking for Hardware Trojan Detection: a Feasibility StudyRyoichi Isawa, Nobuyuki Kanaya, Daisuke Inoue. 51-57 [doi]
- Vulnerabilities and Challenges in the Development of PUF-Based Authentication Protocols on FPGAs: A Brief ReviewSinan Yavuz, Edwin Naroska, Kai Daniel. 58-65 [doi]
- kdMonitor: Kernel Data Monitor for Detecting Kernel Memory CorruptionHiroki Kuzuno, Toshihiro Yamauchi. 66-73 [doi]
- Detection Evasion Using eBPF for Linux Fileless MalwareYuta Takabayashi, Masahiro Mambo. 74-75 [doi]
- Exploring the Impact of LLM Assisted Malware Variants on Anti-Virus DetectionZhewei Huang, Yin Minn Pa Pa, Katsunari Yoshioka. 76-77 [doi]
- Enhancing Microcontroller Security Through Volatile Memory-Resident Encrypted CodeMinjung Kim, Daejin Park. 78-79 [doi]
- Efficient and Secure Multi-Point Communication Framework Supporting Resource Constraints EnvironmentJheng-Jia Huang, Wei-Hsueh Wang, Wen-Yan Dai, Guan-Yu Chen, Yi-Fan Tseng. 80-81 [doi]
- Systematic Construction of Adaptively Decodable Visual Secret Sharing Scheme on Background ColorMasanori Hirotomo, Atsushi Marui, Yoshiaki Shiraishi. 82-87 [doi]
- Enhanced Analysis of Cryptographic Library Usage Patterns and Trends in Android ApplicationsAkira Kanaoka, Mamoru Abe. 88-93 [doi]
- Quantum Guard: Pioneering Quantum-Based Malware Defense for IoT DevicesMansoor Ali Khan, Muhammad Naveed Aman, Biplab Sikdar 0001. 94-99 [doi]
- A Case Study of URL Blocklist MaintenanceMizuho Hasegawa, Yamato Kawaguchi, Hiroaki Takayama, Yasuhiro Kunimine, Hidekazu Tanaka, Shintaro Kawamura, Akira Fujita, Shingo Yasuda, Daisuke Inoue, Nobuyo Fujiwara, Kazuki Takada, Rui Tanabe, Katsunari Yoshioka. 100-101 [doi]
- Control Displaying of Web Push Notifications Inducing Users to Phishing WebsitesMasaya Sato, Ryuki Mandai. 102-103 [doi]
- Blockchain-Enabled IoV: Secure Communication and Trustworthy Decision-MakingJingyi Sun, Qi Shi, Guodong Jin, Hao Xu 0013, Weichao Chen. 104-105 [doi]
- Investigating Black-Market Jobs on Social Networking ServiceYamato Kawaguchi, Kazuki Takada, Yin Minn Pa Pa, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto. 106-107 [doi]
- Can We Determine Whether a Set of Ethereum Transaction Data Contains Fraudulent Transactions?Shunsuke Nakatani, Hiroki Kuzuno, Makoto Takita, Masami Mohri, Yoshiaki Shiraishi. 108-114 [doi]
- Threat of Technical Support Scams in JapanAyumu Yamada, Hiroyuki Ito, Kosuke Kajimoto, Tetsuya Kageyama, Taichi Aoki, Takahiro Kasama. 115-122 [doi]
- An Analysis of the Relationship Between Black-Hat SEO Malware Families Leveraging Information from Redirected Fake E-Commerce Scam SitesMakoto Shimamura, Shingo Matsugaya, Keisuke Sakai, Kosuke Takeshige, Masaki Hashimoto. 123-130 [doi]
- InstaMAuth: Instant Mobile Authentication Service Based on 5G Authenticated Call SessionsYi-Chen Hsieh, Tzu-Chi Yu, Chi-Yu Li 0001, Guan-Hua Tu. 131-138 [doi]
- An Approach to Multi-Class Intrusion Detection Based on Feature Subspaces and Weighted FusionRui Liu, Yaokai Feng, Kouichi Sakurai. 139-146 [doi]
- Enhancing Decision-Making of Network Intrusion Analysis Assisted by Explainable AI for Real-Time Security MonitoringHyunWoo Lee, Taewoong Kwon, Jun Lee, Jungsuk Song. 147-154 [doi]
- A Multi-Package Trust Model for Improving the Trustworthiness of Traceability Data in Blockchain-Based Beef Supply ChainOratile Leteane, Yirsaw Ayalew, Tshiamo Motshegwa. 155-162 [doi]