Abstract is missing.
- Helpful or Harmful? Exploring the Efficacy of Large Language Models for Online Grooming PreventionEllie Prosser, Matthew Edwards. 1-10 [doi]
- Haven't we met before? - Detecting Device Fingerprinting Activity on Android AppsKris Heid, Jens Heider. 11-18 [doi]
- can-sleuth: Investigating and Evaluating Automotive Intrusion Detection DatasetsBrooke Kidmose, Weizhi Meng 0001. 19-28 [doi]
- SFTC: Machine Unlearning via Selective Fine-tuning and Targeted ConfusionVasileios Perifanis, Efstathios Karypidis, Nikos Komodakis, Pavlos S. Efraimidis. 29-36 [doi]
- Towards Customized Cyber Exercises using a Process-based Lifecycle ModelTobias Pfaller, Florian Skopik, Paul Smith 0001, Maria Leitner. 37-45 [doi]
- Emergent Needs in Assuring Security-Relevant Compliance of Information SystemsTomas Bueno Momcilovic, Dian Balta. 46-49 [doi]
- Understanding the Evolution of Transatlantic Data Privacy Regimes: Ideas, Interests, and InstitutionsXinchuchu Gao, Xuechen Chen. 50-56 [doi]
- Evaluating the Impact of Conventional Code Analysis Against Large Language Models in API Vulnerability DetectionRecep Yildirim, Kerem Aydin, Orçun Çetin. 57-64 [doi]
- XAI-driven Adversarial Attacks on Network Intrusion DetectorsSatoshi Okada, Houda Jmila, Kunio Akashi, Takuho Mitsunaga, Yuji Sekiya, Hideki Takase, Gregory Blanc, Hiroshi Nakamura. 65-73 [doi]
- Increasing Detection Rate for Imbalanced Malicious Traffic using Generative Adversarial NetworksPascal Memmesheimer, Stefan Machmeier, Vincent Heuveline. 74-81 [doi]
- Insights into anomaly-based intrusion detection systems usability. A case study using real http requestsJesús Esteban Díaz Verdejo, Rafael Estepa, Antonio Estepa Alonso, Javier Muñoz-Calle. 82-89 [doi]
- Attack Surface Measurement: A Weird Machines PerspectiveMatthew Levy, Froylan Maldonado. 90-94 [doi]
- Modelling Indicators of Behaviour for Cyber Threat Hunting via SysmonRobert Andrew Chetwyn, Martin Eian, Audun Jøsang. 95-104 [doi]
- Towards arbitrating in a dispute - on responsible usage of client-side perceptual hashing against illegal content distributionLeon Twenning, Harald Baier. 105-114 [doi]
- Towards Improving Accountability in Sensitive-Disclosure ScenariosRoman Matzutt, Eric Wagner 0003. 115-119 [doi]
- Analysis of Security Mechanisms of Dark Web MarketsYichao Wang, Budi Arief, Julio C. Hernandez-Castro. 120-127 [doi]
- Honeypot's Best Friend? Investigating ChatGPT's Ability to Evaluate Honeypot LogsMeryem Berfin Ozkok, Baturay Birinci, Orçun Çetin, Budi Arief, Julio C. Hernandez-Castro. 128-135 [doi]
- Disinformation detection and source tracking using semi-fragile watermarking and blockchainTanya Koohpayeh Araghi, David Megías 0001, Victor Garcia-Font, Minoru Kuribayashi, Wojciech Mazurczyk. 136-143 [doi]
- PMMP-PQC Migration Management Process✱Nils von Nethen, Alexander Wiesmaier, Nouri Alnahawi, Johanna Henrich. 144-154 [doi]
- Security-by-design challenges for medical device manufacturersKarin Bernsmed, Martin Gilje Jaatun. 155-160 [doi]
- A Hypergraph-based Model for Cyberincident-related Data AnalysisJuan Manuel Matalobos Veiga, Regino Criado, Miguel Romance Del Rio, Sergio Iglesias Perez, Alberto Partida Rodriguez, Karan Kabbur Hanumanthappa Manjunatha. 161-162 [doi]
- Emerging Technologies for Privacy Preservation in Energy SystemsUmit Cali, Sri Nikhil Gupta Gourisetti, David Jonathan Sebastian Cardenas, Ferhat Özgür Çatak, Annabelle Lee, Linda M. Zeger, Taha Selim Ustun, Marthe Fogstad Dynge, Sreedhar Rao, Javier E. Ramirez. 163-170 [doi]
- An Enhanced Combinatorial Contextual Neural Bandit Approach for Client Selection in Federated LearningXiangyu Ma, Wei Shi 0001, Junfeng Wen. 171-178 [doi]
- Incentivising the federation: gradient-based metrics for data selection and valuation in private decentralised trainingDmitrii Usynin, Daniel Rueckert, Georgios Kaissis. 179-185 [doi]
- Using Federated Learning and Channel State Information-Based Sensing for Scalable and Realistic At-Home HealthcareJeroen Klein Brinke, Martijn van der Linden, Paul J. M. Havinga. 186-193 [doi]
- A Federated Explainable AI Model for Breast Cancer ClassificationEleni Briola, Christos Chrysanthos Nikolaidis, Vasileios Perifanis, Nikolaos Pavlidis, Pavlos S. Efraimidis. 194-201 [doi]
- Survey and Analysis of User Perceptions of Security IconsRei Yamagishi, Shota Fujii. 202-209 [doi]
- A Threat-Led Approach to Mitigating Ransomware Attacks: Insights from a Comprehensive Analysis of the Ransomware EcosystemAlexander Lawall, Petra Beenken. 210-216 [doi]
- Biblio-US17: A labeled real URL dataset for anomaly-based intrusion detection systems developmentJesús Esteban Díaz Verdejo, Rafael M. Estepa-Alonso, Antonio Estepa Alonso, Javier Muñoz-Calle, Germán Madinabeitia. 217-218 [doi]
- Towards Access Control for Machine Learning EmbeddingsRoman Matzutt. 219-220 [doi]
- Cybersecurity competence of older adult users of mobile devicesSimon Vrhovec, Igor Bernik, Damjan Fujs, Damjan Vavpotic. 221-223 [doi]
- Cyber Security for SMEs - Clear, Consistent and Complete?Steven Furnell. 224 [doi]
- Cybersecurity awareness and training: The CyberSecPro and NERO approachesChristos Douligeris. 225 [doi]