Abstract is missing.
- The Perfect Victim? Family Offices as Targets for CybercriminalsBrian Nussbaum, Kimberly A. Cornell, Li Huang. 3-17  [doi]
- Advanced Real-Time Detection of Cyber Threat Information from TweetsMohamed El Amine Bekhouche, Kamel Adi. 18-33  [doi]
- Mitigating Spillover Effects of Ransomware in Financial Markets: Lessons from the LockBit AttacksFrederic Schlackl, Alina Dulipovici, Vincent Grégoire. 34-41  [doi]
- Exploring Smart Speaker Disclosure and Adoption Intentions: A Privacy Adoption Calculus PerspectiveDane Vanderkooi, Atefeh Mashatan, Ozgur Turetken. 42-57  [doi]
- ICoSSiuM: An Integrated Communication Security Simulator for Maritime OperationsLyes Bayou, Ali Awarkeh, Mohamed El Hadi Haouari, Reda Yaich, Marc-Antoine Faillon. 58-73  [doi]
- Lowering the Barrier: An Automatic Attack Flow Generation Framework for Non-Security ExpertsCarmen Cheh, Nan Shing Kham Shing, Edwin Ching Jitt Ang, Binbin Chen 0001, Desmond Cher, Frank Liauw, Reuben Liang Yi Lim. 77-93  [doi]
- An Approach to Determine a System's Behavioural Security PostureJohn Breton, Jason Jaskolka, George O. M. Yee. 94-110  [doi]
- Secure Data Traceability for Mobile Data CollectorsBilel Zaghdoudi, Christine Hennebert, Maria Potop-Butucaru. 111-127  [doi]
- Toward Automatic Enforcement of Security Patterns in Software Architecture Using AlloyQuentin Rouland, Kamel Adi, Omer Nguena-Timo, Luigi Logrippo. 128-145  [doi]
- Light-SABRE: A Lightweight Encrypted Data Distribution System for Internet of ThingsNakul Ghate, Shohei Mitani, Hirofumi Ueda. 149-167  [doi]
- Evaluating Large Language Models on Cybersecurity Knowledge and Skills: A Comparative AnalysisMohamed El Amine Bekhouche, Myria Bouhaddi, Wahib Larbi, Kamel Adi. 168-185  [doi]
- Drone Anomaly Detection: Dataset and Unsupervised Machine LearningZhuo Chen, Issa Traoré, Mohammad Mamun 0001, Sherif Saad. 186-201  [doi]
- A Tool for Enabling Scalable Automation in Security Control SelectionDylan Léveillé, Jason Jaskolka. 202-213  [doi]
- A Systematic Evaluation of Non-SDK Interface Restrictions in Android: Bridging the Gap Between Guidelines and PracticeGeorge Silva, Norah Ridley, Enrico Branca, Natalia Stakhanova. 217-234  [doi]
- An Approach for Handling Missing Attribute Values in Attribute-Based Access Control Policy MiningThang Bui, Elliot Shabram, Anthony Matricia. 235-248  [doi]
- Does Gender Matter? Examining and Mitigating Gender Bias in Fake News DetectionDorsaf Sallami, Esma Aïmeur. 249-266  [doi]
- ProFineLlama: A Prompt and Fine-Tuned Transfer Learning Approach for Multi-domain Fake News DetectionMohammad Q. Alnabhan, Paula Branco. 267-279  [doi]
- Parametric Automata for Dynamic Access Control PoliciesFranck Fotso Kuate, Florent Avellaneda, Omer Nguena-Timo. 280-292  [doi]
- Fingerprinting Connected Wi-Fi Devices Using Per-network MAC AddressesAbhishek Kumar Mishra, Samuel Pélissier, Mathieu Cunche. 295-303  [doi]
- Privacy Guard: Empowering Users with Privacy Labels and Intuitive AppsKhosro Salmani, Alyssa Landeta, Mohit Gupta, Chidera Uzoka. 304-319  [doi]
- Actively Secure Authenticated Data Acquisition Protocols: Advancing Substation Automation SecurityShabnam Saderi Oskouei, Oyonika Samazder, Gaurav Vinay Uttarkar, Kalikinkar Mandal. 320-335  [doi]
- Enhancing Autonomy of Context-Aware Self-healing in Fog Native EnvironmentsSaad Inshi, Rasel Chowdhury, Mohammad Bany Taha, Chamseddine Talhi. 336-350  [doi]
- Detecting Cyber Attacks on Electric Vehicles Charging StationsValeria Valdés Ríos, Fatiha Zaïdi, Ana Rosa Cavalli. 351-362  [doi]
- Secure Voting Protocol Using Balance ScaleShohei Kaneko, Pascal Lafourcade 0001, Lola-Baie Mallordy, Daiki Miyahara, Maxime Puys, Kazuo Sakiyama. 365-376  [doi]
- Monitoring the Execution of Cryptographic FunctionsMatthieu Amet, Oussama Ben Moussa, Guillaume Bonfante, Sébastien Duval. 377-392  [doi]
- RouterORAM: An O(1)-Latency and Client-Work ORAMSumit Kumar Paul, D. A. Knox. 393-413  [doi]