Abstract is missing.
- A Quantum Physics Approach for Enabling Information-Theoretic Secure Communication ChannelsIvan Cvitic, Dragan Perakovic. 3-22 [doi]
- Learning Framework for Guessing Alphanumeric Passwords on Mobile Phones Based on User Context and Fragment SemanticsLilian Noronha Nassif, Jonny Silva de Oliveira. 23-30 [doi]
- Password Managers and Vault Application Security and Forensics: Research Challenges and Future OpportunitiesAleck Nash, Kim-Kwang Raymond Choo. 31-53 [doi]
- Lattice-Based Secret Sharing Scheme (Chinese Remainder Theorem)SongShou Dong, Yanqing Yao, Yihua Zhou, Yuguang Yang 0001. 54-62 [doi]
- A PUF Based Audio Fingerprint Based for Device Authentication and Tamper LocationZhi Lu, Haochen Dou, Songfeng Lu, Xueming Tang, Junjun Wu, Samir Mohammed Umran. 63-78 [doi]
- SHIELD: A Specialized Dataset for Hybrid Blind Forensics of World LeadersQingran Lin, Xiang Li, Beilin Chu, Renying Wang, Xianhao Chen, Yuzhe Mao, Zhen Yang, Linna Zhou, Weike You. 79-91 [doi]
- Optir-SBERT: Cross-Architecture Binary Code Similarity Detection Based on Optimized LLVM IRYintong Yan, Lu Yu, Taiyan Wang, Yuwei Li, Zulie Pan. 95-113 [doi]
- SdShield: Effectively Ensuring Heap Security via Shadow Page TableLinong Shi, Chuanping Hu, Yan Zhuang, Yan Lu. 114-131 [doi]
- Unraveling Network-Based Pivoting Maneuvers: Empirical Insights and ChallengesMartin Husák, Shanchieh Jay Yang, Joseph Khoury, Dorde Klisura, Elias Bou-Harb. 132-151 [doi]
- XSS Vulnerability Test Enhancement for Progressive Web ApplicationsJosep Pegueroles-Valles, Sebastien Kanj Bongard, Arnau Estebanell CastellvĂ. 152-163 [doi]
- Detection of Targeted Attacks Using Medium-Interaction Honeypot for Unmanned Aerial VehicleAbdul Majid Jamil, Hassan Jalil Hadi, Sifan Li, Yue Cao 0002, Naveed Ahmed, Faisal-Bashir Hussain, Chakkaphong Suthaputchakun, Xinyuan Wang. 164-185 [doi]
- Power Analysis Attack Based on BS-XGboost SchemeYiran Li. 186-196 [doi]
- Security Analysis of Google Authenticator, Microsoft Authenticator, and AuthyAleck Nash, Hudan Studiawan, George Grispos, Kim-Kwang Raymond Choo. 197-206 [doi]
- APTBert: Abstract Generation and Event Extraction from APT ReportsChenxin Zhou, Cheng Huang 0003, Yanghao Wang, Zheng Zuo. 209-223 [doi]
- Assessing the Effectiveness of Deception-Based Cyber Defense with CyberBattleSimQuan Hong, Jiaqi Li, Xizhong Guo, Pan Xie, Lidong Zhai. 224-243 [doi]
- DynVMDroid: Android App Protection via Code Disorder and Dynamic RecoveryWeimiao Feng, Rui Hu, Cong Zhou, Lei Yu. 244-257 [doi]
- Improvement of an Identity-Based Aggregate Signature Protocol from LatticeSongShou Dong, Yanqing Yao, Yihua Zhou 0001, Yuguang Yang 0001. 258-263 [doi]
- A Measurement Study on Interprocess Code Propagation of Malicious SoftwareThorsten Jenke, Simon Liessem, Elmar Padilla, Lilli Bruckschen. 264-282 [doi]
- An Android Malware Detection Method Based on Optimized Feature Extraction Using Graph Convolutional NetworkZhiqiang Wang 0006, Zhuoyue Wang, Ying Zhang. 283-299 [doi]
- ForensiQ: A Knowledge Graph Question Answering System for IoT ForensicsRuipeng Zhang, Mengjun Xie. 300-314 [doi]
- I've Got You, Under My Skin: Biohacking Augmentation Implant ForensicsSteven Seiden, Ibrahim M. Baggili, Aisha I. Ali-Gombe. 315-332 [doi]
- Quantum Computing Challenges and Impact on Cyber SecurityHassan Jalil Hadi, Yue Cao, Mohammed Ali Alshara, Naveed Ahmad, Muhammad Saqib Riaz, Jun Li. 333-343 [doi]