Abstract is missing.
- To See or Not to See: A Privacy Threat Model for Digital Forensics in Crime InvestigationMario Raciti, Simone Di Mauro, Dimitri Van Landuyt, Giampaolo Bella. 1-6 [doi]
- Evaluating Spam Detection Techniques: A Comparison of TF-IDF and Sentence Embeddings with Machine Learning ModelsBruno Silva, Patrícia Leite, Óscar R. Ribeiro. 1-4 [doi]
- Deep Learning Models for Malware Family DetectionJenna Snead, Krishnendu Ghosh. 1-6 [doi]
- CrossSentry: A Cross-Layer Approach to Ransomware Detection in IoTFarhad Mofidi, Sena G. Hounsinou, Gedare Bloom. 1-6 [doi]
- Detection of Dynamic Code Loading in AndroidMegha Gopakumar, Saranya Chandran. 1-6 [doi]
- Speed as an Instrument: Exploiting Time-Scale Modification for Adversarial Attacks and Defenses in Speaker Recognition SystemsUmang Patel, Shruti Bhilare, Avik Hati. 1-6 [doi]
- Illuminated Secrets: Exploiting Display Brightness for Out-of-Band Optical Covert CommunicationVirguens Honorius, Cihan Varol. 1-6 [doi]
- Unity-Supported Game-Based Learning: Teachers' Perspectives on the Development of Classroom Management SkillsSongül Karabatak, Aysenur Kuloglu, Müslim Alanoglu, Ezgi Bozkurt. 1-6 [doi]
- Enhancing Cyberspace Security with Phishing Detection and Defense Using Machine Learning ModelsMD Nazmul Haque Siam, Ehsan Hallaji, Roozbeh Razavi-Far. 1-6 [doi]
- Digital Forensics Analysis of iMazing Phone Explorer Tool to Aid Mobile Forensics InvestigationAshar Neyaz, Avinash Kumar, Bingyu Liu. 1-8 [doi]
- AI-Driven Digital Evidence Triage in Digital Forensics: A Comprehensive ReviewMd. Zakir Hossain Zamil, Tahir M. Khan. 1-6 [doi]
- Strategic Placement of FACTS Devices for Optimizing Power Transmission Efficiency and StabilityBlake Pickett, Asaf Varol. 1-7 [doi]
- Using Machine Learning Techniques to Address IoT Forensics ChallengesBoitumelo Nkwe, Michael Kyobe. 1-6 [doi]
- LexChain: A Blockchain-based Solution to Safeguard Electronic Evidence in Legal SystemsNeha Adhikari, Manan Chhajed, Divya Raichura, Prasenjit Bhavathankar. 1-6 [doi]
- Recognizing the Financial Fraud Type of Telegram Advertisement Posts Based on the Multimodal LearningChunlan Gao, Yubao Wu. 1-6 [doi]
- Development of Two-Stage Steganography MethodZhanat Saukhanova, Sayat Raykul, Altynbek Sharipbay, Gulmira Shakhmetova, Alibek Barlybayev, Altay Khassenov. 1-5 [doi]
- Hardware Performance Evaluation of Freeware ETL ToolsTugba Elmas, Adrien Chardon Fabian, Cihan Varol, Asaf Varol. 1-5 [doi]
- FSCsec: Collaboration in Financial Sector Cybersecurity - Exploring the Impact of Resource Sharing on IT SecuritySayed Abu Sayeed, Mir Mehedi Rahman, Samiul Alam, Naresh Kshetri. 1-6 [doi]
- Bibliometric Analysis in AI Assistant for e-learning to Focus Students by Using Camera, Keyboard and MouseZhala Sarkawt Othman, Songül Karabatak, Murat Karabatak. 1-6 [doi]
- Source Identification of DeepFake Videos in Social Media-like Networks using Centrality MeasuresAryan Kumar, Bharath Raja, Ashlin Furtado, Anoushka Vemireddy, Prasad B. Honnavalli, Sapna VM. 1-7 [doi]
- Project HyperAdapt: An Agent-Based Intelligent Sandbox Design to Deceive and Analyze Sophisticated MalwareShamalka Perera, Shenuka Dias, Vishwadinu Vithanage, Avishka Dilhara, Amila Senarathne, Deemantha Siriwardana, Chethana Liyanapathirana. 1-6 [doi]
- Intrusion Detection System Based On Machine Learning Algorithms In the DOUNG Ad Hoc NetworkBoubacar Tawayé Abdoul Aziz, Mahamadou Issoufou Tiado, Boukar Abatchia Nicolas, Boureima Djibo Abasse. 1-5 [doi]
- User Behavior Analysis for Cyber Threat Detection: A Comparative Study of Machine Learning AlgorithmsAnant Wairagade, Sumit Ranjan. 1-6 [doi]
- A Novel Multi-Scale Spectral-Guided Graph Attention Network for DeepFake Video DetectionMuhammad Irfan, Myung J. Lee, Ashar Neyaz, Daiki Nobayashi. 1-7 [doi]
- Leveraging Feature Engineering and Machine Learning for Internet of Things (IoT) Cyberattack Detection: A Scalable ApproachArafat Asim, Peter J. Hawrylak. 1-6 [doi]
- Merging Attack Trees and MITRE ATT&CK Tactics for More Effective Attack ModelingNatalija Vlajic, Melina Hajimi, Milos Stojadinovic. 1-8 [doi]
- Implementation of Device-to-Device Authentication with Middleware Broker System for Secure Smart HomesZainatul Yushaniza Mohamed Yusoff, Mohamad Khairi Ishak, Lukman Ab Rahim, Khalid Ammar. 1-6 [doi]
- Blockchain-Based Enhanced Secure Data Storage Model: A Framework for the Internet of Vehicle NetworksMuhammad Umar Majigi, Richard Adeyemi Ikuesan, Ismaila Idris, Shafii Muhammad Abdulhamid. 1-7 [doi]
- Enhancing Brain Tumor Detection Using a CNN-Powered Android ApplicationMd. Zakir Hossain Zamil, Byoung Jik Lee. 1-6 [doi]
- A Framework to Automate the Digital Forensics Pipeline of Electron-based Social Media ApplicationsKhushi Gupta, Phani Lanka, Cihan Varol. 1-6 [doi]
- Machine Learning Approaches for Classifying Encrypted FilesRazaq Jinad, ABM Islam, Narasimha Shashidhar. 1-7 [doi]
- Cost-Optimized Cloud Scheduling for ETL and Big Data Using AIChaitanya Krishnama, Raghavender Puchhakayala, Sudarshan Kotha, Faiz Gouri. 1-6 [doi]
- The Importance of Dark Web Access in Cyber Threat IntelligenceVictor Obojo, Richard A. Ikuesan, AbdulKabir Adekanye, Elias Iortom. 1-6 [doi]
- dataLDA: Analyzing Data Quality in Big Data Using Traditional Approaches vs. Latent Dirichlet Allocation - Systematic ReviewSayed Abu Sayeed, Naresh Kshetri, Mir Mehedi Rahman, Samiul Alam, Abdur Rahman. 1-6 [doi]
- Comparing Traditional Hacking Tools and AI-Driven AlternativesRui Fernandes, Nuno Lopes 0001, Joaquim Gonçalves, John Cosgrove. 1-5 [doi]
- The Relationship Between Secondary School Students' Digital Game Addictions and Their Responsibilities Toward LearningFulya Görkem Orhan, Aysenur Kuloglu. 1-5 [doi]
- Legal & Ethical Implications of Predictive Digital Techniques in the Judicial Criminal ProceedingsGrazia Garzo, Alessandro Palumbo. 1-6 [doi]
- Deep-Learning Based 3D Lung SegmentationKerem Erciyes, Mustafa Soydan, Özgür Gümüs. 1-6 [doi]
- Advancing DevSecOps in SMEs: Challenges and Best Practices for Secure CI/CD PipelinesJayaprakashreddy Cheenepalli, John D. Hastings, Khandaker Mamun Ahmed, Chad Fenner. 1-6 [doi]
- IoT Cyberattack Detection via Fog Computing and Multilayer Perceptron Neural NetworksBranly Alberto Martínez González, Malena Pérez Sevilla, Jaime Andrés Rincón Arango, Daniel Urda Muñoz. 1-5 [doi]
- Trigger Labs: Advancing Malware Detection Through Realistic Scenario SimulationElon Salfati, Harry Yu. 1-7 [doi]
- Advanced DDoS Detection in Online Learning EnvironmentsAmine Berqia, Oussama Ismaili, Manar Chahbi, Habiba Bouijij. 1-5 [doi]
- Foundation Models for Medical Image Segmentation: A Literature ReviewSaid Berrezueta, Maria G. Baldeon Calisto, Danny Navarrete, Noel Pérez Pérez, Ricardo Flores Moyano, Daniel Riofrío, Diego S. Benítez. 1-7 [doi]
- Packers and Features: Efficacy of Static Analysis for Packed Linux MalwareJayanthi Ramamoorthy, Narasimha K. Shashidhar, Cihan Varol. 1-6 [doi]
- MemLOL: Memory-Based LOLBins Dataset for Fileless Malware DetectionShunmika Chidambaram, Swapna M. P. 1-5 [doi]
- A Comprehensive Comparative Analysis of RFID Devices Security in Supply Chain Geofencing TechnologiesHala Strohmier Berry, Brecken Merrill, Shamreen Shakil Shaikh, Mary Alice Woolington. 1-4 [doi]
- Multi-Objective Task Scheduling in Fog-Cloud Environments: LS-NSGA-II Optimization and Blockchain Integration for Enhanced Security and EfficiencyMohsen Aydi, Houssem Eddine Nouri, Olfa Belkahla Driss. 1-6 [doi]
- Advanced Privacy and Security Techniques in Federated Learning Against Sophisticated AttacksHariprasad Holla, Arun Ambika Sasikumar, Chandu Gutti, Karthik Thumula, Hemanth Gogineni. 1-6 [doi]
- Enhancing Breast Cancer Detection with AI: Ensuring Image Security and Diagnostic Precision Through Deep Learning TechniquesThrushna Matharasi, Priyam Ganguly, Isha Mukherjee, Sanjeev Lakkaraju. 1-5 [doi]
- Blockchain-Based Custody Evidence Management System for Healthcare ForensicsR. D. D. L. K. Jayasinghe, M. W. K. L. Sasanka, D. A. S. M. Athukorala, M. A. D. Sandeepani, Anuradha Jayakody, Amila Senarathna. 1-6 [doi]
- Evaluating IEEE P2834.1 Standard: Use Case Scenarios for Enhancing Digital Forensics in Trusted Learning SystemsKhushi Gupta, Cihan Varol, Hamadou Saliah-Hassane. 1-7 [doi]
- CLIP-based Few-Shot Multi-Label Classification Methods: A Comparative StudyYagmur Çigdem Aktas, Jorge García Castaño. 1-6 [doi]
- Probabilistic Deep Learning for Energy Time Series Forecasting: A Comparative StudyRamakrishna Garine, Sunil Pradhan Sharma. 1-6 [doi]
- Advancements and Challenges in AI-Powered Honeypots: A Comparative Study of Detection, Engagement and Ethical ImplicationsAnil Sezgin, Gürkan Özkan, Aytug Boyaci. 1-6 [doi]
- Human-in-the-Loop: Legal Knowledge Formalization in Attempto Controlled EnglishGrazia Garzo, Alessandro Palumbo. 1-6 [doi]
- Chaotic Time Series Forecasting Optimisation Based on Hybrid PSO AlgorithmDing Wang. 1-8 [doi]
- Malware Exploitation and Vulnerability Assessment of CVE-2024-38063 in Windows 10 and 11 in Academic Networks CybersecurityChris Clark, Hala Strohmier Berry, Bryce Sullivan, Nicholas Maroney, Jonathan Galbraith. 1-5 [doi]
- A Multi-Layer Model of Psychological Factors and Parametric Approaches for Human-Centric Phishing PreventionSeydanur Ahi Duman, Atahan Duman, Rukiye Hayran, Ibrahim Sogukpinar. 1-5 [doi]
- Critical Factors for Privacy and User Retention in Event-Based Social Media AppsHala Strohmier Berry, Keenan Golston, Autumn Hurley, Jadon Ott, Julian Ward. 1-6 [doi]
- An Integrated Framework for Video-Based Deepfake Forensic AnalysisBashaer Mohamed Alsalami, Richard Ikuesan. 1-5 [doi]
- Exploring the Potential of DeepSeek-R1 Model in Transforming Healthcare Solutions: An OverviewMuhammad Raheel Raza, Shahbaz Ahmed, Fahad Ahmed KhoKhar, Asaf Varol. 1-4 [doi]
- Leveraging Machine Learning for Effective Device Detection and Security in LoRa-Based IoT SystemsNurettin Selcuk Senol, Anitha Chennamaneni, Amar Rasheed, Ahmet Furkan Aydogan. 1-6 [doi]
- NIDS Using Hierarchical Attack Structure and TransformerAvinash Kumar 0007, Nuri Alperen Kose, Kubra Kose, Hyuk Cho. 1-8 [doi]
- Digital Assistants: AI to Reduce Teachers' Expectations of Reality ShockSongül Karabatak, Müslim Alanoglu, Aysenur Kuloglu, Ezgi Bozkurt. 1-6 [doi]
- Feature Selection and XGBoost for Enhanced Intrusion Detection: A Comparative Study Across Benchmark DatasetsPedro Ferreira, Enmanuel Martins, Joaquim Silva, Paulo Teixeira. 1-6 [doi]
- The Role of Machine Learning in Distance EducationAbdullah Alan, Songül Karabatak, Murat Karabatak. 1-6 [doi]
- Predicting Cyberattacks on Connected Healthcare Devices Using LightGBM-based ApproachAmine Berqia, Habiba Bouijij, Manar Chahbi, Oussama Ismaili. 1-6 [doi]
- Context-Aware Behavior-Driven Pipeline GenerationPawara Gunathilaka, Dinal Senadheera, Shenan Perara, Chamithu Gunawardana, Samantha Thelijjagoda, Jenny Krishara. 1-6 [doi]
- Scalable and Ethical Insider Threat Detection through Data Synthesis and Analysis by LLMsHaywood Gelman, John D. Hastings. 1-6 [doi]
- Enhancing the Digital Forensics Presentation Phase Through Immersive Virtual Reality Training EnvironmentsChukwuemeka Ihekweazu, Khushi Gupta, Chiamaka Femi-Adeyinka, Naomi Aghado, Pat Ko. 1-6 [doi]
- Assessing the Usability of an AI-Powered Mobile App on Student Engagement in Remote Field ActivitiesChennaiah Madduri, Ranita Ganguly, Dishant Banga. 1-4 [doi]
- A Zero Trust Framework with AI-Driven Identity and Intrusion Detection for Multi-Cloud MLOpsH. N. V. Sai Murali Krishna Tungala, Ganapathi Yeleswarapu, Mahesh Shivnatri, Sridhar Kumar Irujolla. 1-6 [doi]
- Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted CodeGary A. McCully, John D. Hastings, Shengjie Xu, Adam Fortier. 1-6 [doi]
- Enhancing Online Laboratories' Security Through the Use of RFID TechnologyMichael Stalford, Luis Felipe Zapata Rivera, Catalina Aranzazu Suescun. 1-6 [doi]
- Harmonized Data Drive: Standardizing and Unifying Smart Car Information Storage for Enhanced Forensics and InteroperabilityHossein Jamali, Josh Watson, Sergiu M. Dascalu, Frederick C. Harris Jr.. 1-6 [doi]
- COVID Infodemic Advisor (CIA): An Online Recommender For Content Consumers & ProvidersChase Maschinot, Ankur Chattopadhyay, Seth Adjei. 1-7 [doi]
- APT-LLM: Embedding-Based Anomaly Detection of Cyber Advanced Persistent Threats Using Large Language ModelsSidahmed Benabderrahmane, Petko Valtchev, James Cheney, Talal Rahwan. 1-6 [doi]
- Enhancing Kalman Filter Resilience in Electric Vehicles: Cyber-Attack Mitigation with Machine Learning Based Adaptive FilteringBryan Anderson, Gahangir Hossain. 1-6 [doi]
- Artificial Intelligence and Classroom Management in Education: Evolution of Academic Studies and Research TrendsSevinç Ay, Songül Karabatak, Murat Karabatak. 1-6 [doi]
- Focus: A One-vs-All Resolution Strategy for Temporal Metadata AnalysisMichael C. Todd, Gilbert L. Peterson. 1-6 [doi]
- A Deep Learning Approach for Rapid and Cost-Effective Detection of Pesticide Residues in Agricultural ProductsAhmet Saatçi, Ergin Taskan, Mehmet Sahin. 1-6 [doi]
- FIRM-OT: A Methodology for Cybersecurity Forensics and Incident Response in OTHebert Silva, Thiago Gonçalves, Dirceu Lippi. 1-6 [doi]
- Romance Scam Victimization: A Survey-Based Examination of Financial, Psychological, and Reporting FactorsLD Herrera. 1-6 [doi]
- Network Intrusion Detection System Based on Multiple Datasets: Machine Learning ApproachesAndré Araújo, David Rodrigues, Patrícia Leite, Joaquim Gonçalves. 1-5 [doi]
- An Efficient Plagiarism Detection Algorithm by Ordering Texts of a Document under ScrutinyMuhammad Nomani Kabir, Yasser M. Alginahi. 1-6 [doi]
- An Ensemble Transformer Approach with Cross-Attention for Automated Code Security Vulnerability Detection and DocumentationAdiba Mahmud, Yasmeen Rawajfih, Fan Wu. 1-6 [doi]
- SURF: Sequential Undersampling-Refinement Framework for Two-Stage Anomaly DetectionPranav Goda Narahari, Omkar Kulkarni, Anna Singh, Sathya Prasad. 1-6 [doi]
- Creating User-Centric and Artificial Intelligence-Enhanced Hybrid Authentication Systems and Policies: A Theoretical ApproachMustafa Senol, Abdulsamet Hasiloglu. 1-6 [doi]
- AutoBnB: Multi-Agent Incident Response with Large Language ModelsZefang Liu. 1-6 [doi]
- Covert Channels Through Docker Image ManipulationJacob Fricano, Nicholas Geigel, Daryl Johnson. 1-6 [doi]
- Evaluating Machine Learning Algorithms for Enhancing Network Intrusion Detection Systems: A Comparative StudyGunay Abdiyeva-Aliyeva, Naila Allakhverdiyeva, Nihad Alili, Ilkin Balazade. 1-4 [doi]
- Extent of an Attack in an Attack Graph: Method to Evaluate Evidence SetMukesh Yadav, Peter J. Hawrylak. 1-6 [doi]
- Advancing IoMT Security with Privacy-Preserving Federated Learning TechniquesMaurel Kouekam, Fadoua Khennou. 1-8 [doi]
- DockerGate: Automated Seccomp Policy Generation for Docker ImagesRohit Venkata Satya Kuppili. 1-6 [doi]
- Quantized Hybrid Privacy Preserving Approach for Federated Learning with Flower FrameworkFiroz Khan, C. Sai Varun, Balamurugan Balusamy, Jeevanandam Jotheeswaran. 1-7 [doi]
- detectGNN: Harnessing Graph Neural Networks for Enhanced Fraud Detection in Credit Card TransactionsIrin Sultana, Syed Mustavi Maheen, Naresh Kshetri, Md Nasim Fardous Zim. 1-6 [doi]
- Privacy-Preserving Secret Sharing using Fully Homomorphic EncryptionAdoum Youssouf, Abdramane Issa, Daouda Ahmat. 1-6 [doi]
- Enhancing Phishing Website Detection with Machine Learning AlgorithmsWeijie Pang, Ayrton Joseph DiPina, Ashar Neyaz. 1-5 [doi]
- Enhanced Multi-Head Self-Attention Transformer-Based Method for Prediction of Drug-Drug InteractionsSemih Cal, Ramazan Ozgur Dogan, Hülya Dogan. 1-6 [doi]
- A Game Between the Defender and the Attacker for Trigger-Based Black-box Model WatermarkingChaoyue Huang, Hanzhou Wu. 1-6 [doi]
- Bridging Gaps in Understanding College Graduation RatesGeorge Thompson, Serkan Varol, Derya Ucuz, Zachary Ridder. 1-7 [doi]
- Adversarial Retraining and White-Box Attacks for Robust Malware DetectionHajar Ouazza, Fadoua Khennou, Abderrahim Abdellaoui. 1-6 [doi]
- A Dual-Branch CNN and Metadata Analysis Approach for Robust Image Tampering DetectionAsmath Zakey, Dinura Bawantha, Dinuth Shehara, Nethmi Hasara, Kavinga Yapa Abeywardena, Harinda Fernando. 1-6 [doi]
- Migrating Traditional Applications to Cloud-Native DevOps: A Framework for Successful Cloud Migration and ModernizationNeha Surendranath, Sai Annamaiah Basava Raju, Ranita Ganguly. 1-6 [doi]
- Debate-Driven Multi-Agent LLMs for Phishing Email DetectionNgoc Tuong Vy Nguyen, Felix D. Childress, Yunting Yin. 1-5 [doi]
- Enhancing loMT Security with Deep Learning Based Approach for Medical IoT Threat DetectionNadir Can Kavkas, Kazim Yildiz. 1-5 [doi]
- Towards A Unique User-Centric Security & Privacy (S&P) Label For Social RobotsAnkur Chattopadhyay, Mohammad Q. Azhar, Ezra Faith, Alexandra Lisa, Oksana Piven, Suhaas Ravela. 1-7 [doi]
- An Empirical Analysis of Security and Privacy Issues Associated with Selling and Purchasing of Secondhand Storage DevicesMahra Mohammed Alnaqbi, Shaikha Tareq Alblooshi, Elyazia Abdulla Alshamsi, Niyat Seghid, Farkhund Iqbal. 1-7 [doi]
- Customer Personality Analysis Using Machine Learning with Explainable AIDin Mohammad Dohan, Naheyan Prottush, Md. Ashiq Ul Islam Sajid, Sudipta Mondal, Sumaya Binte Zilani Choya, Md. Golam Rabiul Alam. 1-6 [doi]
- Investigating NoSQL Injection Attacks on MongoDB Web ApplicationsHardi Matholia, Oluwasola Mary Adedayo. 1-6 [doi]
- A Scientific Discovery in Virtual Reality and Augmented Reality Enriched with Artificial IntelligenceMurat Karabatak, Sevinç Ay, Songül Karabatak. 1-5 [doi]
- Thermographic Detection of Tool Wear: A Review on Deep Learning-Based ApproachesBüsra Tan Saatçi, Mustafa Ulas, Turan Gürgenç. 1-5 [doi]
- Edge-Focused Temporal Graph Autoencoders for Anomalous Link Prediction in OT NetworksAlex Howe, Mauricio Papa. 1-6 [doi]
- Advanced Forensic Analysis for Vehicle Speed Estimation: A Two-Video Comparison ApproachChristos Liambas, Athanasios Manios. 1-6 [doi]
- Enhancing Intrusion Detection in Industrial Control Systems: An Adaptive Protocol-Agnostic ApproachJack Nunnelee, Alex Howe, Philip Rahal, Mauricio Papa. 1-6 [doi]
- Enhancing Trust and Security in Learning Management Systems: Addressing Submission Concerns with Timestamp Transparency and Digital SignaturesNatalia A. Bueno Pizarro, Juan Guillermo Lalinde Pulido. 1-5 [doi]
- Securing Blockchain-Based E-Voting Through Shamir's Secret Sharing over EthereumEsma Beydili, Umut Can Çabuk, Gökhan Dalkiliç, Yusuf Öztürk. 1-6 [doi]
- Reconciling Safety and Privacy: A Systematic Review of Moderation in End-to-End Encrypted MessagingChaitanya Rahalkar, Anushka Virgaonkar. 1-7 [doi]
- Automated Static Analysis of Linux ELF Malware: Framework and ApplicationJayanthi Ramamoorthy, Narasimha K. Shashidhar, Cihan Varol. 1-5 [doi]
- Security Assessments of Data Transfer Phase of Adapted EEG System in Learning SystemsAhmet Furkan Aydogan, Cihan Varol, Hamadou Saliah-Hassane. 1-7 [doi]
- Remote Laboratory Security Case Study: Physical and Digital Risks of FPGA and Raspberry Pi FarmsHarry Joseph Vecchio-Ferrer, Elizabeth Marie Jijon, Maria M. Larrondo-Petrie. 1-5 [doi]
- PowerShell Proxy-Aware Intercommunication and ManipulationJean Rosemond Dora, Ladislav Hluchý. 1-5 [doi]
- Internet of Things (IoT) Forensics: Chip-Off ForensicsMunirah Aljuwair, Emad-Ul-Haq Qazi, Tanveer A. Zia. 1-6 [doi]
- Stealth Eye: Behavioral Analysis for Fileless Malware DetectionH. M. H. M. Bandara, K. M. N. Ayeshani, M. M. P. M. Kumari, D. M. S. T. Wijerathna, Kavinga Yapa Abeywardena, Ayesha Wijesooriya. 1-6 [doi]
- Solving the Financial, Operational, and Reputational Impact of Commercial Fleet Collisions: Challenges and Mitigation Strategies Using Data-Driven Decision-Making ProcessThrushna Matharasi, Priyam Ganguly. 1-4 [doi]
- A Digital Forensic Analysis of WhatsApp Artifacts in Windows 11 Operating System Using Microsoft EdgeTimothy Laryea, Anwah Pascal, Tahir M. Khan. 1-6 [doi]
- From TikTok to RedNote: A Comprehensive Mobile Forensic and Security Analysis on AndroidXiao Hu, Mingyang Xie, Akif Ahsen Ozer, Umit Karabiyik. 1-6 [doi]
- Security Threats Mitigation for Internet of Vehicles Using Cryptographic ProtocolsKhurram Shahzad, Muhammad Raheel Raza, Asaf Varol. 1-6 [doi]
- Multi-Stage Attack Traffic Detection Using Self-Supervised LearningNasreddine Abdelli, Abdelkamel Tari, Mohand Tahar Kechadi. 1-6 [doi]
- Almiqanaas T - A Crime Scene Evidence DetectorThangavel Murugan, Fotoon Khalifah Abdullah, Ghalya Salem Mohamed Alshuraiqi Almehrzi, Eiman Mohamed Mohamed Alsereidi, Aisha Aldahmani, Eiman Mubarak Masoud Alahbabi, N. Nasurudeen Ahamed. 1-6 [doi]
- Behavioral and Propagation-Based Analysis of APT Attacks for Effective Attack AttributionMohammed Rauf Ali Khan, Ahmad Almulhem. 1-8 [doi]
- Deep Learning-Based Classification of Software Bugs Using Code Context and AST FeaturesAlpaslan Gökcen, Arda Arsik, Akhan Akbulut, Cagatay Catal. 1-5 [doi]
- Malware Detection in PDF and PE Files Using Machine Learning and Feature SelectionRosemary Uwem Usoroh, Ioana Ghergulescu, Arghir-Nicolae Moldovan. 1-6 [doi]
- Insider Threat Pattern Detection Using Deep Learning to Evaluate Cyber Value at Risk (CVaR)Prashant Vajpayee, Chittal Karuppiah, Gahangir Hossain. 1-5 [doi]
- Forensic Investigations in the Age of AI: Identifying and Analyzing Artifacts from AI-Assisted CrimesAmina Alnaqbi, Meera Alblooshi, Hessa Ali Nasser, Niyat Habtom, Farkhund Iqbal. 1-6 [doi]
- Leveraging Feature Selection and Deep Learning for Accurate Malware and Ransomware Detection in PE FilesRebecca Kipanga Masele, Fadoua Khennou. 1-6 [doi]
- A Comparison of Supervised Learning Models on Distinct Datasets for Malware DetectionMariana Carvalho, Daniel Fernandes, Nuno Lopes, Óscar R. Ribeiro. 1-5 [doi]
- AssessCICA: Assessing and Mitigating Financial Losses from Cyber Attacks with Role of Cyber Insurance in Post-Pandemic EraAsura Akter Sunna, Tanzina Sultana, Naresh Kshetri, Mohammed Majbah Uddin. 1-6 [doi]
- Cloud Service Analysis from the Security Principles PerspectiveOlga Dye, Ebru Celikel Cankaya. 1-6 [doi]
- Retrieval Augmented Anomaly Detection (RAAD): Nimble Model Adjustment Without RetrainingSam Pastoriza, Iman Yousfi, Christopher Redino, Marc Vucovich, Abdul-Rahman, Sal Aguiñaga, Dhruv Nandakumar. 1-6 [doi]
- Keynote Speaker of ISDFS 2025K. C. Choo. 1 [doi]
- Automated Threat Detection in the Dark Web: A Multi-Model NLP ApproachAbhay Kamath, Aditya Joshi, Aditya Sharma, Nikhil R. Shetty, Lenish Pramiee. 1-6 [doi]
- Artificial Intelligence Applications in Education Within the Scope of the National Artificial Intelligence Strategy in TurkeySongül Karabatak, Sevinç Ay, Murat Karabatak. 1-4 [doi]
- Leveraging Large Language Models in Software Testing: A Review of Applications and ChallengesAnil Sezgin, Gürkan Özkan, Esra Cosgun. 1-7 [doi]
- On the Application of Fundamental Clustering Methods to Large Scale Cyber Security Log ClassificationJet Le, Mihai Lazarescu, Sie Teng Soh, Reza Ryan, Peng Cai, Qian Li. 1-6 [doi]
- Anomaly Detection in Metaverse Healthcare for 6G-Enabled Internet of Things: An Approach Based on Feature SelectionOmar Farshad Jeelani. 1-6 [doi]
- Analysis of the SHA Function Selection on the Security of a Digital Signature SchemeManuel Alejandro Cardona-López, Juan Carlos Chimal-Eguía, Víctor Manuel Silva García, Rolando Flores-Carapia. 1-6 [doi]
- Ensuring Privacy in the Labour Market: Towards Full Compliance with LGPD and GDPRHebert de Oliveira Silva, Aldrey Pedrazoli, Sergio Nascimento, Regina Moraes. 1-6 [doi]
- Real-time Practical Analysis of Data Decay in Physical MemoryLuis A. Rivera, James H. Jones. 1-6 [doi]
- A Behavioral Analysis of Ransomware in Active Directory: A Case Study of BlackMatter, Conti, LockBit, and MidnightPrajna Bhandary, Charles Nicholas. 1-6 [doi]
- Multi-Agent Deep Q-Network Based Ant Colony Optimization for Advanced Network Intrusion DetectionAmani Bacha, Farah Barika Ktata, Olfa Belkahla Driss. 1-6 [doi]
- Honeytrap Resilience: A Study of Malware Redirection AwarenessEric Edge, James H. Jones, Kathryn B. Laskey. 1-7 [doi]
- Muffins vs. Chihuahuas Revisited: Exploring Zero-Shot and Few-Shot CLIP-Based Methods for Similar Object ClassificationGordey Danilochkin, Fedir Ensary, Eva Tuba. 1-6 [doi]
- Academic Fraud Detection in Online Exams with DNN's Multilayer ModelBahaddin Erdem, Murat Karabatak. 1-6 [doi]
- Dynamic Threat Detection and Mitigation Using AI-Infused FirewallsAbhinav B. V, Abhirup MVNS, Adithya D. Shetty, Akash Bhat, Clara Kanmani A. 1-5 [doi]
- Protection of 3D Models by QIM Watermarking with Reduced DistortionDavid Shapiro 0008, Victor Fedoseev. 1-5 [doi]
- Unlocking Student Success: Applying Machine Learning for Predicting Student Dropout in Higher EducationMargorie Pérez, Danny Navarrete, Maria G. Baldeon Calisto, Yuvinne Guerrero, André Sarmiento. 1-6 [doi]
- Stroke Prediction on Healthcare Data Using SMOTE and Explainable Machine LearningMd. Zakir Hossain Zamil, Md Raisul Islam, Sajib Debnath, Md Tuhin Mia, Md Anisur Rahman, Arindom Kisor Biswas. 1-6 [doi]
- From Snap to Evidence: Snapchat Footprint on iOSVedant Gupta, Yuting Zhang. 1-6 [doi]
- Gaming Without Harm: AI-Driven Content Moderation to Improve Safety in RobloxArda C. Varol, Larissa T. Coffee. 1-4 [doi]