Abstract is missing.
- Automated Microsegmentation for Lateral Movement Prevention in Industrial Internet of Things (IIoT)Murshedul Arifeen, Andrei Petrovski 0001, Sergei Petrovski. 1-6 [doi]
- A Textual Clean-Label Backdoor Attack Strategy against Spam DetectionFahri Anil Yerlikaya, Serif Bahtiyar. 1-8 [doi]
- Generative adversarial attacks on motion-based continuous authentication schemesNarges Pourshahrokhi, Max Smith-Creasey, Mona Ghassemian, Samaneh Kouchaki. 1-6 [doi]
- Single-Server Delegation of Ring Multiplications from Quasilinear-time ClientsGiovanni Di Crescenzo, Matluba Khodjaeva, Vladimir Shpilrain, Delaram Kahrobaei, Rajesh Krishnan. 1-8 [doi]
- On the Number of Arithmetic Operations in NTT-based Polynomial Multiplication in Kyber and Dilithium CryptosystemsMurat Burhan Ilter, Nese Koçak, Erkan Uslu, Oguz Yayla, Nergiz Yuca. 1-7 [doi]
- Situational Control of a Computer Network Security System in Conditions of Cyber AttacksIgor V. Kotenko, Igor Saenko, Oleg Lauta, Mikhail Karpov. 1-8 [doi]
- Real-World Quantum-Resistant IPsecDaniel Herzinger, Stefan-Lukas Gazdag, Daniel Loebenberger. 1-8 [doi]
- Towards Security Decision Support for large-scale Heterogeneous Distributed Information SystemsIvan Murenin, Elena Doynikova, Igor V. Kotenko. 1-8 [doi]
- Comparative Study of Malware Detection Techniques for Industrial Control SystemsDeborah Reid, Ian Harris, Andrei Petrovski 0001. 1-6 [doi]
- Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed LedgersHisham Ali, Pavlos Papadopoulos, Jawad Ahmad 0001, Nikolaos Pitropakis, Zakwan Jaroucheh, William J. Buchanan. 1-6 [doi]
- VNWTS: A Virtual Water Chlorination Process for Cybersecurity Analysis of Industrial Control SystemsAndres Robles-Durazno, Naghmeh Moradpoor, James McWhinnie, Jorge Porcel-Bustamante. 1-7 [doi]
- Towards OS-Independent Memory Images Analyzing: Using Paging Structures in Memory ForensicsTruong-An Tran-Quoc, Chi Huynh-Minh, Anh Duy Tran. 1-8 [doi]
- An Improved Range Proof with Base-3 ConstructionEsra Günsay, Cansu Betin Onur, Murat Cenk. 1-6 [doi]
- Smart Connected Aircraft: Towards Security, Privacy, and Ethical HackingMd Jobair Hossain Faruk, Paul Miner, Ryan Coughlan, Mohammad Masum, Hossain Shahriar, Victor Clincy, Coskun Cetinkaya. 1-5 [doi]
- Using IOTA as an Inter-Vehicular Trust Mechanism in Autonomous VehiclesOwen Cutajar, Naghmeh Moradpoor, Zakwan Jaroucheh. 1-4 [doi]
- Improving Intrusion Detection Through Training Data AugmentationUneneibotejit Otokwala, Andrei Petrovski 0001, Harsha K. Kalutarage. 1-8 [doi]
- Android Malware Family Classification: What Works - API Calls, Permissions or API Packages?Saurabh Kumar, Debadatta Mishra, Sandeep Kumar Shukla. 1-8 [doi]
- Cut It: Deauthentication Attack on BluetoothKarim Lounis. 1-8 [doi]
- Privacy Interpretation of Behaviour-based Anomaly Detection ApproachesMuhammad Imran Khan 0001, Simon N. Foley, Barry O'Sullivan. 1-7 [doi]
- PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier MatchingWill Abramson, William J. Buchanan, Sarwar Sayeed, Nikolaos Pitropakis, Owen Lo. 1-8 [doi]
- RADON: Robust Autoencoder for Unsupervised Anomaly DetectionNaji Najari, Samuel Berlemont, Grégoire Lefebvre, Stefan Duffner, Christophe Garcia. 1-8 [doi]
- OCIDS: An Online CNN-Based Network Intrusion Detection System for DDoS Attacks with IoT BotnetsErim Aydin, Serif Bahtiyar. 1-8 [doi]
- Anomaly Detection in Cyber-Physical Systems: Reconstruction of a Prediction Error Feature SpaceNuno Oliveira 0008, Norberto Sousa, Jorge Oliveira 0002, Isabel Praça. 1-5 [doi]
- Investigating operative cybersecurity awareness in air traffic controlEspen Nystad, John Eidar Simensen, Christian Raspotnig. 1-8 [doi]
- Development of the algorithm to ensure the protection of confidential data in cloud medical information systemLiudmila Babenko, Alexander Shumilin, Dmitry Alekseev. 1-4 [doi]
- Blockchain-based Platform for Secure Sharing and Validation of Vaccination CertificatesMwrwan Abubakar, Pádraig McCarron, Zakwan Jaroucheh, Ahmed Yassin Al-Dubai, Bill Buchanan 0001. 1-8 [doi]
- Min-max Training: Adversarially Robust Learning Models for Network Intrusion Detection SystemsSam Grierson, Craig Thomson, Pavlos Papadopoulos, Bill Buchanan 0001. 1-8 [doi]