Abstract is missing.
- Discoverable Hidden Patterns in Water Quality Through AI, LLMs, and Transparent Remote SensingAbdullah Al Noman, Md Tanvir Rahman Tarafder, S. M. Tamim Hossain Rimon, Asif Ahamed, Shahriar Ahmed, Abdullah Al Sakib. 1-6 [doi]
- A Secure Contact Tracing Method Using Blockchain for Criminal InvestigationMizuki Tsuchida, Kazumasa Omote. 1-8 [doi]
- Prompt Engineering Adversarial Attack Against Image Captioning ModelsHiep Vo, Shui Yu 0001, Xi Zheng 0001. 1-7 [doi]
- A Token-Level Adversarial Example Attack Method for Machine Learning Based Malicious URL DetectorsQisheng Chen, Kazumasa Omote. 1-7 [doi]
- Simulation of Pre-Ransomware Attacks on Active DirectoryEn Jie Tan, Kowit Tan, Royce Yu Feng Chong, Xingxing Chen, Yi Ching Tan, Liming Lu, Huaqun Guo. 1-9 [doi]
- A Novel Biometric-Based Multi-Factor Authentication Protocol for EV Charging InfrastructuresAkshitha K. Subran, Sriram Sankaran. 1-7 [doi]
- Cybersecurity Revolution via Large Language Models and Explainable AITaher M. Ghazal, Jamshaid Iqbal Janjua, Walid Abushiba, Munir Ahmad, Anuam Ihsan, Nidal A. Al-Dmour. 1-6 [doi]
- IRIS-SAFE: Privacy-Preserving Biometric AuthenticationDevi Listiyani, Priyanka Singh. 1-7 [doi]
- A Novel Framework for Attack Detection and Localization in Smart CitiesMehdi Houichi, Faouzi Jaïdi, Adel Bouhoula. 1-9 [doi]
- Implementation of Natural Language UAV Control Using OpenAI's ChatGPT in a Simulated University EnvironmentYulduz Muradova, Jennifer Amachree, Louis Henry, Anu G. Bourgeois. 1-5 [doi]
- Spatial Prediction of UAV Position Using Deep LearningMárton Bertalan Limpek, Géza Szabó, László Hévizi, István Gódor. 1-6 [doi]
- Secure Communication for MUM-T: A Blockchain and Lightweight Cryptography FrameworkHalimcan Yasar, Serif Bahtiyar. 1-8 [doi]
- CDCEF: A Cloud-Based Data Volatility & CSP Reliance Eradication FrameworkPankaj Hariom Sharma, Priyanka Singh. 1-6 [doi]
- Security Inspection and Enhancement of a Modern Multi-Factor Authentication ProtocolSwapnoneel Roy, Charlene H. Crawshaw, Debajyoti Mukhopadhyay, Meera Narvekar. 1-6 [doi]
- Building Resilient AI: A Solution to Data and Model Poisoning PreventionGhazaleh Keshavarzkalhori, Cristina Pérez-Solà, Guillermo Navarro-Arribas, Jordi Herrera-Joancomartí. 1-8 [doi]
- Effects of Personal Characteristics on Phishing Awareness, Anti-Phishing Tool Usage, and Phishing Avoidance Behavior: A Structural Equation Modeling ApproachSaleh Mansor Alqahtani, Priyadarsi Nanda. 1-9 [doi]
- Dynamic Network Slicing and Deep Learning Based Intrusion Detection System with Virtual Load Balancing in Edge Enabled SDN/NFV Based 5G NetworksAsad Faraz Khan, Priyadarsi Nanda. 1-10 [doi]
- Comparative Analysis of Intrusion Detection Schemes in Internet of Things(IoT) Based ApplicationsFarag El Zegil, Priyadarsi Nanda, Manoranjan Mohanty, Majed Alzahrani. 1-8 [doi]
- SMAKAP: Secure Mutual Authentication and Key Agreement Protocol for RFID SystemsShayesta Naziri, Xu Wang, Guangsheng Yu, Jian Xu, Sudhir Shrestha, Christy Jie Liang. 1-8 [doi]
- Enhancing LoRaWAN Security: Protection Against Bit Flipping Attacks in IoT NetworksJay Dave, Nikumani Choudhury, Dantu Havishteja, Katuri Revanth. 1-8 [doi]
- Bushfire Severity Prediction Optimization: Feature Combination Study with XGBoost Regression and Satellite-Derived DataPirunthavi Wijikumar, Shouthiri Partheepan, Jahan Hassan, Farzad Sanati, Biplop Rakshit Ray. 1-7 [doi]
- Experimental Study on Impact of Appliance ID-Based Normalization on SimDataset for Anomalous Power Consumption ClassificationRajesh Nayak, C. D. Jaidhar. 1-8 [doi]
- Lightweight Blockchain Prototype for Food Supply Chain ManagementAlexey Rusakov, Naghmeh Moradpoor, Aida Akbarzadeh. 1-8 [doi]
- Enhancing AI-Generated Image Detection with a Novel Approach and Comparative AnalysisStuart Weir, Muhammad Shahbaz Khan, Naghmeh Moradpoor, Jawad Ahmad 0001. 1-7 [doi]
- BERT-LA: Leveraging BERT and AraBERT With Bi-LSTM for Cross-Lingual Sentiment Analysis of English and Arabic TextsWael Jefry, Firas Al-Doghman, Farookh Hussain. 1-10 [doi]
- Enhancing Security and Privacy in Federated Learning for Connected Autonomous Vehicles With Lightweight Blockchain and Binius ZeroKnowledge ProofsNy Hasina Andriambelo, Naghmeh Moradpoor. 1-8 [doi]
- Operational Technologies in Industrial Control System: Cybersecurity Perspectives and Research TrendsHarshit Gupta, Luca D'Agati, Francesco Longo 0001, Antonio Puliafito, Giovanni Merlino. 1-8 [doi]
- Assessing Perceptual Hash Algorithms for Publicly Evaluatable FrameworkYaser Saei, Jafar Tahmoresnezhad, Sima Jafarikhah, Hossein Siadati. 1-8 [doi]
- The Bell-LaPadula (BLP) Enterprise Security Architecture Model vs Inference AttacksDominic Ayamga, Priyadarsi Nanda, Manoranjan Mohanty. 1-8 [doi]
- Human-AI Collaboration and Cyber Security Training: Learning Analytics Opportunities and ChallengesKaie Maennel, Olaf Manuel Maennel. 1-8 [doi]
- Microsegmented Cloud Network Architecture Using Open-Source Tools for a Zero Trust FoundationSunil Arora, John D. Hastings. 1-8 [doi]
- Empirical Analysis of Anomaly Detection Systems for Internet of ThingsShunmika Chidambaram, Bhagya Sony, Nithya Nedungadi, Sriram Sankaran. 1-7 [doi]
- Incident Response Adaptive Metrics FrameworkMuntathar Abid, Priyadarsi Nanda, Manoranjan Mohanty. 1-8 [doi]
- Ransomware Insight AnalyzerXin Lin Gan, Zhi Ren James Tan, Yu En Bernice Goo, Xin Ling Jocelyn Yeo, Vi Shean Lim, Yan Cong Boo, Huaqun Guo. 1-8 [doi]
- Security Situation Awareness PlatformCharisee Zhi Ling Yip, Tee Kiat Chua, Clarabel Jinghui Teo, Jing Rui Goh, Brandon Jia Le Loo, Huaqun Guo, Liming Lu, Kan Chen. 1-8 [doi]
- Mathematical Models of Security Information Systems Based on the Generalized Multiplicative KnapsacksValeriy O. Osipyan, E. T. J. Algharib, Arseniy Zhuck, Kirill I. Litvinov. 1-5 [doi]
- PATCH: Problem-Based Learning Approach for Teaching Cybersecurity and Ethical Hacking in Community CollegesSajal Bhatia, Saaid Elhadad, Irfan Ahmed 0001. 1-9 [doi]
- Demystifying Trajectory Recovery from Ash: An Open-Source Evaluation and EnhancementNicholas D'Silva, Toran Shahi, Øyvind Timian Dokk Husveg, Adith Sanjeeve, Erik Buchholz, Salil S. Kanhere. 1-8 [doi]
- 5G Slice Mutation to Overcome Distributed Denial of Service Attacks Using Reinforcement LearningAmir Javadpour 0001, Forough Ja'fari, Tarik Taleb, Chafika Benzaïd. 1-9 [doi]
- A Zero-Trust Framework Based on Machine Learning for Industrial Internet of ThingsAdel Atieh, Priyadarsi Nanda, Manoranjan Mohanty. 1-8 [doi]
- A Lightweight Hybrid Signcryption Scheme for Smart DevicesLanlan Pan, Ruonan Qiu, Minghui Yang. 1-8 [doi]
- Taxonomy of User-Centric Errors Leading to Cyber Attacks in LoRaWANIndu Parajuli, Biplob Rakshit Ray, Jahan Hassan, Michael Cowling. 1-10 [doi]
- ECG- PPS: Privacy Preserving Disease Diagnosis and Monitoring System for Real-Time ECG SignalsBeyazit Bestami Yuksel, Ayse Yilmazer-Metin. 1-7 [doi]
- FakeFaceDiscriminator: Discrimination of AI-Synthesized Fake FacesXufeng Liu, Quoc Hoan Vu, Priyanka Singh. 1-7 [doi]
- Dilithium-Based Verifiable Timed Signature SchemeErkan Uslu, Oguz Yayla. 1-8 [doi]
- A Novel Key Management Framework for Secure and Scalable Decentralized Identity SystemsMert Yildiz, Serif Bahtiyar. 1-8 [doi]
- Comprehensive Security of SDN Controllers in NFVI-Based 5G NetworkAsad Faraz Khan, Priyadarsi Nanda. 1-10 [doi]
- Critical Behavior Sequence Monitoring for Early Malware DetectionTarun Bisht, Sarath Babu 0003, Virendra Singh. 1-8 [doi]
- Performance Evaluation of Quantum-Secure Symmetric Key AgreementAmin Rois Sinung Nugroho, Muhammad Ikram, Mohamed Ali Kâafar. 1-9 [doi]
- Exploiting the Vulnerabilities in MAVLink Protocol for UAV HijackingFei Du, Jinai Ge, Wen Wang, Yuwen Zou, Sang-Yoon Chang, Wenjun Fan. 1-8 [doi]
- EncPDS: Encrypted Personal Data Stores via Key-Aggregate ID-Based Proxy Re-EncryptionKaisei Kajita, Go Ohtake. 1-8 [doi]
- Contextualized AI for Cyber Defense: An Automated Survey Using LLMsChristoforus Yoga Haryanto, Anne Maria Elvira, Trung Duc Nguyen, Minh Hieu Vu, Yoshiano Hartanto, Emily Lomempow, Arathi Arakala. 1-8 [doi]
- The Recent Trends in Ransomware Detection and Behaviour AnalysisBüsra Çaliskan, Ibrahim Gulatas, H. Hakan Kilinc, Abdul Halim Zaim. 1-8 [doi]
- Enhancing Phishing Resilience in Academia: The Mediating Role of Anti-Phishing Tools on Student Awareness and BehaviorSaleh Mansor Alqahtani, Priyadarsi Nanda. 1-8 [doi]
- Recommendation System Model Ownership Verification via Non-Influential WatermarkingXiaocui Dang, Priyadarsi Nanda, Heng Xu, Haiyu Deng, Manoranjan Mohanty. 1-8 [doi]
- Towards Weaknesses and Attack Patterns Prediction for IoT DevicesCarlos A. Rivera Alvarez, Arash Shaghaghi, Gustavo Batista, Salil S. Kanhere. 1-10 [doi]
- Unsupervised Learning for Insider Threat Prediction: A Behavioral Analysis ApproachRahat Mehmood, Priyanka Singh, Zoe Jeffery. 1-7 [doi]
- Adversarial Attack Vectors Against Near-Real-Time AI xApps in the Open RANAzadeh Arnaz, Justin Lipman, Mehran Abolhasan. 1-9 [doi]
- A Blockchain-Based System for Dynamic Redundancy in IoT CommunicationsLiang Liu, Kazumasa Omote. 1-8 [doi]
- EV-IRP Manager: An Electric Vehicle Incident Response Playbook Manager and Visualizer ToolkitKerem Alpdag, Naghmeh Moradpoor, Ny Hasina Andriambelo, Paul Wooderson, Leandros Maglaras. 1-10 [doi]