Abstract is missing.
- EGO-6: Enhancing Geofencing Security Systems with Optimal Deployment of 6G TRPsAlireza Famili, Angelos Stavrou, Haining Wang, Jung-Min Jerry Park. 1-8 [doi]
- OFMCDM/IRF: A Phishing Website Detection Model based on Optimized Fuzzy Multi-Criteria Decision-Making and Improved Random ForestMd Abdullah Al Ahasan, Mengjun Hu, Nashid Shahriar. 1-8 [doi]
- Multivariate Time Series Anomaly Detection with Deep Learning Models Leveraging Inter-Variable RelationshipsChangMin Seong, Dongjun Lim, Jiho Jang, Jonghoon Lee, Jong Geun Park, Yun-Gyung Cheong. 1-8 [doi]
- A Curriculum Framework for Autonomous Network Defense using Multi-agent Reinforcement LearningRobert G. Campbell, Magdalini Eirinaki, Younghee Park. 1-8 [doi]
- Lightweight and Effective Website Fingerprinting Over Encrypted DNSYong Shao, Kenneth Hernandez, Kia Yang, Eric Chan-Tin, Mohammed Abuhamad. 1-8 [doi]
- Autonomous Lending Organization on Ethereum with Credit ScoringThomas H. Austin, Katerina Potika, Chris Pollett. 1-8 [doi]
- Investigation and Countermeasure toward Unintentional Access to Docker ContainerYueyang Li, Luyi Li, Ruxue Luo, Yuzhen Chen, Arijet Sarker, Sang-Yoon Chang, Wenjun Fan. 1-6 [doi]
- Guard Cache: Creating False Cache Hits and Misses To Mitigate Side-Channel AttacksFernando Mosquera, Krishna Kavi, Gayatri Mehta, Lizy K. John. 1-8 [doi]
- Anomaly Detection in Embedded Devices Through Hardware IntrospectionDavid Llanio Reyes, Alexander Perez-Pons, Rogelio Bofill Dean. 1-7 [doi]
- WebTracker: Real Webbrowsing BehaviorsDaisy Reyes, Eno Dynowski, Taryn Chovan, John Mikos, Eric Chan-Tin, Mohammed Abuhamad, Shelia Kennison. 1-8 [doi]
- Malware Detection through Contextualized Vector EmbeddingsVinay Pandya, Fabio Di Troia. 1-7 [doi]
- Privacy-Preserving Trust Management For Vehicular Communications and Federated LearningSangHyun Byun, Arijet Sarker, Ken Lew, Jugal Kalita, Sang-Yoon Chang. 1-8 [doi]
- BlockNIC: SmartNIC assisted BlockchainEish Kapoor, Gavin Jampani, Sean Choi. 1-8 [doi]
- Trustworthy of Implantable Medical Devices using ECG BiometricNima Karimian, Sara Tehranipoor, Thomas Lyp. 1-6 [doi]
- HoneyContainer: Container-based Webshell Command Injection Defending and BacktrackingKuan-Chien Wang, Wei-Jun Cheng, Jie Zhang, Min-Te Sun, Kazuya Sakai, Wei-Shinn Ku. 1-8 [doi]