Abstract is missing.
- Support Tool Selection in Digital Forensics TrainingSabrina Friedl, Ludwig Englbrecht, Fabian Böhm, Günther Pernul. 3-21 [doi]
- Listen to the Music: Evaluating the Use of Music in Audio Based AuthenticationMichael Tsai, Vimal Kumar. 22-37 [doi]
- A Hybrid Secure Two-Party Protocol for Vertical Federated LearningWenti Yang, Zhaoyang He, Yalei Li, Haiyan Zhang, Zhitao Guan. 38-51 [doi]
- Detecting Unknown Vulnerabilities in Smart Contracts with Multi-Label Classification Model Using CNN-BiLSTMWanyi Gu, Guojun Wang 0001, Peiqiang Li, Xubin Li, Guangxin Zhai, Xiangbin Li, Mingfei Chen. 52-63 [doi]
- CATS: A Serious Game in Industry Towards Stronger Cloud SecurityTiange Zhao, Ulrike Lechner, Maria Pinto-Albuquerque, Ece Ata, Tiago Gasiba. 64-82 [doi]
- Automated Vulnerability Detection in Source Code Using Quantum Natural Language ProcessingMst. Shapna Akter, Hossain Shahriar, Zakirul Alam Bhuiya. 83-102 [doi]
- System Call Processing Using Lightweight NLP for IoT Behavioral Malware DetectionJohn Carter, Spiros Mancoridis, Malvin Nkomo, Steven Weber 0001, Kapil R. Dandekar. 103-115 [doi]
- Vulnerability Detection with Representation LearningZhiqiang Wang, Sulong Meng, Ying Chen. 116-128 [doi]
- Assessing Vulnerability from Its DescriptionZijing Zhang, Vimal Kumar, Michael Mayo, Albert Bifet. 129-143 [doi]
- Malware Traffic Classification Based on GAN and BP Neural NetworksYun Duan, Laifu Wang, Dongxin Liu, Boren Deng, Yunfan Tian. 144-160 [doi]
- Source Code Vulnerability Detection Using Deep Learning Algorithms for Industrial ApplicationsAkram Louati, Tiago Gasiba. 161-178 [doi]
- Detecting Unknown Vulnerabilities in Smart Contracts with Binary Classification Model Using Machine LearningXiangbin Li, Xiaofei Xing, Guojun Wang, Peiqiang Li, Xiangyong Liu. 179-192 [doi]
- Prototyping the IDS Security Components in the Context of Industry 4.0 - A Textile and Clothing Industry Case StudyNuno Torres, Ana Chaves, César Toscano, Pedro Pinto. 193-206 [doi]
- An Aspect-Based Semi-supervised Generative Model for Online Review Spam DetectionShitao Wang, Wenjun Jiang, Shuhong Chen. 207-219 [doi]
- Hierarchical Policies of Subgoals for Safe Deep Reinforcement LearningFumin Yu, Feng Gao, Yao Yuan, Xiaofei Xing, Yinglong Dai. 220-232 [doi]
- Improved DeepLabV3+ based Railway Track Extraction to Enhance Railway Transportation SafetyYanbin Weng, Zuochuang Li, Xiaobin Huang, Xiahu Chen. 233-247 [doi]
- Analysis of Techniques for Detection and Removal of Zero-Day Attacks (ZDA)Khalid Hamid, Muhammad Waseem Iqbal 0001, Muhammad Aqeel, Xiangyong Liu, Muhammad Arif. 248-262 [doi]
- Android Malware Detection: A Literature ReviewAhmed Sabbah, Adel Taweel, Samer Zein. 263-278 [doi]
- Threat Modeling in Cloud Computing - A Literature ReviewMohammed Kharma, Adel Taweel. 279-291 [doi]
- A New Signal Packing Algorithm for CAN-FD with Security ConsiderationBo Zheng, Yong Xie. 292-303 [doi]
- An Adversarial Sample Defense Method Based on Saliency InformationShuqi Liu, Yufeng Zhuang, Xinyu Ma, Hongping Wang, Danni Cao. 304-318 [doi]
- BlockLearning: A Modular Framework for Blockchain-Based Vertical Federated LearningHenrique Dias, Nirvana Meratnia. 319-333 [doi]
- An Interactive Query Differential Privacy Protection Model Based on Big Data AnalysisGuanghui Feng, Wenyin Yang, Tao Peng 0011, Xiaofei Xing, Shuhong Chen, Yuting Li. 337-351 [doi]
- Decentralized Collaborative Filtering Algorithm with Privacy Preserving for Recommendation in Mobile Edge ComputingXiangyong Liu, Pengfei Yin, Pin Liu, Shuhong Chen. 352-365 [doi]
- Encryption Proxies in a Confidential Computing EnvironmentMohamad Jamil Al Bouhairi, Mostakim Mullick, Marvin Wolf, Ivan Gudymenko, Sebastian Clauss. 366-379 [doi]
- FedTA: Locally-Differential Federated Learning with Top-k Mechanism and Adam OptimizationYuting Li, Guojun Wang, Tao Peng 0011, Guanghui Feng. 380-391 [doi]
- Differentially Private Clustering Algorithm for Mixed DataKai Cheng, Liandong Chen, HuiFeng Yang, Dan Luo, Shuai Yuan, Zhitao Guan. 392-405 [doi]
- Impact of Reenactment Programs on Young GenerationAnam Fatima, Muhammad Waseem Iqbal 0001, Muhammad Aqeel, Toqir A. Rana, Shuhong Chen, Muhammad Arif 0009. 406-422 [doi]
- Sensor Cloud Data Privacy Protection Model Based on Collaborative Deep LearningXiaoqian Ran, Yufeng Zhuang, Hongping Wang, Danni Cao, Yulian Cao, Wenjuan Gu. 423-435 [doi]
- An Improved Cuckoo Search Algorithm and Its Application in Function OptimizationSonglv Feng, Cuina Cheng, Liping Mo. 439-455 [doi]
- Empirical Likelihood for PLSIM with Missing Response Variables and Error-Prone CovariatesXin Qi, Hongling Chen, Qin Liu. 456-470 [doi]
- High-Speed Anonymous Device Authentication Without Asymmetric Cryptography in the Internet-of-ThingsLi Duan, Yong Li. 471-484 [doi]
- A-VMD: Adaptive Variational Mode Decomposition Scheme for Noise Reduction in Sensor-CloudZhenru Huo, Guoqing Jia, Weidong Fang, Wei Chen 0036, Wuxiong Zhang. 485-496 [doi]
- A Thermal-Aware Scheduling Algorithm for Reducing Thermal Risks in DAG-Based Applications in Cyber-Physical SystemsIrfan Ali, Muhammad Naeem Shehzad, Qaisar Bashir, Haroon Elahi, Muhammad Naeem Awais, Oana Geman, Pin Liu. 497-508 [doi]
- Garbage Recognition Algorithm Based on Self-attention Mechanism and Deep SortingHaiyang Huang, Falong Xiao, Xiaofang Zhang, Wanting Yan, Fumin Liu, Yuezhong Wu. 511-522 [doi]
- Approaches for Zero Trust Adoption Based upon Organization Security LevelMuntaha Alawneh, Imad M. Abbadi. 523-533 [doi]
- Multi-Mobile Agent Security by Design Itinerary Planning Approach in Wireless Sensor NetworkSaad Khan, Tariq A. A. Alsboui, Richard Hill, Hussain Al-Aqrabi. 534-544 [doi]
- On the Variability in the Application and Measurement of Supervised Machine Learning in Cyber SecurityOmar Alshaikh, Simon Parkinson, Saad Khan 0001. 545-555 [doi]