• Security Contracts a Property-Based Approach to Support Security Patterns
  • Comparing Phishing Training and Campaign Methods for Mitigating Malicious Emails in Organizations
  • Ethical Design for Data Privacy and User Privacy Awareness in the Metaverse
  • User Re-Authentication via Mouse Movements and Recurrent Neural Networks
  • Analysis of Payload Confidentiality for the IoT/ LPWAN Technology ‘Lora’
  • KAIME: Central Bank Digital Currency with Realistic and Modular Privacy
  • Policy-Driven XACML-Based Architecture for Dynamic Enforcement of Multiparty Computation
  • Desktop Crypto Wallets: A Digital Forensic Investigation and Analysis of Remnants and Traces on end-User Machines
  • Anywhere on Earth: A Look at Regional Characteristics of DRDoS Attacks
  • Robust Image Deepfake Detection with Perceptual Hashing
  • Botnet Detection by Integrating Multiple Machine Learning Models
  • Build a Computationally Efficient Strong Defense Against Adversarial Example Attacks
  • A Categorical Data Approach for Anomaly Detection in WebAssembly Applications
  • Automating IoT Security Standard Testing by Common Security Tools
  • Federated Learning with Differential Privacy and an Untrusted Aggregator
  • A Framework for E2E Audit Trails in System Architectures of Different Enterprise Classes
  • Off-Chaining Approaches for Cost-Efficiency in Threshold-Based Elliptic Curve Systems over Blockchains
  • CPE-Identifier: Automated CPE Identification and CVE Summaries Annotation with Deep Learning and NLP
  • UPSS: A Global, Least-Privileged Storage System with Stronger Security and Better Performance
  • Forgery Resistance of User Authentication Methods Using Location, Wi-Fi and Their Correlation
  • Silicon-Integrated Security Solutions Driving IoT Security
  • Comparing the Effectivity of Planned Cyber Defense Controls in Order to Support the Selection Process
  • Security Analysis of an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map
  • Evaluating the Security and Privacy Risk Postures of Virtual Assistants
  • Banking Malware Detection: Leveraging Federated Learning with Conditional Model Updates and Client Data Heterogeneity
  • Enclave Management Models for Safe Execution of Software Components
  • The Classification and Impact of Cyber Attacks Targeting Critical Service Providers
  • The Role of Heuristics and Biases in Linux Server Administrators’ Information Security Policy Compliance at Healthcare Organizations
  • GPU-Based Brute Force Cryptanalysis of KLEIN
  • Anonymous Multi-Receiver Certificateless Hybrid Signcryption for Broadcast Communication
  • Gradient-Based Clean Label Backdoor Attack to Graph Neural Networks
  • Comparative Analysis of Feature Selection Algorithms for Automated IoT Device Fingerprinting
  • Perceptions of Cyber Security Risk of the Norwegian Advanced Metering Infrastructure
  • Machine Learning-Based Classification of Hardware Trojans in FPGAs Implementing RISC-V Cores
  • A Decentralized Federated Learning Using Reputation
  • An Open-Source Approach to OT Asset Management in Industrial Environments
  • Exploring Errors in Binary-Level CFG Recovery
  • Evaluating the Influence of Multi-Factor Authentication and Recovery Settings on the Security and Accessibility of User Accounts
  • Effectiveness of Malware Incident Management in Security Operations Centres: Trends, Challenges and Research Directions
  • Towards Generalized Diffie-Hellman-esque Key Agreement via Generic Split KEM Construction
  • Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode
  • Security Analysis of an Image Encryption Scheme Based on a New Secure Variant of Hill Cipher and 1D Chaotic Maps
  • ADMIn: Attacks on Dataset, Model and Input: A Threat Model for AI Based Software
  • Vulnerability Information Sharing Platform for Securing Hardware Supply Chains
  • Efficient Secure Computation of Edit Distance on Genomic Data
  • Towards Automated Information Security Governance
  • Feasibility of Random Forest with Fully Homomorphic Encryption Applied to Network Data
  • AnonEmoFace: Emotion Preserving Facial Anonymization
  • Merging Policy and Practice: Crafting Effective Social Engineering Awareness-Raising Policies
  • Pure Multi Key BGV Implementation
  • Preserving Privacy in High-Dimensional Data Publishing
  • Attestation with Constrained Relying Party
  • Implementation and Analysis of Covert Channel Using iBeacon
  • Exploring BERT for Predicting Vulnerability Categories in Device Configurations
  • LSTM Autoencoder-Based Insider Abnormal Behavior Detection Using De-Identified Data
  • Supporting CAN Bus Anomaly Detection with Correlation Data
  • PenGym: Pentesting Training Framework for Reinforcement Learning Agents
  • Cybersecurity-Related Tweet Classification by Explainable Deep Learning
  • ArkThor: Threat Categorization Based on Malware’s C2 Communication
  • APP-CEP: Adaptive Pattern-Level Privacy Protection in Complex Event Processing Systems
  • A Brief Reflection on Trusted Platform Module Support
  • Revolutionizing Board Cyber-Risk Management Using Collaborative Gaming
  • Your Robot Might Be Inadvertently or Deliberately Spying on You: A Critical Analysis of Privacy Practices in the Robotics Industry
  • Differential Privacy for Distributed Traffic Monitoring in Smart Cities
  • RoomKey: Extracting a Volatile Key with Information from the Local WiFi Environment Reconstructable Within a Designated Area
  • EMplifier: Hybrid Electromagnetic Probe for Side Channel and Fault Injection Analysis
  • Performance Evaluation of Polynomial Commitments for Erasure Code Based Information Dispersal
  • A Recommender System to Detect Distributed Denial of Service Attacks with Network and Transport Layer Features
  • Interpretable Android Malware Detection Based on Dynamic Analysis
  • Visual Attention and Privacy Indicators in Android: Insights from Eye Tracking
  • The Status and Management of Web-Related Security at Higher Education Institutions in Poland
  • FeedMeter: Evaluating the Quality of Community-Driven Threat Intelligence
  • Vision Based Malware Classification Using Deep Neural Network with Hybrid Data Augmentation
  • Conceptualising an Anti-Digital Forensics Kill Chain for Smart Homes
  • Security Evaluation of Decision Tree Meets Data Anonymization
  • IoT Device Classification Using Link-Level Features for Traditional Machine Learning and Large Language Models
  • Smart Homes as Digital Ecosystems: Exploring Privacy in IoT Contexts
  • PETRIoT - A Privacy Enhancing Technology Recommendation Framework for IoT Computing
  • An Automated Adaptive Security Framework for Cyber-Physical Systems
  • An Empirical Study of Ransomware Vulnerabilities Descriptions
  • Fuzzing Matter(s): A White Paper for Fuzzing the Matter Protocol
  • Secure Multiparty Computation of the Laplace Mechanism
  • What's Your Purpose? An Approach to Incorporating GDPR Purposes into Requirements Analysis
  • Using ILP to Learn AppArmor Policies
  • Cybersecurity Incident Response Readiness in Organisations
  • The Right Tool for the Job: Contextualization of Cybersecurity Education and Assessment Methods
  • Learning from the Dark Side About How (not) to Engineer Privacy: Analysis of Dark Patterns Taxonomies from an ISO 29100 Perspective
  • Blockchain for Privacy-Preserving Data Distribution in Healthcare
  • The Design and Implementation of a Semantic Web Framework for the Event-Centric Digital Forensics Analysis
  • Detecting eBPF Rootkits Using Virtualization and Memory Forensics
  • Feasibility of Privacy Preserving Minutiae-Based Fingerprint Matching
  • Security, Privacy and the “Human Factor”: Making Sense of the Paradoxes of Security and Privacy Behaviour
  • Smart Home Privacy: A Scoping Review
  • Deep Q-Networks for Imbalanced Multi-Class Malware Classification
  • High Throughput Neural Network for Network Intrusion Detection on FPGAs: An Algorithm-Architecture Interaction
  • Enhancing Cybersecurity Through Comparative Analysis of Deep Learning Models for Anomaly Detection
  • An Improved PUF-Based Privacy-Preserving IoT Protocol for Cloud Storage
  • LAMA: Leakage Abuse Attacks Against Microsoft Always Encrypted
  • DYNAMO: Towards Network Attack Campaign Attribution via Density-Aware Active Learning
  • From Plant to Lab: Industrial Emulation Tools for Real-World Security Testing in Industrial Control Systems
  • Backdoor Attacks During Retraining of Machine Learning Models: A Mitigation Approach
  • On the Implementation of a Lattice-Based DAA for Vanet System
  • HydroLab: A Versatile Hydroelectric Power Lab for Security Research and Education
  • Towards Privacy-Preserving Multi-Cloud Identity Management Using SOLID
  • Evaluating Digital Forensic Readiness: A Honeypot Approach
  • Attribute Threat Analysis and Risk Assessment for ABAC and TBAC Systems
  • Black Sheep Wall: Towards Multiple Vantage Point-Based Information Space Situational Awareness
  • K-Resilient Public Key Authenticated Encryption with Keyword Search
  • Higher Order Leakage Assessment and Neural Network-based Attack on CRYSTALS-Kyber
  • MultiVD: A Transformer-based Multitask Approach for Software Vulnerability Detection
  • Security Analysis for BB84 Key Distillation
  • Verifying Artifact Authenticity with Unclonable Optical Tags
  • High-Speed Pipelined FPGA Implementation of a Robust Steganographic Scheme for Secure Data Communication Systems
  • UPCARE: User Privacy-Preserving Cancer Research Platform
  • Perception of Privacy Tools for Social Media: A Qualitative Analysis Among Japanese
  • An Extended Method for Transmitting Secret Messages in Textual Documents Based on Paragraph Resizing
  • Organizing Records for Retrieval in Multi-Dimensional Range Searchable Encryption
  • The Use of the DWARF Debugging Format for the Identification of Potentially Unwanted Applications (PUAs) in WebAssembly Binaries
  • A Framework for Federated Analysis of Health Data Using Multiparty Homomorphic Encryption
  • Violence Detection: A Serious-Gaming Approach
  • chiku: Efficient Probabilistic Polynomial Approximations Library
  • A Secure and Privacy-Preserving Authentication Scheme with a Zero-Trust Approach to Vehicle Renting in VANETs
  • Fuzzy Vault Security Enhancement Avoid Statistical Biases
  • Linkage Between CVE and ATT&CK with Public Information
  • A Performant Quantum-Resistant KEM for Constrained Hardware: Optimized HQC
  • Characterization of Consensus Correctness in Ripple (XRP) Networks
  • On Privacy of RFID-Based Authentication Protocols
  • Revolutionizing Blockchain Consensus: Towards Deliberative and Unanimous Agreement
  • Automating Compliance for Improving TLS Security Postures: An Assessment of Public Administration Endpoints
  • On the Privacy Afforded by Opaque Identifiers in Traffic Monitoring
  • TI-NERmerger: Semi-Automated Framework for Integrating NER Datasets in Cybersecurity
  • Dvorak: A Browser Credential Dumping Malware
  • Solving Access Control Conflicts in Multi-User Systems
  • A Composition Algebra for Decentralized Enforcement of Access Control Policies with an Application to Vehicular Networks
  • SCWAD: Automated Pentesting of Web Applications
  • Autoencoder for Detecting Malicious Updates in Differentially Private Federated Learning
  • OIPM: Access Control Method to Prevent ID/Session Token Abuse on OpenID Connect
  • Encrypted KNN Implementation on Distributed Edge Device Network
  • InspectorLog: A New Tool for Offline Attack Detection over Web Log Trace Files
  • Lightweight Cryptographic Algorithms: A Position Paper
  • Local Differential Privacy for Data Clustering
  • QPTA: Quantum-Safe Privacy-Preserving Multi-Factor Authentication Scheme for Lightweight Devices
  • Secure Multi-Party Traversal Queries over Federated Graph Databases
  • An Uncertain Reasoning-Based Intrusion Detection System for DoS/DDoS Detection
  • Enhancing Adversarial Defense in Behavioral Authentication Systems Through Random Projections
  • Amun: Securing E-Voting Against Over-the-Shoulder Coercion
  • Improving the Efficiency of Intrusion Detection Systems by Optimizing Rule Deployment Across Multiple IDSs
  • Towards a Cryptographic Model for Wireless Communication
  • Balancing Patient Privacy and Health Data Security: The Role of Compliance in Protected Health Information (PHI) Sharing
  • Utilizing Machine Learning for Optimizing Cybersecurity Spending in Critical Infrastructures
  • DISC: A Dataset for Information Security Classification
  • MATRaCAE: Time-Based Revocable Access Control in the IoT
  • Towards a Secure and Intelligent Access Control Policy Adapter for Big Data Environment
  • Kex-Filtering: A Proactive Approach to Filtering
  • An Efficient Hash Function Construction for Sparse Data
  • Imperceptible QR Watermarks in High-Resolution Videos
  • Code Obfuscation Classification Using Singular Value Decomposition on Grayscale Image Representations
  • Bringing Binary Exploitation at Port 80: Understanding C Vulnerabilities in WebAssembly
  • A Formal Analysis of CIE Level 2 Multi-Factor Authentication via SMS OTP
  • Cache Side-Channel Attacks Through Electromagnetic Emanations of DRAM Accesses
  • Membership Inference Attacks Against Indoor Location Models
  • An ASM-Based Approach for Security Assessment of Ethereum Smart Contracts
  • Enhancing OpenID Connect for Verifiable Credentials with DIDComm
  • Large-Scale Analysis of GitHub and CVEs to Determine Prevalence of SQL Concatenations
  • Spellchecker Analysis for Behavioural Biometric of Typing Errors Scenario
  • QuDPas-FHA: Quantum-Defended Privacy-Preserved Fast Handover Authentication in Space Information Networks
  • A White-Box Watermarking Modulation for Encrypted DNN in Homomorphic Federated Learning
  • The IoT Breaches Your Household Again
  • Classifying Human-Generated and AI-Generated Election Claims in Social Media
  • Toward the Foundation of Digital Identity Theory
  • Enhancing Privacy and Utility in Federated Learning: A Hybrid P2P and Server-Based Approach with Differential Privacy Protection
  • Do You Trust Your Device? Open Challenges in IoT Security Analysis
  • Securing Patient Data in IoT Devices: A Blockchain-NFT Approach for Privacy, Security, and Authentication
  • Leveraging Deep Learning for Intrusion Detection in IoT Through Visualized Network Data
  • Graph-Based Modelling of Maximum Period Property for Nonlinear Feedback Shift Registers
  • Enhancing Privacy in Machine Learning: A Robust Approach for Preventing Attribute Inference Attacks
  • Formal Analysis of C-ITS PKI Protocols
  • Privacy-Preserving Anomaly Detection Through Sampled, Synthetic Data Generation
  • Comparison of Access Control Approaches for Graph-Structured Data
  • BlueDoS: A Novel Approach to Perform and Analyse DoS Attacks on Bluetooth Devices
  • CVE2CWE: Automated Mapping of Software Vulnerabilities to Weaknesses Based on CVE Descriptions
  • Property Inference as a Regression Problem: Attacks and Defense
  • FPGA Implementation of AES-Based on Optimized Dynamic s-Box
  • Simulating SASCA on Keccak: Security Implications for Post-Quantum Cryptographic Schemes
  • Manipulating Prompts and Retrieval-Augmented Generation for LLM Service Providers
  • Open-Source Post-Quantum Encryptor: Design, Implementation and Deployment
  • Safe or Scam? An Empirical Simulation Study on Trust Indicators in Online Shopping
  • Malware Analysis Using Transformer Based Models: An Empirical Study
  • Balancing Act: Navigating the Privacy-Utility Spectrum in Principal Component Analysis
  • Virtually Free Randomisations of NTT in RLWE Cryptosystem to Counteract Side Channel Attack Based on Belief Propagation
  • GAN-based Seed Generation for Efficient Fuzzing
  • Compact Representation of Digital Camera's Fingerprint with Convolutional Autoencoder
  • What Do Customers Demand? Inclusive and Sustainable Entrepreneurial Marketing
  • Applications of Artificial Intelligence in Sustainability Assessment and Risk Management in European Banking
  • Safeguarding Downside Risk in Portfolio Insurance: Navigating Swiss Stock Market Regimes with Options, Trading Signals, and Financial Products
  • Applying Text Analytics Methodology to Analyze Project Reports
  • Internal Audit: Friend or Foe of Innovation in an Organization: Case of Czech Banking Sector
  • Stock Market Forecasting Using Machine Learning Models Through Volatility-Driven Trading Strategies
  • The Impacts of Environmental Context on Technology Adoption and Their Invariance Analysis in Chinese Supply Chains
  • The Recruiting Process as an Attractiveness Factor: How Do Companies Manage to Position Themselves Competitively as Employers?
  • Modeling Organizational Culture, Transformational Leadership, Motivation, Job Satisfaction: Muhammadiyah Aisyiyah College’s Nursing Lecturer
  • Developing a Framework for City Brand-Image Promotion via Social Media Communication
  • Leveraging Multimodal Large Language Models and Natural Language Processing Techniques for Comprehensive ESG Risk Score Prediction
  • Generative AI Risk Management in Digital Economy
  • Research on Incentive Mechanism of Enterprise Personnel's Self-Determined Salary
  • ChatGPT in Higher Education: A Risk Management Approach to Academic Integrity, Critical Thinking, and Workforce Readiness
  • Prediction of Turbidity and TDS in Dam Reservoir from Multispectral UAV-Drone and Sentinel-2 Image Sensors Using Machine Learning Models
  • Derivation of Critical Infrastructure Accessibility Index Using GIS-MCDA and Network Analysis: Case Study of Sarajevo
  • A Water-Energy-Food Nexus Approach to Assess Land Use Trade-Offs in Small Islands
  • Revitalizing Walkability Scores: A New Assessment Based on Accessibility
  • Seasonal Water Quality Assessment Using Remote Sensing in Al Rafisah Dam, United Arab Emirates
  • Dynamic Exposure Visualization of Air Quality Data with Augmented Reality
  • Automated Georeferencing and Extraction of Building Footprints from Remotely Sensed Imagery using Deep Learning
  • Regime Analysis with Numerical Modelling of Wave Dynamics and Determination of Potential Flood Zones in Chancay Bay, Peru
  • Mapping Habitats by Integrating Multi-Source Land Use Land Cover Databases: Application to Red Fox in Urban Area
  • Geodetic Fundamentals in the Development of a Voxel Model for the Subsoil of the City of Sevilla (Spain)
  • Studying Seismic Events via Satellite Interferometry for the Territory of the Balkan Peninsula
  • The Contribution of Drones to the Monitoring of Rubble-Mound Breakwaters
  • Evaluating the Urban Parks Cooling Extent Using Satellite Observations: An Alternative Approach
  • Semantic Segmentation of Paddy Parcels Using Deep Neural Networks Based on DeepLabV3
  • Assessment of Census and Remote Sensing Data to Monitor Irrigated Agriculture in Mexico
  • UAV-Based Analysis of Armour Rock Granulometry and Hydraulic Stability
  • Semantic Segmentation of Crops via Hyperspectral PRISMA Satellite Images
  • Assessing the Risks of Enhancing the Current Europe’s ADA Web Map with Ground Movement Classification Data
  • Improved Analysis of EGMS Data for Displacement Monitoring: The Case Study of Regina Montis Regalis Basilica in Vicoforte, Italy
  • What Will Virtual Reality Bring to the Qualification of Visual Walkability in Cities?
  • Estimation of Height of Building Using High Resolution Satellite Image
  • An Augmented Reality System Architecture for Flood Management
  • Oil Spill Detection Using Remote Sensing and GIS in Eastern Coast of United Arab Emirates