Security Contracts a Property-Based Approach to Support Security Patterns
Comparing Phishing Training and Campaign Methods for Mitigating Malicious Emails in Organizations
Ethical Design for Data Privacy and User Privacy Awareness in the Metaverse
User Re-Authentication via Mouse Movements and Recurrent Neural Networks
Analysis of Payload Confidentiality for the IoT/ LPWAN Technology ‘Lora’
KAIME: Central Bank Digital Currency with Realistic and Modular Privacy
Policy-Driven XACML-Based Architecture for Dynamic Enforcement of Multiparty Computation
Desktop Crypto Wallets: A Digital Forensic Investigation and Analysis of Remnants and Traces on end-User Machines
Anywhere on Earth: A Look at Regional Characteristics of DRDoS Attacks
Robust Image Deepfake Detection with Perceptual Hashing
Botnet Detection by Integrating Multiple Machine Learning Models
Build a Computationally Efficient Strong Defense Against Adversarial Example Attacks
A Categorical Data Approach for Anomaly Detection in WebAssembly Applications
Automating IoT Security Standard Testing by Common Security Tools
Federated Learning with Differential Privacy and an Untrusted Aggregator
A Framework for E2E Audit Trails in System Architectures of Different Enterprise Classes
Off-Chaining Approaches for Cost-Efficiency in Threshold-Based Elliptic Curve Systems over Blockchains
CPE-Identifier: Automated CPE Identification and CVE Summaries Annotation with Deep Learning and NLP
UPSS: A Global, Least-Privileged Storage System with Stronger Security and Better Performance
Forgery Resistance of User Authentication Methods Using Location, Wi-Fi and Their Correlation
Silicon-Integrated Security Solutions Driving IoT Security
Comparing the Effectivity of Planned Cyber Defense Controls in Order to Support the Selection Process
Security Analysis of an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map
Evaluating the Security and Privacy Risk Postures of Virtual Assistants
Banking Malware Detection: Leveraging Federated Learning with Conditional Model Updates and Client Data Heterogeneity
Enclave Management Models for Safe Execution of Software Components
The Classification and Impact of Cyber Attacks Targeting Critical Service Providers
The Role of Heuristics and Biases in Linux Server Administrators’ Information Security Policy Compliance at Healthcare Organizations
GPU-Based Brute Force Cryptanalysis of KLEIN
Anonymous Multi-Receiver Certificateless Hybrid Signcryption for Broadcast Communication
Gradient-Based Clean Label Backdoor Attack to Graph Neural Networks
Comparative Analysis of Feature Selection Algorithms for Automated IoT Device Fingerprinting
Perceptions of Cyber Security Risk of the Norwegian Advanced Metering Infrastructure
Machine Learning-Based Classification of Hardware Trojans in FPGAs Implementing RISC-V Cores
A Decentralized Federated Learning Using Reputation
An Open-Source Approach to OT Asset Management in Industrial Environments
Exploring Errors in Binary-Level CFG Recovery
Evaluating the Influence of Multi-Factor Authentication and Recovery Settings on the Security and Accessibility of User Accounts
Effectiveness of Malware Incident Management in Security Operations Centres: Trends, Challenges and Research Directions
Towards Generalized Diffie-Hellman-esque Key Agreement via Generic Split KEM Construction
Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode
Security Analysis of an Image Encryption Scheme Based on a New Secure Variant of Hill Cipher and 1D Chaotic Maps
ADMIn: Attacks on Dataset, Model and Input: A Threat Model for AI Based Software
Vulnerability Information Sharing Platform for Securing Hardware Supply Chains
Efficient Secure Computation of Edit Distance on Genomic Data
Towards Automated Information Security Governance
Feasibility of Random Forest with Fully Homomorphic Encryption Applied to Network Data
AnonEmoFace: Emotion Preserving Facial Anonymization
Merging Policy and Practice: Crafting Effective Social Engineering Awareness-Raising Policies
Pure Multi Key BGV Implementation
Preserving Privacy in High-Dimensional Data Publishing
Attestation with Constrained Relying Party
Implementation and Analysis of Covert Channel Using iBeacon
Exploring BERT for Predicting Vulnerability Categories in Device Configurations
LSTM Autoencoder-Based Insider Abnormal Behavior Detection Using De-Identified Data
Supporting CAN Bus Anomaly Detection with Correlation Data
PenGym: Pentesting Training Framework for Reinforcement Learning Agents
Cybersecurity-Related Tweet Classification by Explainable Deep Learning
ArkThor: Threat Categorization Based on Malware’s C2 Communication
APP-CEP: Adaptive Pattern-Level Privacy Protection in Complex Event Processing Systems
A Brief Reflection on Trusted Platform Module Support
Revolutionizing Board Cyber-Risk Management Using Collaborative Gaming
Your Robot Might Be Inadvertently or Deliberately Spying on You: A Critical Analysis of Privacy Practices in the Robotics Industry
Differential Privacy for Distributed Traffic Monitoring in Smart Cities
RoomKey: Extracting a Volatile Key with Information from the Local WiFi Environment Reconstructable Within a Designated Area
EMplifier: Hybrid Electromagnetic Probe for Side Channel and Fault Injection Analysis
Performance Evaluation of Polynomial Commitments for Erasure Code Based Information Dispersal
A Recommender System to Detect Distributed Denial of Service Attacks with Network and Transport Layer Features
Interpretable Android Malware Detection Based on Dynamic Analysis
Visual Attention and Privacy Indicators in Android: Insights from Eye Tracking
The Status and Management of Web-Related Security at Higher Education Institutions in Poland
FeedMeter: Evaluating the Quality of Community-Driven Threat Intelligence
Vision Based Malware Classification Using Deep Neural Network with Hybrid Data Augmentation
Conceptualising an Anti-Digital Forensics Kill Chain for Smart Homes
Security Evaluation of Decision Tree Meets Data Anonymization
IoT Device Classification Using Link-Level Features for Traditional Machine Learning and Large Language Models
Smart Homes as Digital Ecosystems: Exploring Privacy in IoT Contexts
PETRIoT - A Privacy Enhancing Technology Recommendation Framework for IoT Computing
An Automated Adaptive Security Framework for Cyber-Physical Systems
An Empirical Study of Ransomware Vulnerabilities Descriptions
Fuzzing Matter(s): A White Paper for Fuzzing the Matter Protocol
Secure Multiparty Computation of the Laplace Mechanism
What's Your Purpose? An Approach to Incorporating GDPR Purposes into Requirements Analysis
Using ILP to Learn AppArmor Policies
Cybersecurity Incident Response Readiness in Organisations
The Right Tool for the Job: Contextualization of Cybersecurity Education and Assessment Methods
Learning from the Dark Side About How (not) to Engineer Privacy: Analysis of Dark Patterns Taxonomies from an ISO 29100 Perspective
Blockchain for Privacy-Preserving Data Distribution in Healthcare
The Design and Implementation of a Semantic Web Framework for the Event-Centric Digital Forensics Analysis
Detecting eBPF Rootkits Using Virtualization and Memory Forensics
Feasibility of Privacy Preserving Minutiae-Based Fingerprint Matching
Security, Privacy and the “Human Factor”: Making Sense of the Paradoxes of Security and Privacy Behaviour
Smart Home Privacy: A Scoping Review
Deep Q-Networks for Imbalanced Multi-Class Malware Classification
High Throughput Neural Network for Network Intrusion Detection on FPGAs: An Algorithm-Architecture Interaction
Enhancing Cybersecurity Through Comparative Analysis of Deep Learning Models for Anomaly Detection
An Improved PUF-Based Privacy-Preserving IoT Protocol for Cloud Storage
LAMA: Leakage Abuse Attacks Against Microsoft Always Encrypted
DYNAMO: Towards Network Attack Campaign Attribution via Density-Aware Active Learning
From Plant to Lab: Industrial Emulation Tools for Real-World Security Testing in Industrial Control Systems
Backdoor Attacks During Retraining of Machine Learning Models: A Mitigation Approach
On the Implementation of a Lattice-Based DAA for Vanet System
HydroLab: A Versatile Hydroelectric Power Lab for Security Research and Education
Towards Privacy-Preserving Multi-Cloud Identity Management Using SOLID
Evaluating Digital Forensic Readiness: A Honeypot Approach
Attribute Threat Analysis and Risk Assessment for ABAC and TBAC Systems
Black Sheep Wall: Towards Multiple Vantage Point-Based Information Space Situational Awareness
K-Resilient Public Key Authenticated Encryption with Keyword Search
Higher Order Leakage Assessment and Neural Network-based Attack on CRYSTALS-Kyber
MultiVD: A Transformer-based Multitask Approach for Software Vulnerability Detection
Security Analysis for BB84 Key Distillation
Verifying Artifact Authenticity with Unclonable Optical Tags
High-Speed Pipelined FPGA Implementation of a Robust Steganographic Scheme for Secure Data Communication Systems
UPCARE: User Privacy-Preserving Cancer Research Platform
Perception of Privacy Tools for Social Media: A Qualitative Analysis Among Japanese
An Extended Method for Transmitting Secret Messages in Textual Documents Based on Paragraph Resizing
Organizing Records for Retrieval in Multi-Dimensional Range Searchable Encryption
The Use of the DWARF Debugging Format for the Identification of Potentially Unwanted Applications (PUAs) in WebAssembly Binaries
A Framework for Federated Analysis of Health Data Using Multiparty Homomorphic Encryption
Violence Detection: A Serious-Gaming Approach
chiku: Efficient Probabilistic Polynomial Approximations Library
A Secure and Privacy-Preserving Authentication Scheme with a Zero-Trust Approach to Vehicle Renting in VANETs
Fuzzy Vault Security Enhancement Avoid Statistical Biases
Linkage Between CVE and ATT&CK with Public Information
A Performant Quantum-Resistant KEM for Constrained Hardware: Optimized HQC
Characterization of Consensus Correctness in Ripple (XRP) Networks
On Privacy of RFID-Based Authentication Protocols
Revolutionizing Blockchain Consensus: Towards Deliberative and Unanimous Agreement
Automating Compliance for Improving TLS Security Postures: An Assessment of Public Administration Endpoints
On the Privacy Afforded by Opaque Identifiers in Traffic Monitoring
TI-NERmerger: Semi-Automated Framework for Integrating NER Datasets in Cybersecurity
Dvorak: A Browser Credential Dumping Malware
Solving Access Control Conflicts in Multi-User Systems
A Composition Algebra for Decentralized Enforcement of Access Control Policies with an Application to Vehicular Networks
SCWAD: Automated Pentesting of Web Applications
Autoencoder for Detecting Malicious Updates in Differentially Private Federated Learning
OIPM: Access Control Method to Prevent ID/Session Token Abuse on OpenID Connect
Encrypted KNN Implementation on Distributed Edge Device Network
InspectorLog: A New Tool for Offline Attack Detection over Web Log Trace Files
Lightweight Cryptographic Algorithms: A Position Paper
Local Differential Privacy for Data Clustering
QPTA: Quantum-Safe Privacy-Preserving Multi-Factor Authentication Scheme for Lightweight Devices
Secure Multi-Party Traversal Queries over Federated Graph Databases
An Uncertain Reasoning-Based Intrusion Detection System for DoS/DDoS Detection
Enhancing Adversarial Defense in Behavioral Authentication Systems Through Random Projections
Amun: Securing E-Voting Against Over-the-Shoulder Coercion
Improving the Efficiency of Intrusion Detection Systems by Optimizing Rule Deployment Across Multiple IDSs
Towards a Cryptographic Model for Wireless Communication
Balancing Patient Privacy and Health Data Security: The Role of Compliance in Protected Health Information (PHI) Sharing
Utilizing Machine Learning for Optimizing Cybersecurity Spending in Critical Infrastructures
DISC: A Dataset for Information Security Classification
MATRaCAE: Time-Based Revocable Access Control in the IoT
Towards a Secure and Intelligent Access Control Policy Adapter for Big Data Environment
Kex-Filtering: A Proactive Approach to Filtering
An Efficient Hash Function Construction for Sparse Data
Imperceptible QR Watermarks in High-Resolution Videos
Code Obfuscation Classification Using Singular Value Decomposition on Grayscale Image Representations
Bringing Binary Exploitation at Port 80: Understanding C Vulnerabilities in WebAssembly
A Formal Analysis of CIE Level 2 Multi-Factor Authentication via SMS OTP
Cache Side-Channel Attacks Through Electromagnetic Emanations of DRAM Accesses
Membership Inference Attacks Against Indoor Location Models
An ASM-Based Approach for Security Assessment of Ethereum Smart Contracts
Enhancing OpenID Connect for Verifiable Credentials with DIDComm
Large-Scale Analysis of GitHub and CVEs to Determine Prevalence of SQL Concatenations
Spellchecker Analysis for Behavioural Biometric of Typing Errors Scenario
QuDPas-FHA: Quantum-Defended Privacy-Preserved Fast Handover Authentication in Space Information Networks
A White-Box Watermarking Modulation for Encrypted DNN in Homomorphic Federated Learning
The IoT Breaches Your Household Again
Classifying Human-Generated and AI-Generated Election Claims in Social Media
Toward the Foundation of Digital Identity Theory
Enhancing Privacy and Utility in Federated Learning: A Hybrid P2P and Server-Based Approach with Differential Privacy Protection
Do You Trust Your Device? Open Challenges in IoT Security Analysis
Securing Patient Data in IoT Devices: A Blockchain-NFT Approach for Privacy, Security, and Authentication
Leveraging Deep Learning for Intrusion Detection in IoT Through Visualized Network Data
Graph-Based Modelling of Maximum Period Property for Nonlinear Feedback Shift Registers
Enhancing Privacy in Machine Learning: A Robust Approach for Preventing Attribute Inference Attacks
Formal Analysis of C-ITS PKI Protocols
Privacy-Preserving Anomaly Detection Through Sampled, Synthetic Data Generation
Comparison of Access Control Approaches for Graph-Structured Data
BlueDoS: A Novel Approach to Perform and Analyse DoS Attacks on Bluetooth Devices
CVE2CWE: Automated Mapping of Software Vulnerabilities to Weaknesses Based on CVE Descriptions
Property Inference as a Regression Problem: Attacks and Defense
FPGA Implementation of AES-Based on Optimized Dynamic s-Box
Simulating SASCA on Keccak: Security Implications for Post-Quantum Cryptographic Schemes
Manipulating Prompts and Retrieval-Augmented Generation for LLM Service Providers
Open-Source Post-Quantum Encryptor: Design, Implementation and Deployment
Safe or Scam? An Empirical Simulation Study on Trust Indicators in Online Shopping
Malware Analysis Using Transformer Based Models: An Empirical Study
Balancing Act: Navigating the Privacy-Utility Spectrum in Principal Component Analysis
Virtually Free Randomisations of NTT in RLWE Cryptosystem to Counteract Side Channel Attack Based on Belief Propagation
GAN-based Seed Generation for Efficient Fuzzing
Compact Representation of Digital Camera's Fingerprint with Convolutional Autoencoder
What Do Customers Demand? Inclusive and Sustainable Entrepreneurial Marketing
Applications of Artificial Intelligence in Sustainability Assessment and Risk Management in European Banking
Safeguarding Downside Risk in Portfolio Insurance: Navigating Swiss Stock Market Regimes with Options, Trading Signals, and Financial Products
Applying Text Analytics Methodology to Analyze Project Reports
Internal Audit: Friend or Foe of Innovation in an Organization: Case of Czech Banking Sector
Stock Market Forecasting Using Machine Learning Models Through Volatility-Driven Trading Strategies
The Impacts of Environmental Context on Technology Adoption and Their Invariance Analysis in Chinese Supply Chains
The Recruiting Process as an Attractiveness Factor: How Do Companies Manage to Position Themselves Competitively as Employers?
Modeling Organizational Culture, Transformational Leadership, Motivation, Job Satisfaction: Muhammadiyah Aisyiyah College’s Nursing Lecturer
Developing a Framework for City Brand-Image Promotion via Social Media Communication
Leveraging Multimodal Large Language Models and Natural Language Processing Techniques for Comprehensive ESG Risk Score Prediction
Generative AI Risk Management in Digital Economy
Research on Incentive Mechanism of Enterprise Personnel's Self-Determined Salary
ChatGPT in Higher Education: A Risk Management Approach to Academic Integrity, Critical Thinking, and Workforce Readiness
Prediction of Turbidity and TDS in Dam Reservoir from Multispectral UAV-Drone and Sentinel-2 Image Sensors Using Machine Learning Models
Derivation of Critical Infrastructure Accessibility Index Using GIS-MCDA and Network Analysis: Case Study of Sarajevo
A Water-Energy-Food Nexus Approach to Assess Land Use Trade-Offs in Small Islands
Revitalizing Walkability Scores: A New Assessment Based on Accessibility
Seasonal Water Quality Assessment Using Remote Sensing in Al Rafisah Dam, United Arab Emirates
Dynamic Exposure Visualization of Air Quality Data with Augmented Reality
Automated Georeferencing and Extraction of Building Footprints from Remotely Sensed Imagery using Deep Learning
Regime Analysis with Numerical Modelling of Wave Dynamics and Determination of Potential Flood Zones in Chancay Bay, Peru
Mapping Habitats by Integrating Multi-Source Land Use Land Cover Databases: Application to Red Fox in Urban Area
Geodetic Fundamentals in the Development of a Voxel Model for the Subsoil of the City of Sevilla (Spain)
Studying Seismic Events via Satellite Interferometry for the Territory of the Balkan Peninsula
The Contribution of Drones to the Monitoring of Rubble-Mound Breakwaters
Evaluating the Urban Parks Cooling Extent Using Satellite Observations: An Alternative Approach
Semantic Segmentation of Paddy Parcels Using Deep Neural Networks Based on DeepLabV3
Assessment of Census and Remote Sensing Data to Monitor Irrigated Agriculture in Mexico
UAV-Based Analysis of Armour Rock Granulometry and Hydraulic Stability
Semantic Segmentation of Crops via Hyperspectral PRISMA Satellite Images
Assessing the Risks of Enhancing the Current Europe’s ADA Web Map with Ground Movement Classification Data
Improved Analysis of EGMS Data for Displacement Monitoring: The Case Study of Regina Montis Regalis Basilica in Vicoforte, Italy
What Will Virtual Reality Bring to the Qualification of Visual Walkability in Cities?
Estimation of Height of Building Using High Resolution Satellite Image
An Augmented Reality System Architecture for Flood Management
Oil Spill Detection Using Remote Sensing and GIS in Eastern Coast of United Arab Emirates