| Author |
Session |
Start page |
Title |
| A A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Abid, Muntathar |
S2.3.4 |
172 |
Incident Response Adaptive Metrics Framework |
| Abolhasan, Mehran |
S1.4.3 |
187 |
Adversarial Attack Vectors Against Near-Real-Time AI xApps in the Open RAN |
| Ahmad, Jawad |
S1.3.2 |
120 |
Enhancing AI-Generated Image Detection With a Novel Approach and Comparative Analysis |
| Ahmed, Irfan |
S1.7.1 |
364 |
PATCH: Problem-Based Learning Approach for Teaching Cybersecurity and Ethical Hacking in Community Colleges |
| Akbarzadeh, Aida |
S2.6.2 |
340 |
Lightweight Blockchain Prototype for Food Supply Chain Management |
| AL-Doghman, Faris |
S1.4.4 |
196 |
Leveraging BERT and AraBERT With Bi-LSTM and Attention for Cross-Lingual Sentiment Analysis |
| Algarib, Eman |
S2.3.3 |
167 |
Mathematical Models of Security Information Systems Based on the Generalized Multiplicative Knapsacks |
| Alpdag, Kerem |
S2.7.3 |
405 |
EV-IRP Manager: An Electric Vehicle Incident Response Playbook Manager and Visualizer Toolkit |
| Alqahtani, Saleh |
S1.3.4 |
135 |
Enhancing Phishing Resilience in Academia: The Mediating Role of Anti-Phishing Tools on Student Awareness and Behavior |
| S1.3.5 |
143 |
Effects of Personal Characteristics on Phishing Awareness, Anti-Phishing Tool Usage, and Phishing Avoidance Behavior: A Structural Equation Modeling Approach |
| Alzahrani, Majed |
S1.6.2 |
306 |
Comparative Analysis of Intrusion Detection Schemes in Internet of Things(IoT) Based Applications |
| Amachree, Jennifer |
D2.2.3 |
52 |
Implementation of Natural Language UAV Control Using OpenAI's ChatGPT in a Simulated University Environment |
| Andriambelo, Ny |
S2.6.3 |
348 |
Enhancing Security and Privacy in Federated Learning for Connected Autonomous Vehicles With Lightweight Blockchain and Binius Zero-Knowledge Proofs |
| S2.7.3 |
405 |
EV-IRP Manager: An Electric Vehicle Incident Response Playbook Manager and Visualizer Toolkit |
| Arakala, Arathi |
S1.5.2 |
245 |
Contextualized AI for Cyber Defense: An Automated Survey Using LLMs |
| Arnaz, Azadeh |
S1.4.3 |
187 |
Adversarial Attack Vectors Against Near-Real-Time AI xApps in the Open RAN |
| Arora, Sunil |
S1.8.3 |
438 |
Microsegmented Cloud Network Architecture Using Open-Source Tools for a Zero Trust Foundation |
| Atieh, Adel |
S1.2.3 |
72 |
A Zero-Trust Framework Based on Machine Learning for Industrial Internet of Things |
| Ayamga, Dominic |
S2.5.2 |
274 |
The Bell-LaPadula (BLP) Enterprise Security Architecture Model Vs Inference Attacks |
| B A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Babu, Sarath |
S2.4.4 |
229 |
Critical Behavior Sequence Monitoring for Early Malware Detection |
| Bahtiyar, Serif |
S1.1.4 |
31 |
A Novel Key Management Framework for Secure and Scalable Decentralized Identity Systems |
| S2.6.4 |
356 |
Secure Communication for MUM-T: a Blockchain and Lightweight Cryptography Framework |
| Batista, Gustavo |
S1.6.4 |
322 |
Towards Weaknesses and Attack Patterns Prediction for IoT Devices |
| Benzaid, Chafika |
S1.2.2 |
63 |
5G Slice Mutation to Overcome Distributed Denial of Service Attacks Using Reinforcement Learning |
| Bhatia, Sajal |
S1.7.1 |
364 |
PATCH: Problem-Based Learning Approach for Teaching Cybersecurity and Ethical Hacking in Community Colleges |
| Bisht, Tarun |
S2.4.4 |
229 |
Critical Behavior Sequence Monitoring for Early Malware Detection |
| Boo, Yan Cong |
S1.7.4 |
389 |
Ransomware Insight Analyzer |
| Bourgeois, Anu |
D2.2.3 |
52 |
Implementation of Natural Language UAV Control Using OpenAI's ChatGPT in a Simulated University Environment |
| Buchholz, Erik |
S2.3.2 |
159 |
Demystifying Trajectory Recovery From Ash: An Open-Source Evaluation and Enhancement |
| C A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Caliskan, Busra |
S1.8.1 |
423 |
The Recent Trends in Ransomware Detection and Behaviour Analysis |
| CD, Jaidhar |
S1.3.3 |
127 |
Experimental Study on Impact of Appliance ID-Based Normalization on SimDataset for Anomalous Power Consumption Classification |
| Chang, Sang-Yoon |
S2.8.2 |
460 |
Exploiting the Vulnerabilities in MAVLink Protocol for UAV Hijacking |
| Chen, Kan |
S1.7.3 |
381 |
Security Situation Awareness Platform |
| Chen, Qisheng |
S1.3.1 |
113 |
A Token-Level Adversarial Example Attack Method for Machine Learning Based Malicious URL Detectors |
| Chen, Xingxing |
S2.5.1 |
265 |
Simulation of Pre-Ransomware Attacks on Active Directory |
| Chidambaram, Shunmika |
S1.8.2 |
431 |
Empirical Analysis of Anomaly Detection Systems for Internet of Things |
| Chong, Royce Yu Feng |
S2.5.1 |
265 |
Simulation of Pre-Ransomware Attacks on Active Directory |
| Choudhury, Nikumani |
S1.6.1 |
298 |
Enhancing LoRaWAN Security: Protection Against Bit Flipping Attacks in IoT Networks |
| Chua, Tee Kiat |
S1.7.3 |
381 |
Security Situation Awareness Platform |
| Cowling, Michael |
S1.1.1 |
1 |
Taxonomy of User-Centric Errors Leading to Cyber Attacks in LoRaWAN |
| Crawshaw, Charlene |
S2.8.3 |
468 |
Security Inspection and Enhancement of a Modern Multi-Factor Authentication Protocol |
| D A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| D'Agati, Luca |
S2.7.4 |
415 |
Operational Technologies in Industrial Control System: Cybersecurity Perspectives and Research Trends |
| D'Silva, Nicholas |
S2.3.2 |
159 |
Demystifying Trajectory Recovery From Ash: An Open-Source Evaluation and Enhancement |
| Dang, Xiaocui |
S2.4.3 |
221 |
Recommendation System Model Ownership Verification via Non-Influential Watermarking |
| Dave, Jay |
S1.6.1 |
298 |
Enhancing LoRaWAN Security: Protection Against Bit Flipping Attacks in IoT Networks |
| Deng, Haiyu |
S2.4.3 |
221 |
Recommendation System Model Ownership Verification via Non-Influential Watermarking |
| Du, Fei |
S2.8.2 |
460 |
Exploiting the Vulnerabilities in MAVLink Protocol for UAV Hijacking |
| E A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| El Zegil, Farag |
S1.6.2 |
306 |
Comparative Analysis of Intrusion Detection Schemes in Internet of Things(IoT) Based Applications |
| Elhadad, Saaid |
S1.7.1 |
364 |
PATCH: Problem-Based Learning Approach for Teaching Cybersecurity and Ethical Hacking in Community Colleges |
| Elvira, Anne |
S1.5.2 |
245 |
Contextualized AI for Cyber Defense: An Automated Survey Using LLMs |
| F A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Fan, Wenjun |
S2.8.2 |
460 |
Exploiting the Vulnerabilities in MAVLink Protocol for UAV Hijacking |
| G A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Gan, Xin Lin |
S1.7.4 |
389 |
Ransomware Insight Analyzer |
| Ge, Jinai |
S2.8.2 |
460 |
Exploiting the Vulnerabilities in MAVLink Protocol for UAV Hijacking |
| Gódor, István |
D2.2.1 |
39 |
Spatial Prediction of UAV Position Using Deep Learning |
| Goh, Jing Rui |
S1.7.3 |
381 |
Security Situation Awareness Platform |
| Goo, Yu En Bernice |
S1.7.4 |
389 |
Ransomware Insight Analyzer |
| Gülataş, İbrahim |
S1.8.1 |
423 |
The Recent Trends in Ransomware Detection and Behaviour Analysis |
| Guo, Huaqun |
S2.5.1 |
265 |
Simulation of Pre-Ransomware Attacks on Active Directory |
| S1.7.3 |
381 |
Security Situation Awareness Platform |
| S1.7.4 |
389 |
Ransomware Insight Analyzer |
| Gupta, Harshit |
S2.7.4 |
415 |
Operational Technologies in Industrial Control System: Cybersecurity Perspectives and Research Trends |
| H A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Hartanto, Yoshiano |
S1.5.2 |
245 |
Contextualized AI for Cyber Defense: An Automated Survey Using LLMs |
| Haryanto, Christoforus Yoga |
S1.5.2 |
245 |
Contextualized AI for Cyber Defense: An Automated Survey Using LLMs |
| Hassan, Jahan |
S1.1.1 |
1 |
Taxonomy of User-Centric Errors Leading to Cyber Attacks in LoRaWAN |
| D2.2.2 |
45 |
Bushfire Severity Prediction Optimization: Feature Combination Study With XGBoost Regression and Satellite-Derived Data |
| Hastings, John |
S1.8.3 |
438 |
Microsegmented Cloud Network Architecture Using Open-Source Tools for a Zero Trust Foundation |
| Havishteja, Dantu |
S1.6.1 |
298 |
Enhancing LoRaWAN Security: Protection Against Bit Flipping Attacks in IoT Networks |
| Henry, Louis |
D2.2.3 |
52 |
Implementation of Natural Language UAV Control Using OpenAI's ChatGPT in a Simulated University Environment |
| Herrera-Joancomarti, Jordi |
S1.5.1 |
237 |
Building Resilient AI: A Solution to Data and Model Poisoning Prevention |
| Hévizi, László |
D2.2.1 |
39 |
Spatial Prediction of UAV Position Using Deep Learning |
| Houichi, Mehdi |
S1.2.4 |
80 |
A Novel Framework for Attack Detection and Localization in Smart Cities |
| Hussain, Farookh |
S1.4.4 |
196 |
Leveraging BERT and AraBERT With Bi-LSTM and Attention for Cross-Lingual Sentiment Analysis |
| Husveg, Øyvind |
S2.3.2 |
159 |
Demystifying Trajectory Recovery From Ash: An Open-Source Evaluation and Enhancement |
| I A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Ikram, Muhammad |
S2.5.3 |
282 |
Performance Evaluation of Quantum-Secure Symmetric Key Agreement |
| J A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Ja'fari, Forough |
S1.2.2 |
63 |
5G Slice Mutation to Overcome Distributed Denial of Service Attacks Using Reinforcement Learning |
| Jafarikhah, Sima |
S2.2.2 |
97 |
Assessing Perceptual Hash Algorithms for Publicly Evaluatable Framework |
| Janjua, Jamshaid Iqbal |
S1.5.3 |
253 |
Cybersecurity Revolution via Large Language Models and Explainable AI |
| S1.5.4 |
259 |
Discoverable Hidden Patterns in Water Quality Through AI, LLMs, and Transparent Remote Sensing |
| Javadpour, Amir |
S1.2.2 |
63 |
5G Slice Mutation to Overcome Distributed Denial of Service Attacks Using Reinforcement Learning |
| Jeffrey, Zoe |
S2.4.2 |
214 |
Unsupervised Learning for Insider Threat Prediction: A Behavioral Analysis Approach |
| Jefry, Wael |
S1.4.4 |
196 |
Leveraging BERT and AraBERT With Bi-LSTM and Attention for Cross-Lingual Sentiment Analysis |
| K A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| K, K |
S1.5.4 |
259 |
Discoverable Hidden Patterns in Water Quality Through AI, LLMs, and Transparent Remote Sensing |
| Kaafar, Mohamed Ali |
S2.5.3 |
282 |
Performance Evaluation of Quantum-Secure Symmetric Key Agreement |
| Kajita, Kaisei |
S2.4.1 |
206 |
EncPDS: Encrypted Personal Data Stores via Key-Aggregate ID-Based Proxy Re-Encryption |
| Kanhere, Salil |
S2.3.2 |
159 |
Demystifying Trajectory Recovery From Ash: An Open-Source Evaluation and Enhancement |
| S1.6.4 |
322 |
Towards Weaknesses and Attack Patterns Prediction for IoT Devices |
| Keshavarzkalhori, Ghazaleh |
S1.5.1 |
237 |
Building Resilient AI: A Solution to Data and Model Poisoning Prevention |
| Khan, Asad |
S1.1.2 |
11 |
Comprehensive Security of SDN Controllers in NFVI-BASED 5G Network |
| S1.1.3 |
21 |
Dynamic Network Slicing and Deep Learning Based Intrusion Detection System With Virtual Load Balancing in Edge Enabled SDN/NFV Based 5G Networks |
| Khan, Muhammad Shahbaz |
S1.3.2 |
120 |
Enhancing AI-Generated Image Detection With a Novel Approach and Comparative Analysis |
| Kilinc, H. Hakan |
S1.8.1 |
423 |
The Recent Trends in Ransomware Detection and Behaviour Analysis |
| L A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Liang, Christy Jie |
S2.2.1 |
89 |
SMAKAP: Secure Mutual Authentication and Key Agreement Protocol for RFID Systems |
| Lim, Vi Shean |
S1.7.4 |
389 |
Ransomware Insight Analyzer |
| Limpek, Márton |
D2.2.1 |
39 |
Spatial Prediction of UAV Position Using Deep Learning |
| Lipman, Justin |
S1.4.3 |
187 |
Adversarial Attack Vectors Against Near-Real-Time AI xApps in the Open RAN |
| Listiyani, Devi |
S2.5.4 |
291 |
IRIS-SAFE: Privacy-Preserving Biometric Authentication |
| Litvinov, Kirill |
S2.3.3 |
167 |
Mathematical Models of Security Information Systems Based on the Generalized Multiplicative Knapsacks |
| Liu, Liang |
S2.6.1 |
332 |
A Blockchain-Based System for Dynamic Redundancy in IoT Communications |
| Liu, Xufeng |
S1.8.4 |
446 |
FakeFaceDiscriminator: Discrimination of AI-Synthesized Fake Faces |
| Lomempow, Emily |
S1.5.2 |
245 |
Contextualized AI for Cyber Defense: An Automated Survey Using LLMs |
| Longo, Francesco |
S2.7.4 |
415 |
Operational Technologies in Industrial Control System: Cybersecurity Perspectives and Research Trends |
| Loo, Brandon Jia Le |
S1.7.3 |
381 |
Security Situation Awareness Platform |
| Lu, Liming |
S2.5.1 |
265 |
Simulation of Pre-Ransomware Attacks on Active Directory |
| S1.7.3 |
381 |
Security Situation Awareness Platform |
| M A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Maennel, Kaie |
S1.7.2 |
373 |
Human-AI Collaboration and Cyber Security Training: Learning Analytics Opportunities and Challenges |
| Maennel, Olaf |
S1.7.2 |
373 |
Human-AI Collaboration and Cyber Security Training: Learning Analytics Opportunities and Challenges |
| Maglaras, Leandros |
S2.7.3 |
405 |
EV-IRP Manager: An Electric Vehicle Incident Response Playbook Manager and Visualizer Toolkit |
| Mehmood, Rahat |
S2.4.2 |
214 |
Unsupervised Learning for Insider Threat Prediction: A Behavioral Analysis Approach |
| Merlino, Giovanni |
S2.7.4 |
415 |
Operational Technologies in Industrial Control System: Cybersecurity Perspectives and Research Trends |
| Mohanty, Manoranjan |
S1.2.3 |
72 |
A Zero-Trust Framework Based on Machine Learning for Industrial Internet of Things |
| S2.3.4 |
172 |
Incident Response Adaptive Metrics Framework |
| S2.4.3 |
221 |
Recommendation System Model Ownership Verification via Non-Influential Watermarking |
| S2.5.2 |
274 |
The Bell-LaPadula (BLP) Enterprise Security Architecture Model Vs Inference Attacks |
| S1.6.2 |
306 |
Comparative Analysis of Intrusion Detection Schemes in Internet of Things(IoT) Based Applications |
| Moradpoor, Naghmeh |
S1.3.2 |
120 |
Enhancing AI-Generated Image Detection With a Novel Approach and Comparative Analysis |
| S2.6.2 |
340 |
Lightweight Blockchain Prototype for Food Supply Chain Management |
| S2.6.3 |
348 |
Enhancing Security and Privacy in Federated Learning for Connected Autonomous Vehicles With Lightweight Blockchain and Binius Zero-Knowledge Proofs |
| S2.7.3 |
405 |
EV-IRP Manager: An Electric Vehicle Incident Response Playbook Manager and Visualizer Toolkit |
| Mukhopadhyay, Debajyoti |
S2.8.3 |
468 |
Security Inspection and Enhancement of a Modern Multi-Factor Authentication Protocol |
| Muradova, Yulduz |
D2.2.3 |
52 |
Implementation of Natural Language UAV Control Using OpenAI's ChatGPT in a Simulated University Environment |
| N A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Nanda, Priyadarsi |
S1.1.2 |
11 |
Comprehensive Security of SDN Controllers in NFVI-BASED 5G Network |
| S1.1.3 |
21 |
Dynamic Network Slicing and Deep Learning Based Intrusion Detection System With Virtual Load Balancing in Edge Enabled SDN/NFV Based 5G Networks |
| S1.2.3 |
72 |
A Zero-Trust Framework Based on Machine Learning for Industrial Internet of Things |
| S1.3.4 |
135 |
Enhancing Phishing Resilience in Academia: The Mediating Role of Anti-Phishing Tools on Student Awareness and Behavior |
| S1.3.5 |
143 |
Effects of Personal Characteristics on Phishing Awareness, Anti-Phishing Tool Usage, and Phishing Avoidance Behavior: A Structural Equation Modeling Approach |
| S2.3.4 |
172 |
Incident Response Adaptive Metrics Framework |
| S2.4.3 |
221 |
Recommendation System Model Ownership Verification via Non-Influential Watermarking |
| S2.5.2 |
274 |
The Bell-LaPadula (BLP) Enterprise Security Architecture Model Vs Inference Attacks |
| S1.6.2 |
306 |
Comparative Analysis of Intrusion Detection Schemes in Internet of Things(IoT) Based Applications |
| Narvekar, Meera |
S2.8.3 |
468 |
Security Inspection and Enhancement of a Modern Multi-Factor Authentication Protocol |
| Navarro-Arribas, Guillermo |
S1.5.1 |
237 |
Building Resilient AI: A Solution to Data and Model Poisoning Prevention |
| Nayak, Rajesh |
S1.3.3 |
127 |
Experimental Study on Impact of Appliance ID-Based Normalization on SimDataset for Anomalous Power Consumption Classification |
| Naziri, Shayesta |
S2.2.1 |
89 |
SMAKAP: Secure Mutual Authentication and Key Agreement Protocol for RFID Systems |
| Nedungadi, Nithya |
S1.8.2 |
431 |
Empirical Analysis of Anomaly Detection Systems for Internet of Things |
| Nguyen, Trung |
S1.5.2 |
245 |
Contextualized AI for Cyber Defense: An Automated Survey Using LLMs |
| Nugroho, Amin Rois Sinung |
S2.5.3 |
282 |
Performance Evaluation of Quantum-Secure Symmetric Key Agreement |
| O A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Ohtake, Go |
S2.4.1 |
206 |
EncPDS: Encrypted Personal Data Stores via Key-Aggregate ID-Based Proxy Re-Encryption |
| Omote, Kazumasa |
S2.2.4 |
105 |
A Secure Contact Tracing Method Using Blockchain for Criminal Investigation |
| S1.3.1 |
113 |
A Token-Level Adversarial Example Attack Method for Machine Learning Based Malicious URL Detectors |
| S2.6.1 |
332 |
A Blockchain-Based System for Dynamic Redundancy in IoT Communications |
| Osipyan, Valeriy |
S2.3.3 |
167 |
Mathematical Models of Security Information Systems Based on the Generalized Multiplicative Knapsacks |
| P A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Pan, Lanlan |
S1.6.3 |
314 |
A Lightweight Hybrid Signcryption Scheme for Smart Devices |
| Parajuli, Indu |
S1.1.1 |
1 |
Taxonomy of User-Centric Errors Leading to Cyber Attacks in LoRaWAN |
| Partheepan, Shouthiri |
D2.2.2 |
45 |
Bushfire Severity Prediction Optimization: Feature Combination Study With XGBoost Regression and Satellite-Derived Data |
| Pérez-Solà, Cristina |
S1.5.1 |
237 |
Building Resilient AI: A Solution to Data and Model Poisoning Prevention |
| Puliafito, Antonio |
S2.7.4 |
415 |
Operational Technologies in Industrial Control System: Cybersecurity Perspectives and Research Trends |
| Q A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Qiu, Ruonan |
S1.6.3 |
314 |
A Lightweight Hybrid Signcryption Scheme for Smart Devices |
| R A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Ray, Biplob |
S1.1.1 |
1 |
Taxonomy of User-Centric Errors Leading to Cyber Attacks in LoRaWAN |
| D2.2.2 |
45 |
Bushfire Severity Prediction Optimization: Feature Combination Study With XGBoost Regression and Satellite-Derived Data |
| Revanth, Katuri |
S1.6.1 |
298 |
Enhancing LoRaWAN Security: Protection Against Bit Flipping Attacks in IoT Networks |
| Rivera A, Carlos |
S1.6.4 |
322 |
Towards Weaknesses and Attack Patterns Prediction for IoT Devices |
| Roy, Swapnoneel |
S2.8.3 |
468 |
Security Inspection and Enhancement of a Modern Multi-Factor Authentication Protocol |
| Rusakov, Alexey |
S2.6.2 |
340 |
Lightweight Blockchain Prototype for Food Supply Chain Management |
| S A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Saei, Yaser |
S2.2.2 |
97 |
Assessing Perceptual Hash Algorithms for Publicly Evaluatable Framework |
| Sanati, Farzad |
D2.2.2 |
45 |
Bushfire Severity Prediction Optimization: Feature Combination Study With XGBoost Regression and Satellite-Derived Data |
| Sanjeeve, Adith |
S2.3.2 |
159 |
Demystifying Trajectory Recovery From Ash: An Open-Source Evaluation and Enhancement |
| Sankaran, Sriram |
S1.8.2 |
431 |
Empirical Analysis of Anomaly Detection Systems for Internet of Things |
| S2.8.1 |
453 |
A Novel Biometric-Based Multi-Factor Authentication Protocol for EV Charging Infrastructures |
| Shaghaghi, Arash |
S1.6.4 |
322 |
Towards Weaknesses and Attack Patterns Prediction for IoT Devices |
| Shahi, Toran |
S2.3.2 |
159 |
Demystifying Trajectory Recovery From Ash: An Open-Source Evaluation and Enhancement |
| Sharma, Pankaj Hariom |
S1.2.1 |
57 |
CDCEF: A Cloud-Based Data Volatility & CSP Reliance Eradication Framework |
| Shrestha, Sudhir |
S2.2.1 |
89 |
SMAKAP: Secure Mutual Authentication and Key Agreement Protocol for RFID Systems |
| Siadati, Hossein |
S2.2.2 |
97 |
Assessing Perceptual Hash Algorithms for Publicly Evaluatable Framework |
| Singh, Priyanka |
S1.2.1 |
57 |
CDCEF: A Cloud-Based Data Volatility & CSP Reliance Eradication Framework |
| S2.4.2 |
214 |
Unsupervised Learning for Insider Threat Prediction: A Behavioral Analysis Approach |
| S2.5.4 |
291 |
IRIS-SAFE: Privacy-Preserving Biometric Authentication |
| S1.8.4 |
446 |
FakeFaceDiscriminator: Discrimination of AI-Synthesized Fake Faces |
| Singh, Virendra |
S2.4.4 |
229 |
Critical Behavior Sequence Monitoring for Early Malware Detection |
| Sony, Bhagya |
S1.8.2 |
431 |
Empirical Analysis of Anomaly Detection Systems for Internet of Things |
| Subran, Akshitha |
S2.8.1 |
453 |
A Novel Biometric-Based Multi-Factor Authentication Protocol for EV Charging Infrastructures |
| Szabó, Géza |
D2.2.1 |
39 |
Spatial Prediction of UAV Position Using Deep Learning |
| T A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Tahmoresnezhad, Jafar |
S2.2.2 |
97 |
Assessing Perceptual Hash Algorithms for Publicly Evaluatable Framework |
| Taleb, Tarik |
S1.2.2 |
63 |
5G Slice Mutation to Overcome Distributed Denial of Service Attacks Using Reinforcement Learning |
| Tan, En Jie |
S2.5.1 |
265 |
Simulation of Pre-Ransomware Attacks on Active Directory |
| Tan, Kowit |
S2.5.1 |
265 |
Simulation of Pre-Ransomware Attacks on Active Directory |
| Tan, Yi Ching |
S2.5.1 |
265 |
Simulation of Pre-Ransomware Attacks on Active Directory |
| Tan, Zhi Ren James |
S1.7.4 |
389 |
Ransomware Insight Analyzer |
| Teo, Clarabel Jinghui |
S1.7.3 |
381 |
Security Situation Awareness Platform |
| Tsuchida, Mizuki |
S2.2.4 |
105 |
A Secure Contact Tracing Method Using Blockchain for Criminal Investigation |
| U A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Uslu, Erkan |
S2.7.2 |
397 |
Dilithium-Based Verifiable Timed Signature Scheme |
| V A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Vo, Hiep |
S1.4.2 |
180 |
Prompt Engineering Adversarial Attack Against Image Captioning Models |
| Vu, Hoan |
S1.8.4 |
446 |
FakeFaceDiscriminator: Discrimination of AI-Synthesized Fake Faces |
| Vu, Minh |
S1.5.2 |
245 |
Contextualized AI for Cyber Defense: An Automated Survey Using LLMs |
| W A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Wang, Wen |
S2.8.2 |
460 |
Exploiting the Vulnerabilities in MAVLink Protocol for UAV Hijacking |
| Wang, Xu |
S2.2.1 |
89 |
SMAKAP: Secure Mutual Authentication and Key Agreement Protocol for RFID Systems |
| Weir, Stuart |
S1.3.2 |
120 |
Enhancing AI-Generated Image Detection With a Novel Approach and Comparative Analysis |
| Wijikumar, Pirunthavi |
D2.2.2 |
45 |
Bushfire Severity Prediction Optimization: Feature Combination Study With XGBoost Regression and Satellite-Derived Data |
| Wooderson, Paul |
S2.7.3 |
405 |
EV-IRP Manager: An Electric Vehicle Incident Response Playbook Manager and Visualizer Toolkit |
| X A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Xu, Heng |
S2.4.3 |
221 |
Recommendation System Model Ownership Verification via Non-Influential Watermarking |
| Xu, Jian |
S2.2.1 |
89 |
SMAKAP: Secure Mutual Authentication and Key Agreement Protocol for RFID Systems |
| Y A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Yang, Minghui |
S1.6.3 |
314 |
A Lightweight Hybrid Signcryption Scheme for Smart Devices |
| Yaşar, Halimcan |
S2.6.4 |
356 |
Secure Communication for MUM-T: a Blockchain and Lightweight Cryptography Framework |
| Yayla, Oğuz |
S2.7.2 |
397 |
Dilithium-Based Verifiable Timed Signature Scheme |
| Yeo, Xin Ling Jocelyn |
S1.7.4 |
389 |
Ransomware Insight Analyzer |
| Yip, Charisee Zhi Ling |
S1.7.3 |
381 |
Security Situation Awareness Platform |
| Yıldız, Mert |
S1.1.4 |
31 |
A Novel Key Management Framework for Secure and Scalable Decentralized Identity Systems |
| Yılmazer-Metin, Ayşe |
S2.3.1 |
152 |
ECG-PPS: Privacy Preserving Disease Diagnosis and Monitoring System for Real-Time ECG Signals |
| Yu, Guangsheng |
S2.2.1 |
89 |
SMAKAP: Secure Mutual Authentication and Key Agreement Protocol for RFID Systems |
| Yu, Shui |
S1.4.2 |
180 |
Prompt Engineering Adversarial Attack Against Image Captioning Models |
| Yuksel, Beyazit |
S2.3.1 |
152 |
ECG-PPS: Privacy Preserving Disease Diagnosis and Monitoring System for Real-Time ECG Signals |
| Z A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Zaim, A.Halim |
S1.8.1 |
423 |
The Recent Trends in Ransomware Detection and Behaviour Analysis |
| Zheng, Xi |
S1.4.2 |
180 |
Prompt Engineering Adversarial Attack Against Image Captioning Models |
| Zhuck, Arseniy |
S2.3.3 |
167 |
Mathematical Models of Security Information Systems Based on the Generalized Multiplicative Knapsacks |
| Zou, Yuwen |
S2.8.2 |
460 |
Exploiting the Vulnerabilities in MAVLink Protocol for UAV Hijacking |