SIN'24 logo
IEEE

Author index

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Author Session Start page Title
A A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Abid, Muntathar S2.3.4 172 Incident Response Adaptive Metrics Framework
Abolhasan, Mehran S1.4.3 187 Adversarial Attack Vectors Against Near-Real-Time AI xApps in the Open RAN
Ahamed, Asif S1.5.4 259 Discoverable Hidden Patterns in Water Quality Through AI, LLMs, and Transparent Remote Sensing
Ahmad, Jawad S1.3.2 120 Enhancing AI-Generated Image Detection With a Novel Approach and Comparative Analysis
Ahmed, Irfan S1.7.1 364 PATCH: Problem-Based Learning Approach for Teaching Cybersecurity and Ethical Hacking in Community Colleges
Akbarzadeh, Aida S2.6.2 340 Lightweight Blockchain Prototype for Food Supply Chain Management
AL-Doghman, Faris S1.4.4 196 Leveraging BERT and AraBERT With Bi-LSTM and Attention for Cross-Lingual Sentiment Analysis
Algarib, Eman S2.3.3 167 Mathematical Models of Security Information Systems Based on the Generalized Multiplicative Knapsacks
Alpdag, Kerem S2.7.3 405 EV-IRP Manager: An Electric Vehicle Incident Response Playbook Manager and Visualizer Toolkit
Alqahtani, Saleh S1.3.4 135 Enhancing Phishing Resilience in Academia: The Mediating Role of Anti-Phishing Tools on Student Awareness and Behavior
S1.3.5 143 Effects of Personal Characteristics on Phishing Awareness, Anti-Phishing Tool Usage, and Phishing Avoidance Behavior: A Structural Equation Modeling Approach
Alzahrani, Majed S1.6.2 306 Comparative Analysis of Intrusion Detection Schemes in Internet of Things(IoT) Based Applications
Amachree, Jennifer D2.2.3 52 Implementation of Natural Language UAV Control Using OpenAI's ChatGPT in a Simulated University Environment
Andriambelo, Ny S2.6.3 348 Enhancing Security and Privacy in Federated Learning for Connected Autonomous Vehicles With Lightweight Blockchain and Binius Zero-Knowledge Proofs
S2.7.3 405 EV-IRP Manager: An Electric Vehicle Incident Response Playbook Manager and Visualizer Toolkit
Arakala, Arathi S1.5.2 245 Contextualized AI for Cyber Defense: An Automated Survey Using LLMs
Arnaz, Azadeh S1.4.3 187 Adversarial Attack Vectors Against Near-Real-Time AI xApps in the Open RAN
Arora, Sunil S1.8.3 438 Microsegmented Cloud Network Architecture Using Open-Source Tools for a Zero Trust Foundation
Atieh, Adel S1.2.3 72 A Zero-Trust Framework Based on Machine Learning for Industrial Internet of Things
Ayamga, Dominic S2.5.2 274 The Bell-LaPadula (BLP) Enterprise Security Architecture Model Vs Inference Attacks
B A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Babu, Sarath S2.4.4 229 Critical Behavior Sequence Monitoring for Early Malware Detection
Bahtiyar, Serif S1.1.4 31 A Novel Key Management Framework for Secure and Scalable Decentralized Identity Systems
S2.6.4 356 Secure Communication for MUM-T: a Blockchain and Lightweight Cryptography Framework
Batista, Gustavo S1.6.4 322 Towards Weaknesses and Attack Patterns Prediction for IoT Devices
Benzaid, Chafika S1.2.2 63 5G Slice Mutation to Overcome Distributed Denial of Service Attacks Using Reinforcement Learning
Bhatia, Sajal S1.7.1 364 PATCH: Problem-Based Learning Approach for Teaching Cybersecurity and Ethical Hacking in Community Colleges
Bisht, Tarun S2.4.4 229 Critical Behavior Sequence Monitoring for Early Malware Detection
Boo, Yan Cong S1.7.4 389 Ransomware Insight Analyzer
Bourgeois, Anu D2.2.3 52 Implementation of Natural Language UAV Control Using OpenAI's ChatGPT in a Simulated University Environment
Buchholz, Erik S2.3.2 159 Demystifying Trajectory Recovery From Ash: An Open-Source Evaluation and Enhancement
C A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Caliskan, Busra S1.8.1 423 The Recent Trends in Ransomware Detection and Behaviour Analysis
CD, Jaidhar S1.3.3 127 Experimental Study on Impact of Appliance ID-Based Normalization on SimDataset for Anomalous Power Consumption Classification
Chang, Sang-Yoon S2.8.2 460 Exploiting the Vulnerabilities in MAVLink Protocol for UAV Hijacking
Chen, Kan S1.7.3 381 Security Situation Awareness Platform
Chen, Qisheng S1.3.1 113 A Token-Level Adversarial Example Attack Method for Machine Learning Based Malicious URL Detectors
Chen, Xingxing S2.5.1 265 Simulation of Pre-Ransomware Attacks on Active Directory
Chidambaram, Shunmika S1.8.2 431 Empirical Analysis of Anomaly Detection Systems for Internet of Things
Chong, Royce Yu Feng S2.5.1 265 Simulation of Pre-Ransomware Attacks on Active Directory
Choudhury, Nikumani S1.6.1 298 Enhancing LoRaWAN Security: Protection Against Bit Flipping Attacks in IoT Networks
Chua, Tee Kiat S1.7.3 381 Security Situation Awareness Platform
Cowling, Michael S1.1.1 1 Taxonomy of User-Centric Errors Leading to Cyber Attacks in LoRaWAN
Crawshaw, Charlene S2.8.3 468 Security Inspection and Enhancement of a Modern Multi-Factor Authentication Protocol
D A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
D'Agati, Luca S2.7.4 415 Operational Technologies in Industrial Control System: Cybersecurity Perspectives and Research Trends
D'Silva, Nicholas S2.3.2 159 Demystifying Trajectory Recovery From Ash: An Open-Source Evaluation and Enhancement
Dang, Xiaocui S2.4.3 221 Recommendation System Model Ownership Verification via Non-Influential Watermarking
Dave, Jay S1.6.1 298 Enhancing LoRaWAN Security: Protection Against Bit Flipping Attacks in IoT Networks
Deng, Haiyu S2.4.3 221 Recommendation System Model Ownership Verification via Non-Influential Watermarking
Du, Fei S2.8.2 460 Exploiting the Vulnerabilities in MAVLink Protocol for UAV Hijacking
E A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
El Zegil, Farag S1.6.2 306 Comparative Analysis of Intrusion Detection Schemes in Internet of Things(IoT) Based Applications
Elhadad, Saaid S1.7.1 364 PATCH: Problem-Based Learning Approach for Teaching Cybersecurity and Ethical Hacking in Community Colleges
Elvira, Anne S1.5.2 245 Contextualized AI for Cyber Defense: An Automated Survey Using LLMs
F A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Fan, Wenjun S2.8.2 460 Exploiting the Vulnerabilities in MAVLink Protocol for UAV Hijacking
G A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Gan, Xin Lin S1.7.4 389 Ransomware Insight Analyzer
Ge, Jinai S2.8.2 460 Exploiting the Vulnerabilities in MAVLink Protocol for UAV Hijacking
Gódor, István D2.2.1 39 Spatial Prediction of UAV Position Using Deep Learning
Goh, Jing Rui S1.7.3 381 Security Situation Awareness Platform
Goo, Yu En Bernice S1.7.4 389 Ransomware Insight Analyzer
Gülataş, İbrahim S1.8.1 423 The Recent Trends in Ransomware Detection and Behaviour Analysis
Guo, Huaqun S2.5.1 265 Simulation of Pre-Ransomware Attacks on Active Directory
S1.7.3 381 Security Situation Awareness Platform
S1.7.4 389 Ransomware Insight Analyzer
Gupta, Harshit S2.7.4 415 Operational Technologies in Industrial Control System: Cybersecurity Perspectives and Research Trends
H A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Hartanto, Yoshiano S1.5.2 245 Contextualized AI for Cyber Defense: An Automated Survey Using LLMs
Haryanto, Christoforus Yoga S1.5.2 245 Contextualized AI for Cyber Defense: An Automated Survey Using LLMs
Hassan, Jahan S1.1.1 1 Taxonomy of User-Centric Errors Leading to Cyber Attacks in LoRaWAN
D2.2.2 45 Bushfire Severity Prediction Optimization: Feature Combination Study With XGBoost Regression and Satellite-Derived Data
Hastings, John S1.8.3 438 Microsegmented Cloud Network Architecture Using Open-Source Tools for a Zero Trust Foundation
Havishteja, Dantu S1.6.1 298 Enhancing LoRaWAN Security: Protection Against Bit Flipping Attacks in IoT Networks
Henry, Louis D2.2.3 52 Implementation of Natural Language UAV Control Using OpenAI's ChatGPT in a Simulated University Environment
Herrera-Joancomarti, Jordi S1.5.1 237 Building Resilient AI: A Solution to Data and Model Poisoning Prevention
Hévizi, László D2.2.1 39 Spatial Prediction of UAV Position Using Deep Learning
Houichi, Mehdi S1.2.4 80 A Novel Framework for Attack Detection and Localization in Smart Cities
Hussain, Farookh S1.4.4 196 Leveraging BERT and AraBERT With Bi-LSTM and Attention for Cross-Lingual Sentiment Analysis
Husveg, Øyvind S2.3.2 159 Demystifying Trajectory Recovery From Ash: An Open-Source Evaluation and Enhancement
I A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Ikram, Muhammad S2.5.3 282 Performance Evaluation of Quantum-Secure Symmetric Key Agreement
J A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Ja'fari, Forough S1.2.2 63 5G Slice Mutation to Overcome Distributed Denial of Service Attacks Using Reinforcement Learning
Jafarikhah, Sima S2.2.2 97 Assessing Perceptual Hash Algorithms for Publicly Evaluatable Framework
Janjua, Jamshaid S1.5.3 253 Cybersecurity Revolution via Large Language Models and Explainable AI
S1.5.4 259 Discoverable Hidden Patterns in Water Quality Through AI, LLMs, and Transparent Remote Sensing
Javadpour, Amir S1.2.2 63 5G Slice Mutation to Overcome Distributed Denial of Service Attacks Using Reinforcement Learning
Jeffrey, Zoe S2.4.2 214 Unsupervised Learning for Insider Threat Prediction: A Behavioral Analysis Approach
Jefry, Wael S1.4.4 196 Leveraging BERT and AraBERT With Bi-LSTM and Attention for Cross-Lingual Sentiment Analysis
K A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Kaafar, Mohamed Ali S2.5.3 282 Performance Evaluation of Quantum-Secure Symmetric Key Agreement
Kajita, Kaisei S2.4.1 206 EncPDS: Encrypted Personal Data Stores via Key-Aggregate ID-Based Proxy Re-Encryption
Kanhere, Salil S2.3.2 159 Demystifying Trajectory Recovery From Ash: An Open-Source Evaluation and Enhancement
S1.6.4 322 Towards Weaknesses and Attack Patterns Prediction for IoT Devices
Keshavarzkalhori, Ghazaleh S1.5.1 237 Building Resilient AI: A Solution to Data and Model Poisoning Prevention
Khan, Asad S1.1.2 11 Comprehensive Security of SDN Controllers in NFVI-BASED 5G Network
S1.1.3 21 Dynamic Network Slicing and Deep Learning Based Intrusion Detection System With Virtual Load Balancing in Edge Enabled SDN/NFV Based 5G Networks
Khan, Muhammad Shahbaz S1.3.2 120 Enhancing AI-Generated Image Detection With a Novel Approach and Comparative Analysis
Kilinc, H. Hakan S1.8.1 423 The Recent Trends in Ransomware Detection and Behaviour Analysis
L A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Liang, Christy Jie S2.2.1 89 SMAKAP: Secure Mutual Authentication and Key Agreement Protocol for RFID Systems
Lim, Vi Shean S1.7.4 389 Ransomware Insight Analyzer
Limpek, Márton D2.2.1 39 Spatial Prediction of UAV Position Using Deep Learning
Lipman, Justin S1.4.3 187 Adversarial Attack Vectors Against Near-Real-Time AI xApps in the Open RAN
Listiyani, Devi S2.5.4 291 IRIS-SAFE: Privacy-Preserving Biometric Authentication
Litvinov, Kirill S2.3.3 167 Mathematical Models of Security Information Systems Based on the Generalized Multiplicative Knapsacks
Liu, Liang S2.6.1 332 A Blockchain-Based System for Dynamic Redundancy in IoT Communications
Liu, Xufeng S1.8.4 446 FakeFaceDiscriminator: Discrimination of AI-Synthesized Fake Faces
Lomempow, Emily S1.5.2 245 Contextualized AI for Cyber Defense: An Automated Survey Using LLMs
Longo, Francesco S2.7.4 415 Operational Technologies in Industrial Control System: Cybersecurity Perspectives and Research Trends
Loo, Brandon Jia Le S1.7.3 381 Security Situation Awareness Platform
Lu, Liming S2.5.1 265 Simulation of Pre-Ransomware Attacks on Active Directory
S1.7.3 381 Security Situation Awareness Platform
M A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Maennel, Kaie S1.7.2 373 Human-AI Collaboration and Cyber Security Training: Learning Analytics Opportunities and Challenges
Maennel, Olaf S1.7.2 373 Human-AI Collaboration and Cyber Security Training: Learning Analytics Opportunities and Challenges
Maglaras, Leandros S2.7.3 405 EV-IRP Manager: An Electric Vehicle Incident Response Playbook Manager and Visualizer Toolkit
Mehmood, Rahat S2.4.2 214 Unsupervised Learning for Insider Threat Prediction: A Behavioral Analysis Approach
Merlino, Giovanni S2.7.4 415 Operational Technologies in Industrial Control System: Cybersecurity Perspectives and Research Trends
Mohanty, Manoranjan S1.2.3 72 A Zero-Trust Framework Based on Machine Learning for Industrial Internet of Things
S2.3.4 172 Incident Response Adaptive Metrics Framework
Mohanty, Manoranjan S2.4.3 221 Recommendation System Model Ownership Verification via Non-Influential Watermarking
S2.5.2 274 The Bell-LaPadula (BLP) Enterprise Security Architecture Model Vs Inference Attacks
Mohanty, Manoranjan S1.6.2 306 Comparative Analysis of Intrusion Detection Schemes in Internet of Things(IoT) Based Applications
Moradpoor, Naghmeh S1.3.2 120 Enhancing AI-Generated Image Detection With a Novel Approach and Comparative Analysis
S2.6.2 340 Lightweight Blockchain Prototype for Food Supply Chain Management
S2.6.3 348 Enhancing Security and Privacy in Federated Learning for Connected Autonomous Vehicles With Lightweight Blockchain and Binius Zero-Knowledge Proofs
S2.7.3 405 EV-IRP Manager: An Electric Vehicle Incident Response Playbook Manager and Visualizer Toolkit
Mukhopadhyay, Debajyoti S2.8.3 468 Security Inspection and Enhancement of a Modern Multi-Factor Authentication Protocol
Muradova, Yulduz D2.2.3 52 Implementation of Natural Language UAV Control Using OpenAI's ChatGPT in a Simulated University Environment
N A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Nanda, Priyadarsi S1.1.2 11 Comprehensive Security of SDN Controllers in NFVI-BASED 5G Network
S1.1.3 21 Dynamic Network Slicing and Deep Learning Based Intrusion Detection System With Virtual Load Balancing in Edge Enabled SDN/NFV Based 5G Networks
S1.2.3 72 A Zero-Trust Framework Based on Machine Learning for Industrial Internet of Things
S1.3.4 135 Enhancing Phishing Resilience in Academia: The Mediating Role of Anti-Phishing Tools on Student Awareness and Behavior
S1.3.5 143 Effects of Personal Characteristics on Phishing Awareness, Anti-Phishing Tool Usage, and Phishing Avoidance Behavior: A Structural Equation Modeling Approach
S2.3.4 172 Incident Response Adaptive Metrics Framework
S2.4.3 221 Recommendation System Model Ownership Verification via Non-Influential Watermarking
S2.5.2 274 The Bell-LaPadula (BLP) Enterprise Security Architecture Model Vs Inference Attacks
S1.6.2 306 Comparative Analysis of Intrusion Detection Schemes in Internet of Things(IoT) Based Applications
Narvekar, Meera S2.8.3 468 Security Inspection and Enhancement of a Modern Multi-Factor Authentication Protocol
Navarro-Arribas, Guillermo S1.5.1 237 Building Resilient AI: A Solution to Data and Model Poisoning Prevention
Nayak, Rajesh S1.3.3 127 Experimental Study on Impact of Appliance ID-Based Normalization on SimDataset for Anomalous Power Consumption Classification
Naziri, Shayesta S2.2.1 89 SMAKAP: Secure Mutual Authentication and Key Agreement Protocol for RFID Systems
Nedungadi, Nithya S1.8.2 431 Empirical Analysis of Anomaly Detection Systems for Internet of Things
Nguyen, Trung S1.5.2 245 Contextualized AI for Cyber Defense: An Automated Survey Using LLMs
Nugroho, Amin Rois Sinung S2.5.3 282 Performance Evaluation of Quantum-Secure Symmetric Key Agreement
O A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Ohtake, Go S2.4.1 206 EncPDS: Encrypted Personal Data Stores via Key-Aggregate ID-Based Proxy Re-Encryption
Omote, Kazumasa S2.2.4 105 A Secure Contact Tracing Method Using Blockchain for Criminal Investigation
S1.3.1 113 A Token-Level Adversarial Example Attack Method for Machine Learning Based Malicious URL Detectors
S2.6.1 332 A Blockchain-Based System for Dynamic Redundancy in IoT Communications
Osipyan, Valeriy S2.3.3 167 Mathematical Models of Security Information Systems Based on the Generalized Multiplicative Knapsacks
P A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Pan, Lanlan S1.6.3 314 A Lightweight Hybrid Signcryption Scheme for Smart Devices
Parajuli, Indu S1.1.1 1 Taxonomy of User-Centric Errors Leading to Cyber Attacks in LoRaWAN
Partheepan, Shouthiri D2.2.2 45 Bushfire Severity Prediction Optimization: Feature Combination Study With XGBoost Regression and Satellite-Derived Data
Pérez-Solà, Cristina S1.5.1 237 Building Resilient AI: A Solution to Data and Model Poisoning Prevention
Puliafito, Antonio S2.7.4 415 Operational Technologies in Industrial Control System: Cybersecurity Perspectives and Research Trends
Q A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Qiu, Ruonan S1.6.3 314 A Lightweight Hybrid Signcryption Scheme for Smart Devices
R A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Ray, Biplob S1.1.1 1 Taxonomy of User-Centric Errors Leading to Cyber Attacks in LoRaWAN
D2.2.2 45 Bushfire Severity Prediction Optimization: Feature Combination Study With XGBoost Regression and Satellite-Derived Data
Revanth, Katuri S1.6.1 298 Enhancing LoRaWAN Security: Protection Against Bit Flipping Attacks in IoT Networks
Rivera A, Carlos S1.6.4 322 Towards Weaknesses and Attack Patterns Prediction for IoT Devices
Roy, Swapnoneel S2.8.3 468 Security Inspection and Enhancement of a Modern Multi-Factor Authentication Protocol
Rusakov, Alexey S2.6.2 340 Lightweight Blockchain Prototype for Food Supply Chain Management
S A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Saei, Yaser S2.2.2 97 Assessing Perceptual Hash Algorithms for Publicly Evaluatable Framework
Sanati, Farzad D2.2.2 45 Bushfire Severity Prediction Optimization: Feature Combination Study With XGBoost Regression and Satellite-Derived Data
Sanjeeve, Adith S2.3.2 159 Demystifying Trajectory Recovery From Ash: An Open-Source Evaluation and Enhancement
Sankaran, Sriram S1.8.2 431 Empirical Analysis of Anomaly Detection Systems for Internet of Things
S2.8.1 453 A Novel Biometric-Based Multi-Factor Authentication Protocol for EV Charging Infrastructures
Shaghaghi, Arash S1.6.4 322 Towards Weaknesses and Attack Patterns Prediction for IoT Devices
Shahi, Toran S2.3.2 159 Demystifying Trajectory Recovery From Ash: An Open-Source Evaluation and Enhancement
Sharma, Pankaj Hariom S1.2.1 57 CDCEF: A Cloud-Based Data Volatility & CSP Reliance Eradication Framework
Shrestha, Sudhir S2.2.1 89 SMAKAP: Secure Mutual Authentication and Key Agreement Protocol for RFID Systems
Siadati, Hossein S2.2.2 97 Assessing Perceptual Hash Algorithms for Publicly Evaluatable Framework
Singh, Priyanka S1.2.1 57 CDCEF: A Cloud-Based Data Volatility & CSP Reliance Eradication Framework
S2.4.2 214 Unsupervised Learning for Insider Threat Prediction: A Behavioral Analysis Approach
S2.5.4 291 IRIS-SAFE: Privacy-Preserving Biometric Authentication
S1.8.4 446 FakeFaceDiscriminator: Discrimination of AI-Synthesized Fake Faces
Singh, Virendra S2.4.4 229 Critical Behavior Sequence Monitoring for Early Malware Detection
Sony, Bhagya S1.8.2 431 Empirical Analysis of Anomaly Detection Systems for Internet of Things
Subran, Akshitha S2.8.1 453 A Novel Biometric-Based Multi-Factor Authentication Protocol for EV Charging Infrastructures
Szabó, Géza D2.2.1 39 Spatial Prediction of UAV Position Using Deep Learning
T A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Tahmoresnezhad, Jafar S2.2.2 97 Assessing Perceptual Hash Algorithms for Publicly Evaluatable Framework
Taleb, Tarik S1.2.2 63 5G Slice Mutation to Overcome Distributed Denial of Service Attacks Using Reinforcement Learning
Tan, En Jie S2.5.1 265 Simulation of Pre-Ransomware Attacks on Active Directory
Tan, Kowit S2.5.1 265 Simulation of Pre-Ransomware Attacks on Active Directory
Tan, Yi Ching S2.5.1 265 Simulation of Pre-Ransomware Attacks on Active Directory
Tan, Zhi Ren James S1.7.4 389 Ransomware Insight Analyzer
Teo, Clarabel Jinghui S1.7.3 381 Security Situation Awareness Platform
Tsuchida, Mizuki S2.2.4 105 A Secure Contact Tracing Method Using Blockchain for Criminal Investigation
U A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Uslu, Erkan S2.7.2 397 Dilithium-Based Verifiable Timed Signature Scheme
V A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Vo, Hiep S1.4.2 180 Prompt Engineering Adversarial Attack Against Image Captioning Models
Vu, Hoan S1.8.4 446 FakeFaceDiscriminator: Discrimination of AI-Synthesized Fake Faces
Vu, Minh S1.5.2 245 Contextualized AI for Cyber Defense: An Automated Survey Using LLMs
W A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Wang, Wen S2.8.2 460 Exploiting the Vulnerabilities in MAVLink Protocol for UAV Hijacking
Wang, Xu S2.2.1 89 SMAKAP: Secure Mutual Authentication and Key Agreement Protocol for RFID Systems
Weir, Stuart S1.3.2 120 Enhancing AI-Generated Image Detection With a Novel Approach and Comparative Analysis
Wijikumar, Pirunthavi D2.2.2 45 Bushfire Severity Prediction Optimization: Feature Combination Study With XGBoost Regression and Satellite-Derived Data
Wooderson, Paul S2.7.3 405 EV-IRP Manager: An Electric Vehicle Incident Response Playbook Manager and Visualizer Toolkit
X A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Xu, Heng S2.4.3 221 Recommendation System Model Ownership Verification via Non-Influential Watermarking
Xu, Jian S2.2.1 89 SMAKAP: Secure Mutual Authentication and Key Agreement Protocol for RFID Systems
Y A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Yang, Minghui S1.6.3 314 A Lightweight Hybrid Signcryption Scheme for Smart Devices
Yaşar, Halimcan S2.6.4 356 Secure Communication for MUM-T: a Blockchain and Lightweight Cryptography Framework
Yayla, Oğuz S2.7.2 397 Dilithium-Based Verifiable Timed Signature Scheme
Yeo, Xin Ling Jocelyn S1.7.4 389 Ransomware Insight Analyzer
Yip, Charisee Zhi Ling S1.7.3 381 Security Situation Awareness Platform
Yıldız, Mert S1.1.4 31 A Novel Key Management Framework for Secure and Scalable Decentralized Identity Systems
Yılmazer-Metin, Ayşe S2.3.1 152 ECG-PPS: Privacy Preserving Disease Diagnosis and Monitoring System for Real-Time ECG Signals
Yu, Guangsheng S2.2.1 89 SMAKAP: Secure Mutual Authentication and Key Agreement Protocol for RFID Systems
Yu, Shui S1.4.2 180 Prompt Engineering Adversarial Attack Against Image Captioning Models
Yuksel, Beyazit S2.3.1 152 ECG-PPS: Privacy Preserving Disease Diagnosis and Monitoring System for Real-Time ECG Signals
Z A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Zaim, A.Halim S1.8.1 423 The Recent Trends in Ransomware Detection and Behaviour Analysis
Zheng, Xi S1.4.2 180 Prompt Engineering Adversarial Attack Against Image Captioning Models
Zhuck, Arseniy S2.3.3 167 Mathematical Models of Security Information Systems Based on the Generalized Multiplicative Knapsacks
Zou, Yuwen S2.8.2 460 Exploiting the Vulnerabilities in MAVLink Protocol for UAV Hijacking