Author |
Session |
Start page |
Title |
A A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Abid, Muntathar |
S2.3.4 |
172 |
Incident Response Adaptive Metrics Framework |
Abolhasan, Mehran |
S1.4.3 |
187 |
Adversarial Attack Vectors Against Near-Real-Time AI xApps in the Open RAN |
Ahamed, Asif |
S1.5.4 |
259 |
Discoverable Hidden Patterns in Water Quality Through AI, LLMs, and Transparent Remote Sensing |
Ahmad, Jawad |
S1.3.2 |
120 |
Enhancing AI-Generated Image Detection With a Novel Approach and Comparative Analysis |
Ahmed, Irfan |
S1.7.1 |
364 |
PATCH: Problem-Based Learning Approach for Teaching Cybersecurity and Ethical Hacking in Community Colleges |
Akbarzadeh, Aida |
S2.6.2 |
340 |
Lightweight Blockchain Prototype for Food Supply Chain Management |
AL-Doghman, Faris |
S1.4.4 |
196 |
Leveraging BERT and AraBERT With Bi-LSTM and Attention for Cross-Lingual Sentiment Analysis |
Algarib, Eman |
S2.3.3 |
167 |
Mathematical Models of Security Information Systems Based on the Generalized Multiplicative Knapsacks |
Alpdag, Kerem |
S2.7.3 |
405 |
EV-IRP Manager: An Electric Vehicle Incident Response Playbook Manager and Visualizer Toolkit |
Alqahtani, Saleh |
S1.3.4 |
135 |
Enhancing Phishing Resilience in Academia: The Mediating Role of Anti-Phishing Tools on Student Awareness and Behavior |
S1.3.5 |
143 |
Effects of Personal Characteristics on Phishing Awareness, Anti-Phishing Tool Usage, and Phishing Avoidance Behavior: A Structural Equation Modeling Approach |
Alzahrani, Majed |
S1.6.2 |
306 |
Comparative Analysis of Intrusion Detection Schemes in Internet of Things(IoT) Based Applications |
Amachree, Jennifer |
D2.2.3 |
52 |
Implementation of Natural Language UAV Control Using OpenAI's ChatGPT in a Simulated University Environment |
Andriambelo, Ny |
S2.6.3 |
348 |
Enhancing Security and Privacy in Federated Learning for Connected Autonomous Vehicles With Lightweight Blockchain and Binius Zero-Knowledge Proofs |
S2.7.3 |
405 |
EV-IRP Manager: An Electric Vehicle Incident Response Playbook Manager and Visualizer Toolkit |
Arakala, Arathi |
S1.5.2 |
245 |
Contextualized AI for Cyber Defense: An Automated Survey Using LLMs |
Arnaz, Azadeh |
S1.4.3 |
187 |
Adversarial Attack Vectors Against Near-Real-Time AI xApps in the Open RAN |
Arora, Sunil |
S1.8.3 |
438 |
Microsegmented Cloud Network Architecture Using Open-Source Tools for a Zero Trust Foundation |
Atieh, Adel |
S1.2.3 |
72 |
A Zero-Trust Framework Based on Machine Learning for Industrial Internet of Things |
Ayamga, Dominic |
S2.5.2 |
274 |
The Bell-LaPadula (BLP) Enterprise Security Architecture Model Vs Inference Attacks |
B A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Babu, Sarath |
S2.4.4 |
229 |
Critical Behavior Sequence Monitoring for Early Malware Detection |
Bahtiyar, Serif |
S1.1.4 |
31 |
A Novel Key Management Framework for Secure and Scalable Decentralized Identity Systems |
S2.6.4 |
356 |
Secure Communication for MUM-T: a Blockchain and Lightweight Cryptography Framework |
Batista, Gustavo |
S1.6.4 |
322 |
Towards Weaknesses and Attack Patterns Prediction for IoT Devices |
Benzaid, Chafika |
S1.2.2 |
63 |
5G Slice Mutation to Overcome Distributed Denial of Service Attacks Using Reinforcement Learning |
Bhatia, Sajal |
S1.7.1 |
364 |
PATCH: Problem-Based Learning Approach for Teaching Cybersecurity and Ethical Hacking in Community Colleges |
Bisht, Tarun |
S2.4.4 |
229 |
Critical Behavior Sequence Monitoring for Early Malware Detection |
Boo, Yan Cong |
S1.7.4 |
389 |
Ransomware Insight Analyzer |
Bourgeois, Anu |
D2.2.3 |
52 |
Implementation of Natural Language UAV Control Using OpenAI's ChatGPT in a Simulated University Environment |
Buchholz, Erik |
S2.3.2 |
159 |
Demystifying Trajectory Recovery From Ash: An Open-Source Evaluation and Enhancement |
C A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Caliskan, Busra |
S1.8.1 |
423 |
The Recent Trends in Ransomware Detection and Behaviour Analysis |
CD, Jaidhar |
S1.3.3 |
127 |
Experimental Study on Impact of Appliance ID-Based Normalization on SimDataset for Anomalous Power Consumption Classification |
Chang, Sang-Yoon |
S2.8.2 |
460 |
Exploiting the Vulnerabilities in MAVLink Protocol for UAV Hijacking |
Chen, Kan |
S1.7.3 |
381 |
Security Situation Awareness Platform |
Chen, Qisheng |
S1.3.1 |
113 |
A Token-Level Adversarial Example Attack Method for Machine Learning Based Malicious URL Detectors |
Chen, Xingxing |
S2.5.1 |
265 |
Simulation of Pre-Ransomware Attacks on Active Directory |
Chidambaram, Shunmika |
S1.8.2 |
431 |
Empirical Analysis of Anomaly Detection Systems for Internet of Things |
Chong, Royce Yu Feng |
S2.5.1 |
265 |
Simulation of Pre-Ransomware Attacks on Active Directory |
Choudhury, Nikumani |
S1.6.1 |
298 |
Enhancing LoRaWAN Security: Protection Against Bit Flipping Attacks in IoT Networks |
Chua, Tee Kiat |
S1.7.3 |
381 |
Security Situation Awareness Platform |
Cowling, Michael |
S1.1.1 |
1 |
Taxonomy of User-Centric Errors Leading to Cyber Attacks in LoRaWAN |
Crawshaw, Charlene |
S2.8.3 |
468 |
Security Inspection and Enhancement of a Modern Multi-Factor Authentication Protocol |
D A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
D'Agati, Luca |
S2.7.4 |
415 |
Operational Technologies in Industrial Control System: Cybersecurity Perspectives and Research Trends |
D'Silva, Nicholas |
S2.3.2 |
159 |
Demystifying Trajectory Recovery From Ash: An Open-Source Evaluation and Enhancement |
Dang, Xiaocui |
S2.4.3 |
221 |
Recommendation System Model Ownership Verification via Non-Influential Watermarking |
Dave, Jay |
S1.6.1 |
298 |
Enhancing LoRaWAN Security: Protection Against Bit Flipping Attacks in IoT Networks |
Deng, Haiyu |
S2.4.3 |
221 |
Recommendation System Model Ownership Verification via Non-Influential Watermarking |
Du, Fei |
S2.8.2 |
460 |
Exploiting the Vulnerabilities in MAVLink Protocol for UAV Hijacking |
E A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
El Zegil, Farag |
S1.6.2 |
306 |
Comparative Analysis of Intrusion Detection Schemes in Internet of Things(IoT) Based Applications |
Elhadad, Saaid |
S1.7.1 |
364 |
PATCH: Problem-Based Learning Approach for Teaching Cybersecurity and Ethical Hacking in Community Colleges |
Elvira, Anne |
S1.5.2 |
245 |
Contextualized AI for Cyber Defense: An Automated Survey Using LLMs |
F A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Fan, Wenjun |
S2.8.2 |
460 |
Exploiting the Vulnerabilities in MAVLink Protocol for UAV Hijacking |
G A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Gan, Xin Lin |
S1.7.4 |
389 |
Ransomware Insight Analyzer |
Ge, Jinai |
S2.8.2 |
460 |
Exploiting the Vulnerabilities in MAVLink Protocol for UAV Hijacking |
Gódor, István |
D2.2.1 |
39 |
Spatial Prediction of UAV Position Using Deep Learning |
Goh, Jing Rui |
S1.7.3 |
381 |
Security Situation Awareness Platform |
Goo, Yu En Bernice |
S1.7.4 |
389 |
Ransomware Insight Analyzer |
Gülataş, İbrahim |
S1.8.1 |
423 |
The Recent Trends in Ransomware Detection and Behaviour Analysis |
Guo, Huaqun |
S2.5.1 |
265 |
Simulation of Pre-Ransomware Attacks on Active Directory |
S1.7.3 |
381 |
Security Situation Awareness Platform |
S1.7.4 |
389 |
Ransomware Insight Analyzer |
Gupta, Harshit |
S2.7.4 |
415 |
Operational Technologies in Industrial Control System: Cybersecurity Perspectives and Research Trends |
H A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Hartanto, Yoshiano |
S1.5.2 |
245 |
Contextualized AI for Cyber Defense: An Automated Survey Using LLMs |
Haryanto, Christoforus Yoga |
S1.5.2 |
245 |
Contextualized AI for Cyber Defense: An Automated Survey Using LLMs |
Hassan, Jahan |
S1.1.1 |
1 |
Taxonomy of User-Centric Errors Leading to Cyber Attacks in LoRaWAN |
D2.2.2 |
45 |
Bushfire Severity Prediction Optimization: Feature Combination Study With XGBoost Regression and Satellite-Derived Data |
Hastings, John |
S1.8.3 |
438 |
Microsegmented Cloud Network Architecture Using Open-Source Tools for a Zero Trust Foundation |
Havishteja, Dantu |
S1.6.1 |
298 |
Enhancing LoRaWAN Security: Protection Against Bit Flipping Attacks in IoT Networks |
Henry, Louis |
D2.2.3 |
52 |
Implementation of Natural Language UAV Control Using OpenAI's ChatGPT in a Simulated University Environment |
Herrera-Joancomarti, Jordi |
S1.5.1 |
237 |
Building Resilient AI: A Solution to Data and Model Poisoning Prevention |
Hévizi, László |
D2.2.1 |
39 |
Spatial Prediction of UAV Position Using Deep Learning |
Houichi, Mehdi |
S1.2.4 |
80 |
A Novel Framework for Attack Detection and Localization in Smart Cities |
Hussain, Farookh |
S1.4.4 |
196 |
Leveraging BERT and AraBERT With Bi-LSTM and Attention for Cross-Lingual Sentiment Analysis |
Husveg, Øyvind |
S2.3.2 |
159 |
Demystifying Trajectory Recovery From Ash: An Open-Source Evaluation and Enhancement |
I A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Ikram, Muhammad |
S2.5.3 |
282 |
Performance Evaluation of Quantum-Secure Symmetric Key Agreement |
J A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Ja'fari, Forough |
S1.2.2 |
63 |
5G Slice Mutation to Overcome Distributed Denial of Service Attacks Using Reinforcement Learning |
Jafarikhah, Sima |
S2.2.2 |
97 |
Assessing Perceptual Hash Algorithms for Publicly Evaluatable Framework |
Janjua, Jamshaid |
S1.5.3 |
253 |
Cybersecurity Revolution via Large Language Models and Explainable AI |
S1.5.4 |
259 |
Discoverable Hidden Patterns in Water Quality Through AI, LLMs, and Transparent Remote Sensing |
Javadpour, Amir |
S1.2.2 |
63 |
5G Slice Mutation to Overcome Distributed Denial of Service Attacks Using Reinforcement Learning |
Jeffrey, Zoe |
S2.4.2 |
214 |
Unsupervised Learning for Insider Threat Prediction: A Behavioral Analysis Approach |
Jefry, Wael |
S1.4.4 |
196 |
Leveraging BERT and AraBERT With Bi-LSTM and Attention for Cross-Lingual Sentiment Analysis |
K A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Kaafar, Mohamed Ali |
S2.5.3 |
282 |
Performance Evaluation of Quantum-Secure Symmetric Key Agreement |
Kajita, Kaisei |
S2.4.1 |
206 |
EncPDS: Encrypted Personal Data Stores via Key-Aggregate ID-Based Proxy Re-Encryption |
Kanhere, Salil |
S2.3.2 |
159 |
Demystifying Trajectory Recovery From Ash: An Open-Source Evaluation and Enhancement |
S1.6.4 |
322 |
Towards Weaknesses and Attack Patterns Prediction for IoT Devices |
Keshavarzkalhori, Ghazaleh |
S1.5.1 |
237 |
Building Resilient AI: A Solution to Data and Model Poisoning Prevention |
Khan, Asad |
S1.1.2 |
11 |
Comprehensive Security of SDN Controllers in NFVI-BASED 5G Network |
S1.1.3 |
21 |
Dynamic Network Slicing and Deep Learning Based Intrusion Detection System With Virtual Load Balancing in Edge Enabled SDN/NFV Based 5G Networks |
Khan, Muhammad Shahbaz |
S1.3.2 |
120 |
Enhancing AI-Generated Image Detection With a Novel Approach and Comparative Analysis |
Kilinc, H. Hakan |
S1.8.1 |
423 |
The Recent Trends in Ransomware Detection and Behaviour Analysis |
L A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Liang, Christy Jie |
S2.2.1 |
89 |
SMAKAP: Secure Mutual Authentication and Key Agreement Protocol for RFID Systems |
Lim, Vi Shean |
S1.7.4 |
389 |
Ransomware Insight Analyzer |
Limpek, Márton |
D2.2.1 |
39 |
Spatial Prediction of UAV Position Using Deep Learning |
Lipman, Justin |
S1.4.3 |
187 |
Adversarial Attack Vectors Against Near-Real-Time AI xApps in the Open RAN |
Listiyani, Devi |
S2.5.4 |
291 |
IRIS-SAFE: Privacy-Preserving Biometric Authentication |
Litvinov, Kirill |
S2.3.3 |
167 |
Mathematical Models of Security Information Systems Based on the Generalized Multiplicative Knapsacks |
Liu, Liang |
S2.6.1 |
332 |
A Blockchain-Based System for Dynamic Redundancy in IoT Communications |
Liu, Xufeng |
S1.8.4 |
446 |
FakeFaceDiscriminator: Discrimination of AI-Synthesized Fake Faces |
Lomempow, Emily |
S1.5.2 |
245 |
Contextualized AI for Cyber Defense: An Automated Survey Using LLMs |
Longo, Francesco |
S2.7.4 |
415 |
Operational Technologies in Industrial Control System: Cybersecurity Perspectives and Research Trends |
Loo, Brandon Jia Le |
S1.7.3 |
381 |
Security Situation Awareness Platform |
Lu, Liming |
S2.5.1 |
265 |
Simulation of Pre-Ransomware Attacks on Active Directory |
S1.7.3 |
381 |
Security Situation Awareness Platform |
M A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Maennel, Kaie |
S1.7.2 |
373 |
Human-AI Collaboration and Cyber Security Training: Learning Analytics Opportunities and Challenges |
Maennel, Olaf |
S1.7.2 |
373 |
Human-AI Collaboration and Cyber Security Training: Learning Analytics Opportunities and Challenges |
Maglaras, Leandros |
S2.7.3 |
405 |
EV-IRP Manager: An Electric Vehicle Incident Response Playbook Manager and Visualizer Toolkit |
Mehmood, Rahat |
S2.4.2 |
214 |
Unsupervised Learning for Insider Threat Prediction: A Behavioral Analysis Approach |
Merlino, Giovanni |
S2.7.4 |
415 |
Operational Technologies in Industrial Control System: Cybersecurity Perspectives and Research Trends |
Mohanty, Manoranjan |
S1.2.3 |
72 |
A Zero-Trust Framework Based on Machine Learning for Industrial Internet of Things |
S2.3.4 |
172 |
Incident Response Adaptive Metrics Framework |
Mohanty, Manoranjan |
S2.4.3 |
221 |
Recommendation System Model Ownership Verification via Non-Influential Watermarking |
S2.5.2 |
274 |
The Bell-LaPadula (BLP) Enterprise Security Architecture Model Vs Inference Attacks |
Mohanty, Manoranjan |
S1.6.2 |
306 |
Comparative Analysis of Intrusion Detection Schemes in Internet of Things(IoT) Based Applications |
Moradpoor, Naghmeh |
S1.3.2 |
120 |
Enhancing AI-Generated Image Detection With a Novel Approach and Comparative Analysis |
S2.6.2 |
340 |
Lightweight Blockchain Prototype for Food Supply Chain Management |
S2.6.3 |
348 |
Enhancing Security and Privacy in Federated Learning for Connected Autonomous Vehicles With Lightweight Blockchain and Binius Zero-Knowledge Proofs |
S2.7.3 |
405 |
EV-IRP Manager: An Electric Vehicle Incident Response Playbook Manager and Visualizer Toolkit |
Mukhopadhyay, Debajyoti |
S2.8.3 |
468 |
Security Inspection and Enhancement of a Modern Multi-Factor Authentication Protocol |
Muradova, Yulduz |
D2.2.3 |
52 |
Implementation of Natural Language UAV Control Using OpenAI's ChatGPT in a Simulated University Environment |
N A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Nanda, Priyadarsi |
S1.1.2 |
11 |
Comprehensive Security of SDN Controllers in NFVI-BASED 5G Network |
S1.1.3 |
21 |
Dynamic Network Slicing and Deep Learning Based Intrusion Detection System With Virtual Load Balancing in Edge Enabled SDN/NFV Based 5G Networks |
S1.2.3 |
72 |
A Zero-Trust Framework Based on Machine Learning for Industrial Internet of Things |
S1.3.4 |
135 |
Enhancing Phishing Resilience in Academia: The Mediating Role of Anti-Phishing Tools on Student Awareness and Behavior |
S1.3.5 |
143 |
Effects of Personal Characteristics on Phishing Awareness, Anti-Phishing Tool Usage, and Phishing Avoidance Behavior: A Structural Equation Modeling Approach |
S2.3.4 |
172 |
Incident Response Adaptive Metrics Framework |
S2.4.3 |
221 |
Recommendation System Model Ownership Verification via Non-Influential Watermarking |
S2.5.2 |
274 |
The Bell-LaPadula (BLP) Enterprise Security Architecture Model Vs Inference Attacks |
S1.6.2 |
306 |
Comparative Analysis of Intrusion Detection Schemes in Internet of Things(IoT) Based Applications |
Narvekar, Meera |
S2.8.3 |
468 |
Security Inspection and Enhancement of a Modern Multi-Factor Authentication Protocol |
Navarro-Arribas, Guillermo |
S1.5.1 |
237 |
Building Resilient AI: A Solution to Data and Model Poisoning Prevention |
Nayak, Rajesh |
S1.3.3 |
127 |
Experimental Study on Impact of Appliance ID-Based Normalization on SimDataset for Anomalous Power Consumption Classification |
Naziri, Shayesta |
S2.2.1 |
89 |
SMAKAP: Secure Mutual Authentication and Key Agreement Protocol for RFID Systems |
Nedungadi, Nithya |
S1.8.2 |
431 |
Empirical Analysis of Anomaly Detection Systems for Internet of Things |
Nguyen, Trung |
S1.5.2 |
245 |
Contextualized AI for Cyber Defense: An Automated Survey Using LLMs |
Nugroho, Amin Rois Sinung |
S2.5.3 |
282 |
Performance Evaluation of Quantum-Secure Symmetric Key Agreement |
O A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Ohtake, Go |
S2.4.1 |
206 |
EncPDS: Encrypted Personal Data Stores via Key-Aggregate ID-Based Proxy Re-Encryption |
Omote, Kazumasa |
S2.2.4 |
105 |
A Secure Contact Tracing Method Using Blockchain for Criminal Investigation |
S1.3.1 |
113 |
A Token-Level Adversarial Example Attack Method for Machine Learning Based Malicious URL Detectors |
S2.6.1 |
332 |
A Blockchain-Based System for Dynamic Redundancy in IoT Communications |
Osipyan, Valeriy |
S2.3.3 |
167 |
Mathematical Models of Security Information Systems Based on the Generalized Multiplicative Knapsacks |
P A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Pan, Lanlan |
S1.6.3 |
314 |
A Lightweight Hybrid Signcryption Scheme for Smart Devices |
Parajuli, Indu |
S1.1.1 |
1 |
Taxonomy of User-Centric Errors Leading to Cyber Attacks in LoRaWAN |
Partheepan, Shouthiri |
D2.2.2 |
45 |
Bushfire Severity Prediction Optimization: Feature Combination Study With XGBoost Regression and Satellite-Derived Data |
Pérez-Solà, Cristina |
S1.5.1 |
237 |
Building Resilient AI: A Solution to Data and Model Poisoning Prevention |
Puliafito, Antonio |
S2.7.4 |
415 |
Operational Technologies in Industrial Control System: Cybersecurity Perspectives and Research Trends |
Q A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Qiu, Ruonan |
S1.6.3 |
314 |
A Lightweight Hybrid Signcryption Scheme for Smart Devices |
R A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Ray, Biplob |
S1.1.1 |
1 |
Taxonomy of User-Centric Errors Leading to Cyber Attacks in LoRaWAN |
D2.2.2 |
45 |
Bushfire Severity Prediction Optimization: Feature Combination Study With XGBoost Regression and Satellite-Derived Data |
Revanth, Katuri |
S1.6.1 |
298 |
Enhancing LoRaWAN Security: Protection Against Bit Flipping Attacks in IoT Networks |
Rivera A, Carlos |
S1.6.4 |
322 |
Towards Weaknesses and Attack Patterns Prediction for IoT Devices |
Roy, Swapnoneel |
S2.8.3 |
468 |
Security Inspection and Enhancement of a Modern Multi-Factor Authentication Protocol |
Rusakov, Alexey |
S2.6.2 |
340 |
Lightweight Blockchain Prototype for Food Supply Chain Management |
S A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Saei, Yaser |
S2.2.2 |
97 |
Assessing Perceptual Hash Algorithms for Publicly Evaluatable Framework |
Sanati, Farzad |
D2.2.2 |
45 |
Bushfire Severity Prediction Optimization: Feature Combination Study With XGBoost Regression and Satellite-Derived Data |
Sanjeeve, Adith |
S2.3.2 |
159 |
Demystifying Trajectory Recovery From Ash: An Open-Source Evaluation and Enhancement |
Sankaran, Sriram |
S1.8.2 |
431 |
Empirical Analysis of Anomaly Detection Systems for Internet of Things |
S2.8.1 |
453 |
A Novel Biometric-Based Multi-Factor Authentication Protocol for EV Charging Infrastructures |
Shaghaghi, Arash |
S1.6.4 |
322 |
Towards Weaknesses and Attack Patterns Prediction for IoT Devices |
Shahi, Toran |
S2.3.2 |
159 |
Demystifying Trajectory Recovery From Ash: An Open-Source Evaluation and Enhancement |
Sharma, Pankaj Hariom |
S1.2.1 |
57 |
CDCEF: A Cloud-Based Data Volatility & CSP Reliance Eradication Framework |
Shrestha, Sudhir |
S2.2.1 |
89 |
SMAKAP: Secure Mutual Authentication and Key Agreement Protocol for RFID Systems |
Siadati, Hossein |
S2.2.2 |
97 |
Assessing Perceptual Hash Algorithms for Publicly Evaluatable Framework |
Singh, Priyanka |
S1.2.1 |
57 |
CDCEF: A Cloud-Based Data Volatility & CSP Reliance Eradication Framework |
S2.4.2 |
214 |
Unsupervised Learning for Insider Threat Prediction: A Behavioral Analysis Approach |
S2.5.4 |
291 |
IRIS-SAFE: Privacy-Preserving Biometric Authentication |
S1.8.4 |
446 |
FakeFaceDiscriminator: Discrimination of AI-Synthesized Fake Faces |
Singh, Virendra |
S2.4.4 |
229 |
Critical Behavior Sequence Monitoring for Early Malware Detection |
Sony, Bhagya |
S1.8.2 |
431 |
Empirical Analysis of Anomaly Detection Systems for Internet of Things |
Subran, Akshitha |
S2.8.1 |
453 |
A Novel Biometric-Based Multi-Factor Authentication Protocol for EV Charging Infrastructures |
Szabó, Géza |
D2.2.1 |
39 |
Spatial Prediction of UAV Position Using Deep Learning |
T A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Tahmoresnezhad, Jafar |
S2.2.2 |
97 |
Assessing Perceptual Hash Algorithms for Publicly Evaluatable Framework |
Taleb, Tarik |
S1.2.2 |
63 |
5G Slice Mutation to Overcome Distributed Denial of Service Attacks Using Reinforcement Learning |
Tan, En Jie |
S2.5.1 |
265 |
Simulation of Pre-Ransomware Attacks on Active Directory |
Tan, Kowit |
S2.5.1 |
265 |
Simulation of Pre-Ransomware Attacks on Active Directory |
Tan, Yi Ching |
S2.5.1 |
265 |
Simulation of Pre-Ransomware Attacks on Active Directory |
Tan, Zhi Ren James |
S1.7.4 |
389 |
Ransomware Insight Analyzer |
Teo, Clarabel Jinghui |
S1.7.3 |
381 |
Security Situation Awareness Platform |
Tsuchida, Mizuki |
S2.2.4 |
105 |
A Secure Contact Tracing Method Using Blockchain for Criminal Investigation |
U A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Uslu, Erkan |
S2.7.2 |
397 |
Dilithium-Based Verifiable Timed Signature Scheme |
V A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Vo, Hiep |
S1.4.2 |
180 |
Prompt Engineering Adversarial Attack Against Image Captioning Models |
Vu, Hoan |
S1.8.4 |
446 |
FakeFaceDiscriminator: Discrimination of AI-Synthesized Fake Faces |
Vu, Minh |
S1.5.2 |
245 |
Contextualized AI for Cyber Defense: An Automated Survey Using LLMs |
W A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Wang, Wen |
S2.8.2 |
460 |
Exploiting the Vulnerabilities in MAVLink Protocol for UAV Hijacking |
Wang, Xu |
S2.2.1 |
89 |
SMAKAP: Secure Mutual Authentication and Key Agreement Protocol for RFID Systems |
Weir, Stuart |
S1.3.2 |
120 |
Enhancing AI-Generated Image Detection With a Novel Approach and Comparative Analysis |
Wijikumar, Pirunthavi |
D2.2.2 |
45 |
Bushfire Severity Prediction Optimization: Feature Combination Study With XGBoost Regression and Satellite-Derived Data |
Wooderson, Paul |
S2.7.3 |
405 |
EV-IRP Manager: An Electric Vehicle Incident Response Playbook Manager and Visualizer Toolkit |
X A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Xu, Heng |
S2.4.3 |
221 |
Recommendation System Model Ownership Verification via Non-Influential Watermarking |
Xu, Jian |
S2.2.1 |
89 |
SMAKAP: Secure Mutual Authentication and Key Agreement Protocol for RFID Systems |
Y A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Yang, Minghui |
S1.6.3 |
314 |
A Lightweight Hybrid Signcryption Scheme for Smart Devices |
Yaşar, Halimcan |
S2.6.4 |
356 |
Secure Communication for MUM-T: a Blockchain and Lightweight Cryptography Framework |
Yayla, Oğuz |
S2.7.2 |
397 |
Dilithium-Based Verifiable Timed Signature Scheme |
Yeo, Xin Ling Jocelyn |
S1.7.4 |
389 |
Ransomware Insight Analyzer |
Yip, Charisee Zhi Ling |
S1.7.3 |
381 |
Security Situation Awareness Platform |
Yıldız, Mert |
S1.1.4 |
31 |
A Novel Key Management Framework for Secure and Scalable Decentralized Identity Systems |
Yılmazer-Metin, Ayşe |
S2.3.1 |
152 |
ECG-PPS: Privacy Preserving Disease Diagnosis and Monitoring System for Real-Time ECG Signals |
Yu, Guangsheng |
S2.2.1 |
89 |
SMAKAP: Secure Mutual Authentication and Key Agreement Protocol for RFID Systems |
Yu, Shui |
S1.4.2 |
180 |
Prompt Engineering Adversarial Attack Against Image Captioning Models |
Yuksel, Beyazit |
S2.3.1 |
152 |
ECG-PPS: Privacy Preserving Disease Diagnosis and Monitoring System for Real-Time ECG Signals |
Z A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Zaim, A.Halim |
S1.8.1 |
423 |
The Recent Trends in Ransomware Detection and Behaviour Analysis |
Zheng, Xi |
S1.4.2 |
180 |
Prompt Engineering Adversarial Attack Against Image Captioning Models |
Zhuck, Arseniy |
S2.3.3 |
167 |
Mathematical Models of Security Information Systems Based on the Generalized Multiplicative Knapsacks |
Zou, Yuwen |
S2.8.2 |
460 |
Exploiting the Vulnerabilities in MAVLink Protocol for UAV Hijacking |