SIN'24 logo
IEEE

Papers by title

5 A B C D E F H I L M O P R S T U
5top 5 A B C D E F H I L M O P R S T U

5G Slice Mutation to Overcome Distributed Denial of Service Attacks Using Reinforcement Learning

Atop 5 A B C D E F H I L M O P R S T U

A Blockchain-Based System for Dynamic Redundancy in IoT Communications

A Lightweight Hybrid Signcryption Scheme for Smart Devices

A Novel Biometric-Based Multi-Factor Authentication Protocol for EV Charging Infrastructures

A Novel Framework for Attack Detection and Localization in Smart Cities

A Novel Key Management Framework for Secure and Scalable Decentralized Identity Systems

A Secure Contact Tracing Method Using Blockchain for Criminal Investigation

A Token-Level Adversarial Example Attack Method for Machine Learning Based Malicious URL Detectors

A Zero-Trust Framework Based on Machine Learning for Industrial Internet of Things

Adversarial Attack Vectors Against Near-Real-Time AI xApps in the Open RAN

Assessing Perceptual Hash Algorithms for Publicly Evaluatable Framework

Btop 5 A B C D E F H I L M O P R S T U

Building Resilient AI: A Solution to Data and Model Poisoning Prevention

Bushfire Severity Prediction Optimization: Feature Combination Study With XGBoost Regression and Satellite-Derived Data

Ctop 5 A B C D E F H I L M O P R S T U

CDCEF: A Cloud-Based Data Volatility & CSP Reliance Eradication Framework

Comparative Analysis of Intrusion Detection Schemes in Internet of Things(IoT) Based Applications

Comprehensive Security of SDN Controllers in NFVI-BASED 5G Network

Contextualized AI for Cyber Defense: An Automated Survey Using LLMs

Critical Behavior Sequence Monitoring for Early Malware Detection

Cybersecurity Revolution via Large Language Models and Explainable AI

Dtop 5 A B C D E F H I L M O P R S T U

Demystifying Trajectory Recovery From Ash: An Open-Source Evaluation and Enhancement

Dilithium-Based Verifiable Timed Signature Scheme

Discoverable Hidden Patterns in Water Quality Through AI, LLMs, and Transparent Remote Sensing

Dynamic Network Slicing and Deep Learning Based Intrusion Detection System With Virtual Load Balancing in Edge Enabled SDN/NFV Based 5G Networks

Etop 5 A B C D E F H I L M O P R S T U

ECG-PPS: Privacy Preserving Disease Diagnosis and Monitoring System for Real-Time ECG Signals

Effects of Personal Characteristics on Phishing Awareness, Anti-Phishing Tool Usage, and Phishing Avoidance Behavior: A Structural Equation Modeling Approach

Empirical Analysis of Anomaly Detection Systems for Internet of Things

EncPDS: Encrypted Personal Data Stores via Key-Aggregate ID-Based Proxy Re-Encryption

Enhancing AI-Generated Image Detection With a Novel Approach and Comparative Analysis

Enhancing LoRaWAN Security: Protection Against Bit Flipping Attacks in IoT Networks

Enhancing Phishing Resilience in Academia: The Mediating Role of Anti-Phishing Tools on Student Awareness and Behavior

Enhancing Security and Privacy in Federated Learning for Connected Autonomous Vehicles With Lightweight Blockchain and Binius Zero-Knowledge Proofs

EV-IRP Manager: An Electric Vehicle Incident Response Playbook Manager and Visualizer Toolkit

Experimental Study on Impact of Appliance ID-Based Normalization on SimDataset for Anomalous Power Consumption Classification

Exploiting the Vulnerabilities in MAVLink Protocol for UAV Hijacking

Ftop 5 A B C D E F H I L M O P R S T U

FakeFaceDiscriminator: Discrimination of AI-Synthesized Fake Faces

Htop 5 A B C D E F H I L M O P R S T U

Human-AI Collaboration and Cyber Security Training: Learning Analytics Opportunities and Challenges

Itop 5 A B C D E F H I L M O P R S T U

Implementation of Natural Language UAV Control Using OpenAI's ChatGPT in a Simulated University Environment

Incident Response Adaptive Metrics Framework

IRIS-SAFE: Privacy-Preserving Biometric Authentication

Ltop 5 A B C D E F H I L M O P R S T U

Leveraging BERT and AraBERT With Bi-LSTM and Attention for Cross-Lingual Sentiment Analysis

Lightweight Blockchain Prototype for Food Supply Chain Management

Mtop 5 A B C D E F H I L M O P R S T U

Mathematical Models of Security Information Systems Based on the Generalized Multiplicative Knapsacks

Microsegmented Cloud Network Architecture Using Open-Source Tools for a Zero Trust Foundation

Otop 5 A B C D E F H I L M O P R S T U

Operational Technologies in Industrial Control System: Cybersecurity Perspectives and Research Trends

Ptop 5 A B C D E F H I L M O P R S T U

PATCH: Problem-Based Learning Approach for Teaching Cybersecurity and Ethical Hacking in Community Colleges

Performance Evaluation of Quantum-Secure Symmetric Key Agreement

Prompt Engineering Adversarial Attack Against Image Captioning Models

Rtop 5 A B C D E F H I L M O P R S T U

Ransomware Insight Analyzer

Recommendation System Model Ownership Verification via Non-Influential Watermarking

Stop 5 A B C D E F H I L M O P R S T U

Secure Communication for MUM-T: a Blockchain and Lightweight Cryptography Framework

Security Inspection and Enhancement of a Modern Multi-Factor Authentication Protocol

Security Situation Awareness Platform

Simulation of Pre-Ransomware Attacks on Active Directory

SMAKAP: Secure Mutual Authentication and Key Agreement Protocol for RFID Systems

Spatial Prediction of UAV Position Using Deep Learning

Ttop 5 A B C D E F H I L M O P R S T U

Taxonomy of User-Centric Errors Leading to Cyber Attacks in LoRaWAN

The Bell-LaPadula (BLP) Enterprise Security Architecture Model Vs Inference Attacks

The Recent Trends in Ransomware Detection and Behaviour Analysis

Towards Weaknesses and Attack Patterns Prediction for IoT Devices

Utop 5 A B C D E F H I L M O P R S T U

Unsupervised Learning for Insider Threat Prediction: A Behavioral Analysis Approach