| 2024 | 17th International Conference on Security of Information and Networks, SIN 2024, Sydney, Australia, December 2-4, 2024 |
| 2024 | 5G Slice Mutation to Overcome Distributed Denial of Service Attacks Using Reinforcement Learning. Amir Javadpour, Forough Ja'fari, Tarik Taleb, Chafika Benzaïd |
| 2024 | A Blockchain-Based System for Dynamic Redundancy in IoT Communications. Liang Liu, Kazumasa Omote |
| 2024 | A Lightweight Hybrid Signcryption Scheme for Smart Devices. Lanlan Pan, Ruonan Qiu, Minghui Yang |
| 2024 | A Novel Biometric-Based Multi-Factor Authentication Protocol for EV Charging Infrastructures. Akshitha K. Subran, Sriram Sankaran |
| 2024 | A Novel Framework for Attack Detection and Localization in Smart Cities. Mehdi Houichi, Faouzi Jaïdi, Adel Bouhoula |
| 2024 | A Novel Key Management Framework for Secure and Scalable Decentralized Identity Systems. Mert Yildiz, Serif Bahtiyar |
| 2024 | A Secure Contact Tracing Method Using Blockchain for Criminal Investigation. Mizuki Tsuchida, Kazumasa Omote |
| 2024 | A Token-Level Adversarial Example Attack Method for Machine Learning Based Malicious URL Detectors. Qisheng Chen, Kazumasa Omote |
| 2024 | A Zero-Trust Framework Based on Machine Learning for Industrial Internet of Things. Adel Atieh, Priyadarsi Nanda, Manoranjan Mohanty |
| 2024 | Adversarial Attack Vectors Against Near-Real-Time AI xApps in the Open RAN. Azadeh Arnaz, Justin Lipman, Mehran Abolhasan |
| 2024 | Assessing Perceptual Hash Algorithms for Publicly Evaluatable Framework. Yaser Saei, Jafar Tahmoresnezhad, Sima Jafarikhah, Hossein Siadati |
| 2024 | BERT-LA: Leveraging BERT and AraBERT With Bi-LSTM for Cross-Lingual Sentiment Analysis of English and Arabic Texts. Wael Jefry, Firas Al-Doghman, Farookh Khadeer Hussain |
| 2024 | Building Resilient AI: A Solution to Data and Model Poisoning Prevention. Ghazaleh Keshavarzkalhori, Cristina Pérez-Solà, Guillermo Navarro-Arribas, Jordi Herrera-Joancomartí |
| 2024 | Bushfire Severity Prediction Optimization: Feature Combination Study with XGBoost Regression and Satellite-Derived Data. Pirunthavi Wijikumar, Shouthiri Partheepan, Jahan Hassan, Farzad Sanati, Biplop Rakshit Ray |
| 2024 | CDCEF: A Cloud-Based Data Volatility & CSP Reliance Eradication Framework. Pankaj Hariom Sharma, Priyanka Singh |
| 2024 | Comparative Analysis of Intrusion Detection Schemes in Internet of Things(IoT) Based Applications. Farag El Zegil, Priyadarsi Nanda, Manoranjan Mohanty, Majed Alzahrani |
| 2024 | Comprehensive Security of SDN Controllers in NFVI-Based 5G Network. Asad Faraz Khan, Priyadarsi Nanda |
| 2024 | Contextualized AI for Cyber Defense: An Automated Survey Using LLMs. Christoforus Yoga Haryanto, Anne Maria Elvira, Trung Duc Nguyen, Minh Hieu Vu, Yoshiano Hartanto, Emily Lomempow, Arathi Arakala |
| 2024 | Critical Behavior Sequence Monitoring for Early Malware Detection. Tarun Bisht, Sarath Babu, Virendra Singh |
| 2024 | Cybersecurity Revolution via Large Language Models and Explainable AI. Taher M. Ghazal, Jamshaid Iqbal Janjua, Walid Abushiba, Munir Ahmad, Anuam Ihsan, Nidal A. Al-Dmour |
| 2024 | Demystifying Trajectory Recovery from Ash: An Open-Source Evaluation and Enhancement. Nicholas D'Silva, Toran Shahi, Øyvind Timian Dokk Husveg, Adith Sanjeeve, Erik Buchholz, Salil S. Kanhere |
| 2024 | Dilithium-Based Verifiable Timed Signature Scheme. Erkan Uslu, Oguz Yayla |
| 2024 | Discoverable Hidden Patterns in Water Quality Through AI, LLMs, and Transparent Remote Sensing. Abdullah Al Noman, Md Tanvir Rahman Tarafder, S. M. Tamim Hossain Rimon, Asif Ahamed, Shahriar Ahmed, Abdullah Al Sakib |
| 2024 | Dynamic Network Slicing and Deep Learning Based Intrusion Detection System with Virtual Load Balancing in Edge Enabled SDN/NFV Based 5G Networks. Asad Faraz Khan, Priyadarsi Nanda |
| 2024 | ECG- PPS: Privacy Preserving Disease Diagnosis and Monitoring System for Real-Time ECG Signals. Beyazit Bestami Yuksel, Ayse Yilmazer-Metin |
| 2024 | EV-IRP Manager: An Electric Vehicle Incident Response Playbook Manager and Visualizer Toolkit. Kerem Alpdag, Naghmeh Moradpoor, Ny Hasina Andriambelo, Paul Wooderson, Leandros Maglaras |
| 2024 | Effects of Personal Characteristics on Phishing Awareness, Anti-Phishing Tool Usage, and Phishing Avoidance Behavior: A Structural Equation Modeling Approach. Saleh Mansor Alqahtani, Priyadarsi Nanda |
| 2024 | Empirical Analysis of Anomaly Detection Systems for Internet of Things. Shunmika Chidambaram, Bhagya Sony, Nithya Nedungadi, Sriram Sankaran |
| 2024 | EncPDS: Encrypted Personal Data Stores via Key-Aggregate ID-Based Proxy Re-Encryption. Kaisei Kajita, Go Ohtake |
| 2024 | Enhancing AI-Generated Image Detection with a Novel Approach and Comparative Analysis. Stuart Weir, Muhammad Shahbaz Khan, Naghmeh Moradpoor, Jawad Ahmad |
| 2024 | Enhancing LoRaWAN Security: Protection Against Bit Flipping Attacks in IoT Networks. Jay Dave, Nikumani Choudhury, Dantu Havishteja, Katuri Revanth |
| 2024 | Enhancing Phishing Resilience in Academia: The Mediating Role of Anti-Phishing Tools on Student Awareness and Behavior. Saleh Mansor Alqahtani, Priyadarsi Nanda |
| 2024 | Enhancing Security and Privacy in Federated Learning for Connected Autonomous Vehicles With Lightweight Blockchain and Binius ZeroKnowledge Proofs. Ny Hasina Andriambelo, Naghmeh Moradpoor |
| 2024 | Experimental Study on Impact of Appliance ID-Based Normalization on SimDataset for Anomalous Power Consumption Classification. Rajesh Nayak, C. D. Jaidhar |
| 2024 | Exploiting the Vulnerabilities in MAVLink Protocol for UAV Hijacking. Fei Du, Jinai Ge, Wen Wang, Yuwen Zou, Sang-Yoon Chang, Wenjun Fan |
| 2024 | FakeFaceDiscriminator: Discrimination of AI-Synthesized Fake Faces. Xufeng Liu, Quoc Hoan Vu, Priyanka Singh |
| 2024 | Human-AI Collaboration and Cyber Security Training: Learning Analytics Opportunities and Challenges. Kaie Maennel, Olaf Manuel Maennel |
| 2024 | IRIS-SAFE: Privacy-Preserving Biometric Authentication. Devi Listiyani, Priyanka Singh |
| 2024 | Implementation of Natural Language UAV Control Using OpenAI's ChatGPT in a Simulated University Environment. Yulduz Muradova, Jennifer Amachree, Louis Henry, Anu G. Bourgeois |
| 2024 | Incident Response Adaptive Metrics Framework. Muntathar Abid, Priyadarsi Nanda, Manoranjan Mohanty |
| 2024 | Lightweight Blockchain Prototype for Food Supply Chain Management. Alexey Rusakov, Naghmeh Moradpoor, Aida Akbarzadeh |
| 2024 | Mathematical Models of Security Information Systems Based on the Generalized Multiplicative Knapsacks. Valeriy O. Osipyan, E. T. J. Algharib, Arseniy Zhuck, Kirill I. Litvinov |
| 2024 | Microsegmented Cloud Network Architecture Using Open-Source Tools for a Zero Trust Foundation. Sunil Arora, John D. Hastings |
| 2024 | Operational Technologies in Industrial Control System: Cybersecurity Perspectives and Research Trends. Harshit Gupta, Luca D'Agati, Francesco Longo, Antonio Puliafito, Giovanni Merlino |
| 2024 | PATCH: Problem-Based Learning Approach for Teaching Cybersecurity and Ethical Hacking in Community Colleges. Sajal Bhatia, Saaid Elhadad, Irfan Ahmed |
| 2024 | Performance Evaluation of Quantum-Secure Symmetric Key Agreement. Amin Rois Sinung Nugroho, Muhammad Ikram, Mohamed Ali Kâafar |
| 2024 | Prompt Engineering Adversarial Attack Against Image Captioning Models. Hiep Vo, Shui Yu, Xi Zheng |
| 2024 | Ransomware Insight Analyzer. Xin Lin Gan, Zhi Ren James Tan, Yu En Bernice Goo, Xin Ling Jocelyn Yeo, Vi Shean Lim, Yan Cong Boo, Huaqun Guo |
| 2024 | Recommendation System Model Ownership Verification via Non-Influential Watermarking. Xiaocui Dang, Priyadarsi Nanda, Heng Xu, Haiyu Deng, Manoranjan Mohanty |
| 2024 | SMAKAP: Secure Mutual Authentication and Key Agreement Protocol for RFID Systems. Shayesta Naziri, Xu Wang, Guangsheng Yu, Jian Xu, Sudhir Shrestha, Christy Jie Liang |
| 2024 | Secure Communication for MUM-T: A Blockchain and Lightweight Cryptography Framework. Halimcan Yasar, Serif Bahtiyar |
| 2024 | Security Inspection and Enhancement of a Modern Multi-Factor Authentication Protocol. Swapnoneel Roy, Charlene H. Crawshaw, Debajyoti Mukhopadhyay, Meera Narvekar |
| 2024 | Security Situation Awareness Platform. Charisee Zhi Ling Yip, Tee Kiat Chua, Clarabel Jinghui Teo, Jing Rui Goh, Brandon Jia Le Loo, Huaqun Guo, Liming Lu, Kan Chen |
| 2024 | Simulation of Pre-Ransomware Attacks on Active Directory. En Jie Tan, Kowit Tan, Royce Yu Feng Chong, Xingxing Chen, Yi Ching Tan, Liming Lu, Huaqun Guo |
| 2024 | Spatial Prediction of UAV Position Using Deep Learning. Márton Bertalan Limpek, Géza Szabó, László Hévizi, István Gódor |
| 2024 | Taxonomy of User-Centric Errors Leading to Cyber Attacks in LoRaWAN. Indu Parajuli, Biplob Rakshit Ray, Jahan Hassan, Michael Cowling |
| 2024 | The Bell-LaPadula (BLP) Enterprise Security Architecture Model vs Inference Attacks. Dominic Ayamga, Priyadarsi Nanda, Manoranjan Mohanty |
| 2024 | The Recent Trends in Ransomware Detection and Behaviour Analysis. Büsra Çaliskan, Ibrahim Gulatas, H. Hakan Kilinc, Abdul Halim Zaim |
| 2024 | Towards Weaknesses and Attack Patterns Prediction for IoT Devices. Carlos A. Rivera Alvarez, Arash Shaghaghi, Gustavo Batista, Salil S. Kanhere |
| 2024 | Unsupervised Learning for Insider Threat Prediction: A Behavioral Analysis Approach. Rahat Mehmood, Priyanka Singh, Zoe Jeffery |