- A Novel Scoring Algorithm Against HID Attacks Based on Static Text Feature Matching.- Identifying Ransomware Functions through Microarchitectural Side-channel Analysis.- STARMAP: Multi-machine Malware Analysis System for Lateral Movement Observation.- LogSHIELD: A Graph-based Real-time Anomaly Detection Framework using Frequency Analysis.- Completeness Analysis of Mobile Apps' Privacy Policies by Using Deep Learning.- Characterizing the Evolution of Psychological Tactics and Techniques Exploited by Malicious Emails.- Matching Knowledge Graphs for Cybersecurity Countermeasures Selection.- Graph-Based Profiling of Dependency Vulnerability Remediation.
- Characterizing the Evolution of Psychological Factors Exploited by Malicious Emails.- An Enhanced Firewall for IoT Security.- Exploring the Effects of Cybersecurity Awareness and Decision-Making Under Risk.- SVSM-KMS: Safeguarding Keys for Cloud Services with Encrypted Virtualization.- GNNexPIDS: An Interpretation Method for Provenance-based Intrusion Detection Based on GNNExplainer.- Performance Evaluation of Lightweight Cryptographic Ciphers on ARM Processor for IoT Deployments.- AutoCRAT: Automatic Cumulative Reconstruction of Alert Trees.- FAF-BM: An Approach for False Alerts Filtering using BERT Model with Semi-supervised Active Learning.
- Smart Home Cyber Insurance Pricing.- Exhaustive Exploratory Analysis of Low Degree Maximum Period NLFSRs By Graph Analysis.- Integrating Consortium Blockchain and Attribute-Based Searchable Encryption for Automotive Threat Intelligence Sharing Model.- Multi-Modal Multi-Task Tiered Expert (M3TTE): An Effective Method for CDN Website Classification.- Malware Variant Detection Based on Knowledge Transfer and Ensemble Learning.- An Efficient IOC-Driven BigData Tracing and Backtracking Model for Emergency Response.- Integrating CP-ABE and Device Fingerprint into Federated Learning.- Automatic Alert Categories Standardization for Heterogeneous Devices with Incomplete Semantic Knowledge Based on LSTM.
- Family Similarity-Enhanced Implicit Data Augmentation for Malware Classification.