- Artificial Intelligence & Security.- Hacking Mobile Biometrics with the Photograph of a Fingerprint.- Multi-tool Approach for Advanced Quantum Key Distribution Network Modeling.- Deep Learning Methods for Intrusion Detection Systems on the CSE-CIC-IDS2018 Dataset: A Review.- CTIMiner: Cyber Threat Intelligence Mining Using Adaptive Multi-Task Adversarial Active Learning.- Multimedia Forensics.- Toward Forensic-Friendly AI: Integrating Blockchain with Federated Learning to Enhance AI Trustworthiness.- The Hidden Realms of Router Apps: Forensic Analysis of TP-Link Tether and ASUS Router.
- ENF Match with Masking: a new method for searching with sparse signal.- Lightweight Multi-Tier IDS for UAV Networks: Enhancing UAV Zero-Day Attack Detection with Honeypot Threat Intelligence.- Intrusion Detection.- Reducing False Positives in Intrusion Detection System Alerts: A Novel Aggregation and Correlation Model.- APTChaser: Cyber Threat Attribution via Attack Technique Modeling.- What Do We Know About the Psychology of Insider Threats?.- A Digital Profiling Triage Model for Industrial Espionage.- Intrusion and Fraud Detection.
- Uncovering Fraudulent Patterns in USDT Transactions on the TRON Blockchain with EDA and Machine Learning.- Sky-Eye: Detect Multi-Stage Cyber Attacks at the Bigger Picture.- ATKHunter: Towards Automated Attack Detection by Behavior Pattern Learning.- Large Language Models, Advances in Security and Forensics.- Investigating the Effectiveness of Bayesian Spam Filters in Detecting LLM-modified Spam Mails.- SecureSem: Sensitive Text Classification based on Semantic Feature Optimization.- The Hidden Dangers of Publicly Accessible LLMs: A Case Study on Gab AI.- Advances in Security and Forensics.
- Biologically Sustainable Cyber-Physical Spaces: a Systematic Literature Review.- Detecting Criminal Networks via Non-Content Communication Data Analysis Techniques from the TRACY Project.