


default search action
ISDFS 2025: Boston, MA, USA
- 13th International Symposium on Digital Forensics and Security, ISDFS 2025, Boston, MA, USA, April 24-25, 2025. IEEE 2025, ISBN 979-8-3315-0993-4
- Avinash Kumar, Nuri Alperen Kose, Kubra Kose, Hyuk Cho:
NIDS Using Hierarchical Attack Structure and Transformer. 1-8 - Amine Berqia, Oussama Ismaili, Manar Chahbi, Habiba Bouijij:
Advanced DDoS Detection in Online Learning Environments. 1-5 - Umang Patel, Shruti Bhilare, Avik Hati:
Speed as an Instrument: Exploiting Time-Scale Modification for Adversarial Attacks and Defenses in Speaker Recognition Systems. 1-6 - Jet Le, Mihai Lazarescu, Sie Teng Soh, Reza Ryan, Peng Cai, Qian Li:
On the Application of Fundamental Clustering Methods to Large Scale Cyber Security Log Classification. 1-6 - Victor Obojo, Richard A. Ikuesan, AbdulKabir Adekanye, Elias Iortom:
The Importance of Dark Web Access in Cyber Threat Intelligence. 1-6 - Muhammad Raheel Raza, Shahbaz Ahmed, Fahad Ahmed Khokhar, Asaf Varol:
Exploring the Potential of DeepSeek-R1 Model in Transforming Healthcare Solutions: An Overview. 1-4 - David Shapiro, Victor Fedoseev:
Protection of 3D Models by QIM Watermarking with Reduced Distortion. 1-5 - Chris Clark, Hala Strohmier Berry, Bryce Sullivan, Nicholas Maroney, Jonathan Galbraith:
Malware Exploitation and Vulnerability Assessment of CVE-2024-38063 in Windows 10 and 11 in Academic Networks Cybersecurity. 1-5 - Tugba Elmas, Adrien Chardon Fabian, Cihan Varol, Asaf Varol:
Hardware Performance Evaluation of Freeware ETL Tools. 1-5 - Muhammad Irfan, Myung J. Lee, Ashar Neyaz, Daiki Nobayashi:
A Novel Multi-Scale Spectral-Guided Graph Attention Network for DeepFake Video Detection. 1-7 - Hebert de Oliveira Silva, Aldrey Pedrazoli, Sergio Nascimento, Regina Moraes:
Ensuring Privacy in the Labour Market: Towards Full Compliance with LGPD and GDPR. 1-6 - Grazia Garzo, Alessandro Palumbo:
Legal & Ethical Implications of Predictive Digital Techniques in the Judicial Criminal Proceedings. 1-6 - Yagmur Çigdem Aktas, Jorge García Castaño:
CLIP-based Few-Shot Multi-Label Classification Methods: A Comparative Study. 1-6 - Boubacar Tawayé Abdoul Aziz, Mahamadou Issoufou Tiado, Boukar Abatchia Nicolas, Boureima Djibo Abasse:
Intrusion Detection System Based On Machine Learning Algorithms In the DOUNG Ad Hoc Network. 1-5 - Chennaiah Madduri, Ranita Ganguly, Dishant Banga:
Assessing the Usability of an AI-Powered Mobile App on Student Engagement in Remote Field Activities. 1-4 - Asmath Zakey, Dinura Bawantha, Dinuth Shehara, Nethmi Hasara, Kavinga Yapa Abeywardena, Harinda Fernando:
A Dual-Branch CNN and Metadata Analysis Approach for Robust Image Tampering Detection. 1-6 - Khurram Shahzad, Muhammad Raheel Raza, Asaf Varol:
Security Threats Mitigation for Internet of Vehicles Using Cryptographic Protocols. 1-6 - Hala Strohmier Berry, Brecken Merrill, Shamreen Shakil Shaikh, Mary Alice Woolington:
A Comprehensive Comparative Analysis of RFID Devices Security in Supply Chain Geofencing Technologies. 1-4 - Hossein Jamali, Josh Watson, Sergiu M. Dascalu, Frederick C. Harris Jr.:
Harmonized Data Drive: Standardizing and Unifying Smart Car Information Storage for Enhanced Forensics and Interoperability. 1-6 - Bahaddin Erdem, Murat Karabatak:
Academic Fraud Detection in Online Exams with DNN's Multilayer Model. 1-6 - Razaq Jinad, ABM Islam, Narasimha Shashidhar:
Machine Learning Approaches for Classifying Encrypted Files. 1-7 - Thangavel Murugan, Fotoon Khalifah Abdullah, Ghalya Salem Mohamed Alshuraiqi Almehrzi, Eiman Mohamed Mohamed Alsereidi, Aisha Aldahmani, Eiman Mubarak Masoud Alahbabi, N. Nasurudeen Ahamed:
Almiqanaas T - A Crime Scene Evidence Detector. 1-6 - Ankur Chattopadhyay, Mohammad Q. Azhar, Ezra Faith, Alexandra Lisa, Oksana Piven, Suhaas Ravela:
Towards A Unique User-Centric Security & Privacy (S&P) Label For Social Robots. 1-7 - Bruno Silva, Patrícia Leite, Óscar R. Ribeiro:
Evaluating Spam Detection Techniques: A Comparison of TF-IDF and Sentence Embeddings with Machine Learning Models. 1-4 - Grazia Garzo, Alessandro Palumbo:
Human-in-the-Loop: Legal Knowledge Formalization in Attempto Controlled English. 1-6 - Nadir Can Kavkas, Kazim Yildiz:
Enhancing loMT Security with Deep Learning Based Approach for Medical IoT Threat Detection. 1-5 - Firoz Khan, C. Sai Varun, Balamurugan Balusamy, Jeevanandam Jotheeswaran:
Quantized Hybrid Privacy Preserving Approach for Federated Learning with Flower Framework. 1-7 - Gordey Danilochkin, Fedir Ensary, Eva Tuba:
Muffins vs. Chihuahuas Revisited: Exploring Zero-Shot and Few-Shot CLIP-Based Methods for Similar Object Classification. 1-6 - Asura Akter Sunna, Tanzina Sultana, Naresh Kshetri, Mohammed Majbah Uddin:
AssessCICA: Assessing and Mitigating Financial Losses from Cyber Attacks with Role of Cyber Insurance in Post-Pandemic Era. 1-6 - Din Mohammad Dohan, Naheyan Prottush, Md. Ashiq Ul Islam Sajid, Sudipta Mondal, Sumaya Binte Zilani Choya, Md. Golam Rabiul Alam:
Customer Personality Analysis Using Machine Learning with Explainable AI. 1-6 - Jayanthi Ramamoorthy, Narasimha K. Shashidhar, Cihan Varol:
Packers and Features: Efficacy of Static Analysis for Packed Linux Malware. 1-6 - Boitumelo Nkwe, Michael Kyobe:
Using Machine Learning Techniques to Address IoT Forensics Challenges. 1-6 - Anil Sezgin, Gürkan Özkan, Esra Cosgun:
Leveraging Large Language Models in Software Testing: A Review of Applications and Challenges. 1-7 - Haywood Gelman, John D. Hastings:
Scalable and Ethical Insider Threat Detection through Data Synthesis and Analysis by LLMs. 1-6 - Songül Karabatak, Aysenur Kuloglu, Müslim Alanoglu, Ezgi Bozkurt:
Unity-Supported Game-Based Learning: Teachers' Perspectives on the Development of Classroom Management Skills. 1-6 - Pawara Gunathilaka, Dinal Senadheera, Shenan Perara, Chamithu Gunawardana, Samantha Thelijjagoda, Jenny Krishara:
Context-Aware Behavior-Driven Pipeline Generation. 1-6 - Songül Karabatak, Müslim Alanoglu, Aysenur Kuloglu, Ezgi Bozkurt:
Digital Assistants: AI to Reduce Teachers' Expectations of Reality Shock. 1-6 - Chaitanya Rahalkar, Anushka Virgaonkar:
Reconciling Safety and Privacy: A Systematic Review of Moderation in End-to-End Encrypted Messaging. 1-7 - Adiba Mahmud, Yasmeen Rawajfih, Fan Wu:
An Ensemble Transformer Approach with Cross-Attention for Automated Code Security Vulnerability Detection and Documentation. 1-6 - Ashar Neyaz, Avinash Kumar, Bingyu Liu:
Digital Forensics Analysis of iMazing Phone Explorer Tool to Aid Mobile Forensics Investigation. 1-8 - Nurettin Selcuk Senol, Anitha Chennamaneni, Amar Rasheed, Ahmet Furkan Aydogan:
Leveraging Machine Learning for Effective Device Detection and Security in LoRa-Based IoT Systems. 1-6 - Arda C. Varol, Larissa T. Coffee:
Gaming Without Harm: AI-Driven Content Moderation to Improve Safety in Roblox. 1-4 - Munirah Aljuwair, Emad-ul-Haq Qazi, Tanveer A. Zia:
Internet of Things (IoT) Forensics: Chip-Off Forensics. 1-6 - Amina Alnaqbi, Meera Alblooshi, Hessa Ali Nasser, Niyat Habtom, Farkhund Iqbal:
Forensic Investigations in the Age of AI: Identifying and Analyzing Artifacts from AI-Assisted Crimes. 1-6 - Thrushna Matharasi, Priyam Ganguly:
Solving the Financial, Operational, and Reputational Impact of Commercial Fleet Collisions: Challenges and Mitigation Strategies Using Data-Driven Decision-Making Process. 1-4 - Said Berrezueta, Maria G. Baldeon Calisto, Danny Navarrete, Noel Pérez-Pérez, Ricardo Flores Moyano, Daniel Riofrío, Diego S. Benítez:
Foundation Models for Medical Image Segmentation: A Literature Review. 1-7 - Amani Bacha, Farah Barika Ktata, Olfa Belkahla Driss:
Multi-Agent Deep Q-Network Based Ant Colony Optimization for Advanced Network Intrusion Detection. 1-6 - Rui Fernandes, Nuno Lopes, Joaquim Gonçalves, John Cosgrove:
Comparing Traditional Hacking Tools and AI-Driven Alternatives. 1-5 - George Thompson, Serkan Varol, Derya Ucuz, Zachary Ridder:
Bridging Gaps in Understanding College Graduation Rates. 1-7 - Margorie Pérez, Danny Navarrete, Maria G. Baldeon Calisto, Yuvinne Guerrero, André Sarmiento:
Unlocking Student Success: Applying Machine Learning for Predicting Student Dropout in Higher Education. 1-6 - Vedant Gupta, Yuting Zhang:
From Snap to Evidence: Snapchat Footprint on iOS. 1-6 - Michael Stalford, Luis Felipe Zapata Rivera, Catalina Aranzazu Suescun:
Enhancing Online Laboratories' Security Through the Use of RFID Technology. 1-6 - Ahmet Furkan Aydogan, Cihan Varol, Hamadou Saliah-Hassane:
Security Assessments of Data Transfer Phase of Adapted EEG System in Learning Systems. 1-7 - Neha Adhikari, Manan Chhajed, Divya Raichura, Prasenjit Bhavathankar:
LexChain: A Blockchain-based Solution to Safeguard Electronic Evidence in Legal Systems. 1-6 - Abhinav B. V, Abhirup MVNS, Adithya D. Shetty, Akash Bhat, Clara Kanmani A:
Dynamic Threat Detection and Mitigation Using AI-Infused Firewalls. 1-5 - Weijie Pang, Ayrton Joseph DiPina, Ashar Neyaz:
Enhancing Phishing Website Detection with Machine Learning Algorithms. 1-5 - Megha Gopakumar, Saranya Chandran:
Detection of Dynamic Code Loading in Android. 1-6 - Khushi Gupta, Cihan Varol, Hamadou Saliah-Hassane:
Evaluating IEEE P2834.1 Standard: Use Case Scenarios for Enhancing Digital Forensics in Trusted Learning Systems. 1-7 - LD Herrera:
Romance Scam Victimization: A Survey-Based Examination of Financial, Psychological, and Reporting Factors. 1-6 - Virguens Honorius, Cihan Varol:
Illuminated Secrets: Exploiting Display Brightness for Out-of-Band Optical Covert Communication. 1-6 - Alex Howe, Mauricio Papa:
Edge-Focused Temporal Graph Autoencoders for Anomalous Link Prediction in OT Networks. 1-6 - Murat Karabatak, Sevinç Ay, Songül Karabatak:
A Scientific Discovery in Virtual Reality and Augmented Reality Enriched with Artificial Intelligence. 1-5 - Jayaprakashreddy Cheenepalli, John D. Hastings, Khandaker Mamun Ahmed, Chad Fenner:
Advancing DevSecOps in SMEs: Challenges and Best Practices for Secure CI/CD Pipelines. 1-6 - Ramakrishna Garine, Sunil Pradhan Sharma:
Probabilistic Deep Learning for Energy Time Series Forecasting: A Comparative Study. 1-6 - Prashant Vajpayee, Chittal Karuppiah, Gahangir Hossain:
Insider Threat Pattern Detection Using Deep Learning to Evaluate Cyber Value at Risk (CVaR). 1-5 - Chunlan Gao, Yubao Wu:
Recognizing the Financial Fraud Type of Telegram Advertisement Posts Based on the Multimodal Learning. 1-6 - Chase Maschinot, Ankur Chattopadhyay, Seth Adjei:
COVID Infodemic Advisor (CIA): An Online Recommender For Content Consumers & Providers. 1-7 - Prajna Bhandary, Charles Nicholas:
A Behavioral Analysis of Ransomware in Active Directory: A Case Study of BlackMatter, Conti, LockBit, and Midnight. 1-6 - Gary A. McCully, John D. Hastings, Shengjie Xu, Adam Fortier:
Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code. 1-6 - Hajar Ouazza, Fadoua Khennou, Abderrahim Abdellaoui:
Adversarial Retraining and White-Box Attacks for Robust Malware Detection. 1-6 - Chaitanya Krishnama, Raghavender Puchhakayala, Sudarshan Kotha, Faiz Gouri:
Cost-Optimized Cloud Scheduling for ETL and Big Data Using AI. 1-6 - Thrushna Matharasi, Priyam Ganguly, Isha Mukherjee, Sanjeev Lakkaraju:
Enhancing Breast Cancer Detection with AI: Ensuring Image Security and Diagnostic Precision Through Deep Learning Techniques. 1-5 - Hariprasad Holla, Arun Ambika Sasikumar, Chandu Gutti, Karthik Thumula, Hemanth Gogineni:
Advanced Privacy and Security Techniques in Federated Learning Against Sophisticated Attacks. 1-6 - Fulya Görkem Orhan, Aysenur Kuloglu:
The Relationship Between Secondary School Students' Digital Game Addictions and Their Responsibilities Toward Learning. 1-5 - Hala Strohmier Berry, Keenan Golston, Autumn Hurley, Jadon Ott, Julian Ward:
Critical Factors for Privacy and User Retention in Event-Based Social Media Apps. 1-6 - Zefang Liu:
AutoBnB: Multi-Agent Incident Response with Large Language Models. 1-6 - Ngoc Tuong Vy Nguyen, Felix D. Childress, Yunting Yin:
Debate-Driven Multi-Agent LLMs for Phishing Email Detection. 1-5 - Arafat Asim, Peter J. Hawrylak:
Leveraging Feature Engineering and Machine Learning for Internet of Things (IoT) Cyberattack Detection: A Scalable Approach. 1-6 - André Araújo, David Rodrigues, Patrícia Leite, Joaquim Gonçalves:
Network Intrusion Detection System Based on Multiple Datasets: Machine Learning Approaches. 1-5 - Adoum Youssouf, Abdramane Issa, Daouda Ahmat:
Privacy-Preserving Secret Sharing using Fully Homomorphic Encryption. 1-6 - K. C. Choo:
Keynote Speaker of ISDFS 2025. 1 - Khushi Gupta, Phani Lanka, Cihan Varol:
A Framework to Automate the Digital Forensics Pipeline of Electron-based Social Media Applications. 1-6 - Mahra Mohammed Alnaqbi, Shaikha Tareq Alblooshi, Elyazia Abdulla Alshamsi, Niyat Seghid, Farkhund Iqbal:
An Empirical Analysis of Security and Privacy Issues Associated with Selling and Purchasing of Secondhand Storage Devices. 1-7 - Pedro Ferreira, Enmanuel Martins, Joaquim Silva, Paulo Teixeira:
Feature Selection and XGBoost for Enhanced Intrusion Detection: A Comparative Study Across Benchmark Datasets. 1-6 - Omar Farshad Jeelani:
Anomaly Detection in Metaverse Healthcare for 6G-Enabled Internet of Things: An Approach Based on Feature Selection. 1-6 - Farhad Mofidi, Sena G. Hounsinou, Gedare Bloom:
CrossSentry: A Cross-Layer Approach to Ransomware Detection in IoT. 1-6 - Bashaer Mohamed Alsalami, Richard Ikuesan:
An Integrated Framework for Video-Based Deepfake Forensic Analysis. 1-5 - Md. Zakir Hossain Zamil, Byoung Jik Lee:
Enhancing Brain Tumor Detection Using a CNN-Powered Android Application. 1-6 - Sam Pastoriza, Iman Yousfi, Christopher Redino, Marc Vucovich, Abdul Rahman, Sal Aguiñaga, Dhruv Nandakumar:
Retrieval Augmented Anomaly Detection (RAAD): Nimble Model Adjustment Without Retraining. 1-6 - Kerem Erciyes, Mustafa Soydan, Özgür Gümüs:
Deep-Learning Based 3D Lung Segmentation. 1-6 - Chaoyue Huang, Hanzhou Wu:
A Game Between the Defender and the Attacker for Trigger-Based Black-box Model Watermarking. 1-6 - Songül Karabatak, Sevinç Ay, Murat Karabatak:
Artificial Intelligence Applications in Education Within the Scope of the National Artificial Intelligence Strategy in Turkey. 1-4 - Rebecca Kipanga Masele, Fadoua Khennou:
Leveraging Feature Selection and Deep Learning for Accurate Malware and Ransomware Detection in PE Files. 1-6 - Jacob Fricano, Nicholas Geigel, Daryl Johnson:
Covert Channels Through Docker Image Manipulation. 1-6 - Muhammad Nomani Kabir, Yasser M. Alginahi:
An Efficient Plagiarism Detection Algorithm by Ordering Texts of a Document under Scrutiny. 1-6 - Chukwuemeka Ihekweazu, Khushi Gupta, Chiamaka Femi-Adeyinka, Naomi Aghado, Pat Ko:
Enhancing the Digital Forensics Presentation Phase Through Immersive Virtual Reality Training Environments. 1-6 - Md. Zakir Hossain Zamil, Tahir M. Khan:
AI-Driven Digital Evidence Triage in Digital Forensics: A Comprehensive Review. 1-6 - Eric Edge, James H. Jones, Kathryn B. Laskey:
Honeytrap Resilience: A Study of Malware Redirection Awareness. 1-7 - Anant Wairagade, Sumit Ranjan:
User Behavior Analysis for Cyber Threat Detection: A Comparative Study of Machine Learning Algorithms. 1-6 - Muhammad Umar Majigi, Richard Adeyemi Ikuesan, Ismaila Idris, Shafii Muhammad Abdulhamid:
Blockchain-Based Enhanced Secure Data Storage Model: A Framework for the Internet of Vehicle Networks. 1-7 - Mustafa Senol, Abdulsamet Hasiloglu:
Creating User-Centric and Artificial Intelligence-Enhanced Hybrid Authentication Systems and Policies: A Theoretical Approach. 1-6 - Zhanat Saukhanova, Sayat Raykul, Altynbek Sharipbay, Gulmira Shakhmetova, Alibek Barlybayev, Altay Khassenov:
Development of Two-Stage Steganography Method. 1-5 - Alpaslan Gökcen, Arda Arsik, Akhan Akbulut, Cagatay Catal:
Deep Learning-Based Classification of Software Bugs Using Code Context and AST Features. 1-5 - Manuel Alejandro Cardona-López, Juan Carlos Chimal-Eguía, Víctor Manuel Silva García, Rolando Flores-Carapia:
Analysis of the SHA Function Selection on the Security of a Digital Signature Scheme. 1-6 - MD Nazmul Haque Siam, Ehsan Hallaji, Roozbeh Razavi-Far:
Enhancing Cyberspace Security with Phishing Detection and Defense Using Machine Learning Models. 1-6 - Esma Beydili, Umut Can Çabuk, Gökhan Dalkiliç, Yusuf Öztürk:
Securing Blockchain-Based E-Voting Through Shamir's Secret Sharing over Ethereum. 1-6 - Shunmika Chidambaram, Swapna M. P:
MemLOL: Memory-Based LOLBins Dataset for Fileless Malware Detection. 1-5 - Aryan Kumar, Bharath Raja, Ashlin Furtado, Anoushka Vemireddy, Prasad B. Honnavalli, Sapna VM:
Source Identification of DeepFake Videos in Social Media-like Networks using Centrality Measures. 1-7 - Mohsen Aydi, Houssem Eddine Nouri, Olfa Belkahla Driss:
Multi-Objective Task Scheduling in Fog-Cloud Environments: LS-NSGA-II Optimization and Blockchain Integration for Enhanced Security and Efficiency. 1-6 - Maurel Kouekam, Fadoua Khennou:
Advancing IoMT Security with Privacy-Preserving Federated Learning Techniques. 1-8 - Sevinç Ay, Songül Karabatak, Murat Karabatak:
Artificial Intelligence and Classroom Management in Education: Evolution of Academic Studies and Research Trends. 1-6 - Christos Liambas, Athanasios Manios:
Advanced Forensic Analysis for Vehicle Speed Estimation: A Two-Video Comparison Approach. 1-6 - Nasreddine Abdelli, Abdelkamel Tari, Mohand Tahar Kechadi:
Multi-Stage Attack Traffic Detection Using Self-Supervised Learning. 1-6 - Timothy Laryea, Anwah Pascal, Tahir M. Khan:
A Digital Forensic Analysis of WhatsApp Artifacts in Windows 11 Operating System Using Microsoft Edge. 1-6 - Bryan Anderson, Gahangir Hossain:
Enhancing Kalman Filter Resilience in Electric Vehicles: Cyber-Attack Mitigation with Machine Learning Based Adaptive Filtering. 1-6 - H. M. H. M. Bandara, K. M. N. Ayeshani, M. M. P. M. Kumari, D. M. S. T. Wijerathna, Kavinga Yapa Abeywardena, Ayesha Wijesooriya:
Stealth Eye: Behavioral Analysis for Fileless Malware Detection. 1-6 - Natalija Vlajic, Melina Hajimi, Milos Stojadinovic:
Merging Attack Trees and MITRE ATT&CK Tactics for More Effective Attack Modeling. 1-8 - Sayed Abu Sayeed, Mir Mehedi Rahman, Samiul Alam, Naresh Kshetri:
FSCsec: Collaboration in Financial Sector Cybersecurity - Exploring the Impact of Resource Sharing on IT Security. 1-6 - Jean Rosemond Dora, Ladislav Hluchý:
PowerShell Proxy-Aware Intercommunication and Manipulation. 1-5 - Harry Joseph Vecchio-Ferrer, Elizabeth Marie Jijon, Maria M. Larrondo-Petrie:
Remote Laboratory Security Case Study: Physical and Digital Risks of FPGA and Raspberry Pi Farms. 1-5 - Sidahmed Benabderrahmane, Petko Valtchev, James Cheney, Talal Rahwan:
APT-LLM: Embedding-Based Anomaly Detection of Cyber Advanced Persistent Threats Using Large Language Models. 1-6 - Luis A. Rivera, James H. Jones:
Real-time Practical Analysis of Data Decay in Physical Memory. 1-6 - Amine Berqia, Habiba Bouijij, Manar Chahbi, Oussama Ismaili:
Predicting Cyberattacks on Connected Healthcare Devices Using LightGBM-based Approach. 1-6 - Md. Zakir Hossain Zamil, Md Raisul Islam, Sajib Debnath, Md Tuhin Mia, Md Anisur Rahman, Arindom Kisor Biswas:
Stroke Prediction on Healthcare Data Using SMOTE and Explainable Machine Learning. 1-6 - Jack Nunnelee, Alex Howe, Philip Rahal, Mauricio Papa:
Enhancing Intrusion Detection in Industrial Control Systems: An Adaptive Protocol-Agnostic Approach. 1-6 - Michael C. Todd, Gilbert L. Peterson:
Focus: A One-vs-All Resolution Strategy for Temporal Metadata Analysis. 1-6 - Zainatul Yushaniza Mohamed Yusoff, Mohamad Khairi Ishak, Lukman AB Rahim, Khalid Ammar:
Implementation of Device-to-Device Authentication with Middleware Broker System for Secure Smart Homes. 1-6 - Rohit Venkata Satya Kuppili:
DockerGate: Automated Seccomp Policy Generation for Docker Images. 1-6 - Irin Sultana, Syed Mustavi Maheen, Naresh Kshetri, Md Nasim Fardous Zim:
detectGNN: Harnessing Graph Neural Networks for Enhanced Fraud Detection in Credit Card Transactions. 1-6 - Sayed Abu Sayeed, Naresh Kshetri, Mir Mehedi Rahman, Samiul Alam, Abdur Rahman:
dataLDA: Analyzing Data Quality in Big Data Using Traditional Approaches vs. Latent Dirichlet Allocation - Systematic Review. 1-6 - R. D. D. L. K. Jayasinghe, M. W. K. L. Sasanka, D. A. S. M. Athukorala, M. A. D. Sandeepani, Anuradha Jayakody, Amila Senarathna:
Blockchain-Based Custody Evidence Management System for Healthcare Forensics. 1-6 - Natalia A. Bueno Pizarro, Juan Guillermo Lalinde-Pulido:
Enhancing Trust and Security in Learning Management Systems: Addressing Submission Concerns with Timestamp Transparency and Digital Signatures. 1-5 - Seydanur Ahi Duman, Atahan Duman, Rukiye Hayran, Ibrahim Sogukpinar:
A Multi-Layer Model of Psychological Factors and Parametric Approaches for Human-Centric Phishing Prevention. 1-5 - Büsra Tan Saatçi, Mustafa Ulas, Turan Gürgenç:
Thermographic Detection of Tool Wear: A Review on Deep Learning-Based Approaches. 1-5 - Abdullah Alan, Songül Karabatak, Murat Karabatak:
The Role of Machine Learning in Distance Education. 1-6 - Pranav Goda Narahari, Omkar Kulkarni, Anna Singh, Sathya Prasad:
SURF: Sequential Undersampling-Refinement Framework for Two-Stage Anomaly Detection. 1-6 - H. N. V. Sai Murali Krishna Tungala, Ganapathi Yeleswarapu, Mahesh Shivnatri, Sridhar Kumar Irujolla:
A Zero Trust Framework with AI-Driven Identity and Intrusion Detection for Multi-Cloud MLOps. 1-6 - Zhala Sarkawt Othman, Songül Karabatak, Murat Karabatak:
Bibliometric Analysis in AI Assistant for e-learning to Focus Students by Using Camera, Keyboard and Mouse. 1-6 - Olga Dye, Ebru Celikel Cankaya:
Cloud Service Analysis from the Security Principles Perspective. 1-6 - Hardi Matholia, Oluwasola Mary Adedayo:
Investigating NoSQL Injection Attacks on MongoDB Web Applications. 1-6 - Blake Pickett, Asaf Varol:
Strategic Placement of FACTS Devices for Optimizing Power Transmission Efficiency and Stability. 1-7 - Semih Cal, Ramazan Ozgur Dogan, Hülya Dogan:
Enhanced Multi-Head Self-Attention Transformer-Based Method for Prediction of Drug-Drug Interactions. 1-6 - Anil Sezgin, Gürkan Özkan, Aytug Boyaci:
Advancements and Challenges in AI-Powered Honeypots: A Comparative Study of Detection, Engagement and Ethical Implications. 1-6 - Neha Surendranath, Sai Annamaiah Basava Raju, Ranita Ganguly:
Migrating Traditional Applications to Cloud-Native DevOps: A Framework for Successful Cloud Migration and Modernization. 1-6 - Rosemary Uwem Usoroh, Ioana Ghergulescu, Arghir-Nicolae Moldovan:
Malware Detection in PDF and PE Files Using Machine Learning and Feature Selection. 1-6 - Jayanthi Ramamoorthy, Narasimha K. Shashidhar, Cihan Varol:
Automated Static Analysis of Linux ELF Malware: Framework and Application. 1-5 - Jenna Snead, Krishnendu Ghosh:
Deep Learning Models for Malware Family Detection. 1-6 - Elon Salfati, Harry Yu:
Trigger Labs: Advancing Malware Detection Through Realistic Scenario Simulation. 1-7 - Xiao Hu, Mingyang Xie, Akif Ahsen Ozer, Umit Karabiyik:
From TikTok to RedNote: A Comprehensive Mobile Forensic and Security Analysis on Android. 1-6 - Shamalka Perera, Shenuka Dias, Vishwadinu Vithanage, Avishka Dilhara, Amila Senarathne, Deemantha Siriwardana, Chethana Liyanapathirana:
Project HyperAdapt: An Agent-Based Intelligent Sandbox Design to Deceive and Analyze Sophisticated Malware. 1-6 - Mohammed Rauf Ali Khan, Ahmad Almulhem:
Behavioral and Propagation-Based Analysis of APT Attacks for Effective Attack Attribution. 1-8 - Hebert Silva, Thiago Gonçalves, Dirceu Lippi:
FIRM-OT: A Methodology for Cybersecurity Forensics and Incident Response in OT. 1-6 - Ding Wang:
Chaotic Time Series Forecasting Optimisation Based on Hybrid PSO Algorithm. 1-8 - Mario Raciti, Simone Di Mauro, Dimitri Van Landuyt, Giampaolo Bella:
To See or Not to See: A Privacy Threat Model for Digital Forensics in Crime Investigation. 1-6 - Gunay Abdiyeva-Aliyeva, Naila Allakhverdiyeva, Nihad Alili, Ilkin Balazade:
Evaluating Machine Learning Algorithms for Enhancing Network Intrusion Detection Systems: A Comparative Study. 1-4 - Mukesh Yadav, Peter J. Hawrylak:
Extent of an Attack in an Attack Graph: Method to Evaluate Evidence Set. 1-6 - Mariana Carvalho, Daniel Fernandes, Nuno Lopes, Óscar R. Ribeiro:
A Comparison of Supervised Learning Models on Distinct Datasets for Malware Detection. 1-5 - Ahmet Saatçi, Ergin Taskan, Mehmet Sahin:
A Deep Learning Approach for Rapid and Cost-Effective Detection of Pesticide Residues in Agricultural Products. 1-6 - Branly Alberto Martínez González, Malena Pérez Sevilla, Jaime Andrés Rincón Arango, Daniel Urda Muñoz:
IoT Cyberattack Detection via Fog Computing and Multilayer Perceptron Neural Networks. 1-5 - Abhay Kamath, Aditya Joshi, Aditya Sharma, Nikhil R. Shetty, Lenish Pramiee:
Automated Threat Detection in the Dark Web: A Multi-Model NLP Approach. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.