


default search action
CSR 2025: Chania, Crete, Greece
- IEEE International Conference on Cyber Security and Resilience, CSR 2025, Chania, Crete, Greece, August 4-6, 2025. IEEE 2025, ISBN 979-8-3315-3591-9

- Mamadou Niang, Haïfa Nakouri, Fehmi Jaafar:

SafetilBERT: an efficient and explained LLM for IoMT attacks classification. 1-8 - Mark Nelson

, Mehdi Mirakhorli:
Reimagining the Usermode Process Space by Utilizing Hardware-Enforced Sub-Process Isolation. 9-16 - Claudia Greco, Michele Ianni, Antonella Guzzo, Giancarlo Fortino:

Evasion of Deep Learning Malware Detection via Adversarial Selective Obfuscation. 17-22 - Weijie Niu, Zehao Zhang, Alberto Huertas Celdrán, Chao Feng, Jan von der Assen, Nasim Nezhadsistani, Burkhard Stiller:

DP-Tabula: Differentially Private Synthetic Tabular Data Generation with Large Language Models. 23-28 - Alaa Hijazi, Dany Mezher, Elie Zeidan, Carole Bassil:

A Machine Learning Approach to Automate Greybox Testing. 29-35 - Orion Papadakis, Michail Papadimitriou, Athanasios Stratikopoulos, Maria Xekalaki, Juan Fumero, Christos Kotselidis:

Offloading Key Switching on GPUs: A Path towards Seamless Acceleration of FHE. 36-41 - Dimitrios Tasiopoulos, Apostolos Xenakis, Alexios Lekidis

, Dimitrios Kosmanos, Costas Chaikalis, Vasileios Vlachos:
Towards DoS Attack Detection for IoT Systems: A Cross-Layer Oriented Approach Based on Machine Learning Techniques. 42-49 - Gueltoum Bendiab, Kamel Zeltni, Mohamed Bader-El-Den, Stavros Shiaeles

:
Audio-deepfake: Generation Methods, Legitimate Applications and the Potential for Misuse. 50-56 - François Marin, Pierre-Emmanuel Arduin, Myriam Merad:

Enhancing Deep Learning Based IDS Adversarial Robustness With Causal Inference. 57-62 - Nilufer Gulciftci, Mehmet Emre Gursoy:

Defending Against Beta Poisoning Attacks in Machine Learning Models. 63-70 - Gerard Shu Fuhnwi, Ann Marie Reinhold, Clemente Izurieta:

Reducing Human-Induced Label Bias in SMS Spam with Context-Enhanced Clustering (CEC). 71-76 - Gaurav Jadhav, Amit Kumar Singh, Zeba Khanam, Robert Hercock:

A Novel GNN-based Approach for Detection of Prompt Injection Attacks. 77-82 - Mehdi Akbari Gurabi, Ömer Sen, Navid Rahimidanesh, Andreas Ulbig, Stefan Decker:

Enhancing Cyber Threat Intelligence Sharing through Data Spaces in Critical Infrastructures. 83-90 - Giovanni Ciaramella, Fabio Martinelli, Antonella Santone, Francesco Mercaldo:

Explainable Ransomware Detection through Static Analysis and Machine Learning. 91-98 - Ekzhin Ear, Brandon Bailey, Shouhuai Xu:

Space Cyber Risk Management: Desired Properties. 99-104 - Roland Lamptey, Mohammad Saedi

, Vladimir Stankovic:
Machine-Learning Anomaly Detection for Early Identification of DDoS in Smart Home IoT Devices. 105-110 - Berkay Kemal Balioglu, Alireza Khodaie, Mehmet Emre Gursoy:

LDP3: An Extensible and Multi-Threaded Toolkit for Local Differential Privacy Protocols and Post-Processing Methods. 111-118 - Aytaj Badirova, Shirin Dabbaghi Varnosfaderani, Ramin Yahyapour:

Efficient and Privacy-Preserving Authentication Using Verifiable Credentials. 119-124 - Manabu Hirano, Ryotaro Kobayashi:

Evasive Ransomware Attacks Using Low-level Behavioral Adversarial Examples. 125-132 - Muhammed Erbas

, Jani Vanharanta, Jarkko Paavola, Leonidas Tsiopoulos, Risto Vaarandi:
Integrating Cyber Threat Intelligence into Threat Modeling for Autonomous Ships Using PASTA and MISP. 133-139 - Fawaz Kserawi, Gabriel Ghinita:

Budget-Conscious Differentially Private Aggregation of Power Data Timeseries. 140-145 - Marten Fischer, Ralf Tönjes, Rohit Bohara

, Mirko Ross, Achyut Hegde, Christian Wressnegger, Matthias Brunner:
Technological Framework for a Secure and Resilient Food Supply Chain. 146-152 - Leonardo Ambrus de Lima, Estevão Rabello Ussler, Miguel Angelo Santos Bicudo, Daniel Sadoc Menasché, Anton Kocheturov, Gaurav Kumar Srivastava:

Classification of Software Vulnerability Artifacts Using Public Internet Data. 153-158 - Iasonas Georgakas, Eva Papadogiannaki, Konstantinos Georgopoulos, Sotiris Ioannidis:

PCIe Monitoring for Secure Code Execution in Heterogeneous System Architectures. 159-165 - Wanrong Yang, Manhui Wang, Dominik Wojtczak:

Abstract Attack Intention Inference Using Low-Rank Gated Arithmetic Interactive Attention. 166-173 - Marie Louise Uwibambe, Akanksha Tyagi, Qinghua Li:

A Reinforcement Learning Approach to Multi-Parametric Input Mutation for Fuzzing. 174-179 - Ekzhin Ear, Brandon Bailey, Shouhuai Xu:

The Notional Risk Scores Approach to Space Cyber Risk Management. 180-185 - Pierre Fobougong Saha, Mohamed Mejri, Kamel Adi:

Optimized Security Measure Selection: Leveraging MILP Solvers To Balance Risk And Cost. 186-193 - Peng Cai, Mihai Lazarescu, Sie Teng Soh, Reza Ryan

:
Large Scale Cyber Security Log Classification Using Semi-Supervised Clustering. 194-199 - Deniz Aydin, Serif Bahtiyar:

Security Vulnerabilities in AI-Generated JavaScript: A Comparative Study of Large Language Models. 200-205 - Jack Wilkie

, Hanan Hindy, Christos Tachtatzis, Robert C. Atkinson
:
Contrastive Self-Supervised Network Intrusion Detection Using Augmented Negative Pairs. 206-213 - Rosario Rizza

, Riccardo Sisto, Fulvio Valenza:
Design and implementation of a tool to improve error reporting for eBPF code. 214-219 - Marten Fischer, Ralf Tönjes:

FE4MQTT - Using Functional Encryption to Improve the Privacy in Publish-Subscribe Communication Schemes. 220-225 - Karishma Rahman, Ann Marie Reinhold, Clemente Izurieta:

Metamorphic Relation Prediction for Security Vulnerability Testing of Online Banking Applications. 226-233 - Ugur Sen, Murat Osmanoglu, Ali Aydin Selçuk:

A Collusion-Resistant DECO-Based Attestation Protocol for Practical Applications. 234-239 - Dionysia Varvarigou, Konstantinos Lampropoulos, Odysseas G. Koufopavlou, Spyros G. Denazis, Paris Kitsos:

An Efficient Methodology for Real-Time Risk and Impact Assessment in 5G Networks. 240-247 - Sergio Ruiz-Villafranca, Luis Miguel García-Sáez, José Roldán Gómez, Javier Carrillo Mondéjar, Juan Manuel Castelo Gómez, José Luis Martínez:

Adaptive Weighted Ensemble Learning for Intrusion Detection in Industrial IoT and Edge Computing. 248-253 - Nikos Kyriakoulis, Charis Dimopoulos, George Daniil

, Konstantinos Lampropoulos, Vassilis Prevelakis, Panos Karantzias, Andreea Bianca Popescu, Angeles Fuentes-Exposito, Nikos Nikolaou, Spyridon Papastergiou, George Alexandris, Maria Tasouli, Georgios Karavias, Eleni Kosta
, Ovidiu Mihaila:
CONSENTIS - An Innovative Framework for Identity and Consent Management for EU Digital and Data Strategies. 254-259 - Loukas Kopanias, Panagiotis Sotiropoulos, Nicholas Kolokotronis, Costas Vassilakis:

MiniLib: A flow analysis-based approach for attack surface reduction through software debloating. 260-266 - Angelos Papoutsis, Athanasios Dimitriadis, Ilias Koritsas, Dimitrios Kavallieros, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris:

RuleXploit: A Framework for Generating Suricata Rules from Exploits Using Generative AI. 267-274 - Martin Martijan, Virgilijus Krinickij, Linas Bukauskas:

C2-based Malware Detection Through Network Analysis Using Machine Learning. 275-280 - Pavlos Cheimonidis

, Konstantinos Rantos:
A Bayesian-Markov Framework for Proactive and Dynamic Cyber Risk Assessment Driven by EPSS. 281-286 - Konstantina Bosinaki, Dimosthenis Natsos

, Giorgos Siachamis, Andreas L. Symeonidis:
From One Network to Another: Transfer Learning for IoT Malware Detection. 287-294 - Konstantinos Spalas, Nicholas Kolokotronis:

Post-Quantum Security Evaluation of Aeronautical Communications. 295-301 - Xinyu Wu, Zhenxin Wu, Hanyu Li:

Trusted Identity Authentication for Digital Scholarship Participants Based on Verifiable Credential. 302-307 - Jan von der Assen, Alberto Huertas Celdrán, Jan Marc Lüthi, José María Jorquera Valero, Francisco Enguix, Gérôme Bovet, Burkhard Stiller:

HyperDtct: Hypervisor-based Ransomware Detection using System Calls. 308-313 - Uriah Vendell Moore, Xiaohong Yuan, Hamidreza Moradi

:
Using Topic Modeling and LLMs to Recommend CAPEC Attack Patterns: A Comparative Study. 314-319 - Nida Zeeshan, Luigi La Spada, Makhabbat Bakyt

:
A Multi-level User Identity Authentication Scheme Based on Environmental Detection. 320-325 - Beny Nugraha, Mehrdad Hajizadeh, Tim Niehoff, Abhishek Venkatesh Jnanashree, Trung V. Phan, Dionysia Triantafyllopoulou, Oliver Krause, Martin Mieth, Klaus Moessner, Thomas Bauschert:

A Comprehensive 5G Dataset for Control and Data Plane Security and Resource Management. 326-333 - Angelos Papoutsis, Athanasios Dimitriadis, Dimitrios Kavallieros, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris, Georgios Meditskos:

CTI-GEN: A Framework for Generating STIX 2.1 Compliant CTI Using Generative AI. 334-341 - Anirban Basu, Masayuki Yoshino, Minako Toba:

Practical confidential data cleaning using trusted execution environments. 342-349 - Salvador Cuñnat Neguerole, Ioannis Makropodis, Lucía Cabanillas Rodríguez, Christos Xenakis, Ioannis Chouchoulis

, Carlos Enrique Palau, Ignacio Lacalle:
Scalable and Adaptive Security Framework for the IoT-Edge-Cloud Continuum. 350-357 - Muhammed Erbas

, Gábor Visky, Olaf Maennel, Leonidas Tsiopoulos, Risto Vaarandi:
PASTA Threat Modeling for Cyber Resilience and COLREG Compliance in Autonomous Ship Systems. 358-365 - Anahita Aria, Seyedeh Leili Mirtaheri, Seyyed Amir Asghari, Reza Shahbazian, Andrea Pugliese:

ResViT: A Hybrid Model for Robust Deepfake Video Detection. 366-371 - Stamatios Kostopoulos, Dimitra Papatsaroucha, Ioannis Kefaloukos, Evangelos K. Markakis:

eIDPS: A Comprehensive Comparative Analysis of Packet-Level and Flow-Level Intrusion Detection and Prevention. 372-378 - Georgios Siachamis, Georgios Papadopoulos, Andreas L. Symeonidis:

An AI-powered pipeline for enabling Self-Healing in Software Systems. 379-386 - Efi Kafali

, Christoforos N. Spartalis, Theodoros Semertzidis, Charalampos Z. Patrikakis, Petros Daras:
Designing AI Systems with Correction Mechanisms Towards Attack-Resilient Architectures. 387-392 - Adam Neal, Alberto Acuto

, Peter L. Green, Chris Lear, Nick Hare, Simon Maskell:
Accounting for the Impact of Real-World Data and Costs in Autonomous Cyber Defence. 393-400 - Utku Budak, Fabrizio De Santis, Osman Yasar, Malek Safieh, Georg Sigl:

A Lightweight Firmware Resilience Engine for Real-Time Operating Systems. 401-406 - Hadiseh Rezaei

, Rahim Taheri
, Ivan Jordanov
, Stavros Shiaeles
:
Adapt-LFA: Adaptive Gradient-Guided Label Flipping Attack Against Federated Learning-based Intrusion Detection in IoT. 407-412 - Mona Kriesten, Mamello Thinyane, David Ormrod:

A Structured Process for Scenario-Based Gamification of Cyber Threat Intelligence for Space System Security. 413-418 - Cagla Ipek Kocal, Onat Güngör, Aaron Tartz, Tajana Rosing, Baris Aksanli:

ReLATE: Resilient Learner Selection for Multivariate Time-Series Classification Against Adversarial Attacks. 419-424 - Evita Roponena, Sandra Lielbarde, Elizabete Citskovska

, Agne Brilingaite
, Linas Bukauskas, Ruta Pirta:
Mapping of Maritime Ecosystem Components in the Cybersecurity Landscape. 425-432 - Meha James, Thomas Newe, Donna O'Shea, George D. O'Mahony:

A Novel MQTT-ZT Secure Broker: Zero Trust Architecture for IoT Security. 433-439 - Rohit Bohara

, Mirko Ross, Omkar Joglekar:
Cybersecurity Mesh Architecture for Electric Vehicle Charging Infrastructure. 440-446 - Engin Zeydan, Josep Mangues-Bafalluy, Yekta Turk, Abdullah Aydeger, Madhusanka Liyanage

:
Optimizing Network Services with Quantum Dynamic Programming and Grover's Search. 447-452 - Muhammad Zeshan Naseer, Viktoria Fodor, Mathias Ekstedt:

Informed Defense: How Attacker Profiles Transform Vulnerability Assessments. 453-460 - Erik L. Moore, Steven Fulton, Tristen K. Amador, Roberta A. Mancuso, Isaac Martinez, Daniel M. Likarish:

Sunburst Vapor - A Cybersecurity Prompted Case Study of National-Scale Organizational Transformation. 461-468 - Rustem Dautov, Hui Song, Christian Schaefer, Seonghyun Kim, Verena Pietsch

:
Machine Learning Model Complexity as a Mitigation Strategy Against Industrial Espionage through Membership Inference Attacks. 469-475 - Nihala Basheer, Shareeful Islam, Spyridon Papastergiou, Eleni-Maria Kalogeraki:

Composite Product Cybersecurity Certification Using Explainable AI Based Dynamic Risk Assessment. 476-481 - Lea R. Muth, Marian Margraf:

An Approach for a Supporting Multi-LLM System for Automated Certification Based on the German IT-Grundschutz. 482-489 - R. Andrew Paskauskas:

A Preliminary Ontology for 5G Network Resilience: Hybrid Threats, Risk Reduction, Compliance. 490-497 - Gohar Sargsyan, Ernesto Damiani:

Using Legends Into AI-Based Business Decision Making: Embedding Ethics, Cybersecurity and Resilience. 498-503 - Grant Deffenbaugh, Srinidhi Kameneni:

Cyber Resilience Strategies Throughout the System Development Lifecycle. 504-509 - Babacar Mbaye, Mohamed Mejri, Pierre Fobougong Saha:

A Proposal for an Ontology to Enhance IT Architecture Resilience. 510-517 - Yingyan Zeng, Ismini Lourentzou, Xinwei Deng, Ran Jin:

FAIR: Facilitating Artificial Intelligence Resilience in Manufacturing Industrial Internet. 518-523 - Uakomba Uhongora, Mamello Thinyane, Yee Wei Law:

Development of an SDN-based Space System Simulation Framework for Intrusion Detection. 524-529 - Fahad Alsaeed, Emad Abukhousa, Syed Sohail Feroz Syed Afroz, Abdulaziz Qwbaiban, A. P. Sakis Meliopoulos:

Anomaly Identification in Power Systems Using Dynamic State Estimation and Deep Learning. 530-536 - Yaman Qendah, Stefan Katzenbeisser:

Driving Resilience: Assessing Security Incidents' Criticality in Autonomous Vehicles. 537-543 - Abdul Waheed Mohammed, Abbas Ali, Hasan Arif, Fazal Rahaman Pasha Mohammed, Hafiz Malik

:
A Lightweight IDS Framework Using FPGA-Based Hardware Fingerprinting on Zynq SoC. 544-549 - Buduka Cherish Nchelem, Amit Kumar Singh, Haralambos Mouratidis:

DFA: Dynamic Frame Alteration For Video Manipulation Attack in IoT Environments. 550-555 - Hoda Mehrpouyan:

Fault Tolerance vs. Attack Detection in Industrial Control Systems: A Deep Learning Approach. 556-561 - Gizay Kisa Isik, Akin Eker, Theo Tryfonas, George Oikonomou:

Security Risk Analysis of Logistical Support Solutions for MaaS and DLT-based Mitigations. 562-569 - L. W. Kevin Marquis, John A. Chandy:

CAN-MAID: An Intrusion Detection Protocol for CAN Bus. 570-577 - Engla Rencelj Ling, Mathias Ekstedt:

Application and Evaluation of a Substation Threat Modeling Language for Automatic Attack Graph Generation. 578-585 - Omar Achkar, Larry Nissen, Shahryar Raza, Rushikesh Shirsat, Neil Klingensmith, George Zouridakis, Kyuin Lee:

TPKEY: Using TPMS Signals for Secure and Usable Intra-Vehicle Device Authentication. 586-591 - Isaac Ahlgren, Rushikesh Shirsat, Omar Achkar, George K. Thiruvathukal, Kyuin Lee, Neil Klingensmith:

Not-so-Secret Authentication: The SyncBleed Attacks and Defenses for Zero-Involvement Authentication Systems. 592-599 - Marzieh Kordi, Nicolò Maunero

:
Ontology-driven Threat Modeling Analysis of CPSs. 600-605 - Stefano Perone, Simone Guarino, Luca Faramondi, Roberto Setola:

Vulnerability Assessment Combining CVSS Temporal Metrics and Bayesian Networks. 606-611 - Myria Bouhaddi:

Securing DRL-Based Traffic Signal Control Against Experience Replay Manipulation Attacks. 612-618 - Ahmed Amro, Georgios Kavallieratos

:
ThreatSpider: CTI-Driven Semi-Automated Threat Modelling for Cybersecurity Certification. 619-625 - Sani M. Abdullahi

, Sanja Lazarova-Molnar:
Cybersecurity-oriented Digital Twins: A Double-Edged Sword or a Game Changer? 626-631 - Alexander Geiger, Immanuel Hacker, Ömer Sen, Andreas Ulbig:

Towards Safety and Security Testing of Cyberphysical Power Systems by Shape Validation. 632-637 - Sneha Mohanty, Demetrios N. Papadopoulos, Christian Schindelhauer:

Evaluating Smart Home Privacy: The Relationship Between Encrypted Sensor Data and Occupancy Prediction Through Machine Learning. 638-645 - Valeria Bonagura, Chiara Foglietta, Stefano Panzieri, Federica Pascucci, Leonardo Badia

:
Strategic Interactions in Multi-Sensor Networks Against False Data Injection. 646-651 - Gencer Erdogan, Aida Omerovic, Eivind Solvang, Andreas Killingberg, Are Kvinnesland, Inge Abrahamsen Avinor:

Lessons Learned from a Cybersecurity Risk Assessment of OpenADR in Smart Grid Planning. 652-659 - Daniel Berger

, Aaron Lye
, Anton Maidl, Jannis Stoppe, Aljoscha Windhorst:
Post-Quantum Cryptography for Maritime Systems. 660-665 - Pierre-Augustin Berthet:

Indepth Analysis of a Side-Channel Message Recovery Attack Against FrodoKEM. 666-671 - Phu Hong Nguyen, Hui Song, Rustem Dautov, Nicolas Ferry, Angel Rego, Erkuden Rios, Eider Iturbe, Valeria Valdés, Ana Rosa Cavalli, Wissam Mallouli:

Knowledge Systematization for Security Orchestration in CPS and IoT Systems. 672-678 - Emma Sheppard, Zachary Wadhams, Dalton Arford, Clemente Izurieta, Ann Marie Reinhold:

Wicked Problem, Parsimonious Solution: Securing Electric Vehicle Charging Station Software. 679-686 - Armando Domi, Christos Zonios, Giorgos Tatsis, Anastasios Drosou, Dimitrios Tzovaras:

NetPacketformer: Real-Time, Context-Aware Network Intrusion Detection with Transformers. 687-692 - Solon Falas, Markos Asprou, Charalambos Konstantinou

, Maria K. Michael:
Data Manipulation Attack Mitigation in Power Systems Using Physics-Informed Neural Networks. 693-698 - Shadi Sadeghpour, Pooria Madani:

The Invisible Threat: Simulating and Analyzing the Coordinated Sensor Manipulation Attack (CSMA) on UAVs. 699-706 - Rocco Francisco Salazar Buttiglione, Alessandro Gallo

, Stefano Perone, Ernesto Del Prete, Roberto Setola:
A Real-Time Data Capture Probe for Anomaly Detection in Industrial Cyber-Physical Systems. 707-712 - Giovanni Maria Cristiano

, Salvatore D'Antonio, Jonah Giglio, Giovanni Mazzeo:
Implementation and Experimental Evaluation of Defense Techniques against Adversarial Attacks. 713-719 - Roberto Bagnato, Luca Notarianni, Anna Sabatini, Luca Vollero:

Security Challenges and Solutions in Containerized Environments: A Comprehensive Review. 720-724 - Alfredo Petruolo, Antonio Iannaccone

, Salvatore D'Antonio:
Towards a Privacy-Preserving Health Data Sharing: Architecture and Critical Implementation Factors. 725-730 - Gennaro Pio Rimoli, Vittorio U. Castrillo, Domenico Pascarella

, Massimo Ficco:
A Game-Theoretic Multi-Patroller Approach for Critical Infrastructure Monitoring. 731-736 - Siraj Ahmed Shaikh:

Addressing the Economics of Critical National Infrastructure (CNI) Security. 737-744 - Julija Saveljeva, Inga Uvarova

, Liga Peiseniece, Tatjana Volkova, Jekaterina Novicka, Gatis Polis, Silvija Kristapsone, Aivars Vembris:
Cybersecurity for Sustainability: A Path for Strategic Resilience. 745-752 - Even Eilertsen, Vasileios Mavroeidis, Gudmund Grov:

LLM-Powered Intent-Based Categorization of Phishing Emails. 753-758 - Chhagan Lal, Athanasios Vasileios Grammatopoulos, Michail Takaronis

, Muhammad Mudassar Yamin, Georgios Spathoulas, Christos Xenakis:
CYBERUNITY: A Federated Architecture for Next-Generation Cybersecurity Training. 759-764 - Antonios Paragioudakis, Michail Smyrlis, Georgios Spanoudakis:

ERMIS: A Cybersecurity Market for Assurance and Insurance-as-a-Service. 765-770 - Muhammad Mudassar Yamin, Basel Katt:

Modelling Attack and Defense Scenarios on Federated Cyber Ranges. 771-776 - Georgios Rizos, Nikos Kopalidis, Notis Mengidis, Antonios Lalas, Konstantinos Votis:

From Concept to Deployment: An AI Assistant for Generating and Configuring Cyber Range Scenarios. 777-782 - Emmanouil Vergis, Elli Alimperti, Stergios Asteriou:

The Challenges of Cyber-Insurance: The Case of Greece. 783-788 - Dimitra Smyrli, Vasilis Kakariaris, Michail Smyrlis:

Cyber Insurance in Emerging European Markets: A Case Study of Greece and Cyprus. 789-794 - Faraz Bashir Soomro

, Roberto Caviglia, Giovanni Battista Gaggero, Mageni Djihadi, Mario Marchese:
Integration of Forensic Analysis and Event Data Recorders in Automotive Regulation: A Proposed Approach. 795-800 - Danilo Greco

, Muhammad Saad Sohail, Mario Marchese:
Detection of C-V2X Spoofing Attacks using Physical Layer Features and Graph Neural Networks. 801-806 - Aviv Yehezkel, Eyal Elyashiv:

Cybersecurity for Connected Vehicle Networks: Leveraging Sampled Network Traffic Beyond the CAN Protocol. 807-811 - Sze Wei Tan, Md. Arafatur Rahman, Nadia Refat, Prashant Pillai:

VPTaaS: An AI-Driven Cybersecurity Framework for Connected Vehicles - Concept, Validation, and Feasibility Study. 812-817 - Md. Arafatur Rahman, Sze Wei Tan, Muhammad Saad Sohail, Giovanni Battista Gaggero, Fabio Patrone, Mario Marchese, Prashant Pillai:

CyberVehiCare: A Testbed for Cybersecurity of Vehicle to Everything (V2X) Automotive Systems. 818-823 - Evgenia-Niovi Sassalou, Stefanos Vasileiadis, Stylianos A. Kazazis, Georgia Protogerou, Nikos Varvitsiotis, Dimitrios S. Karas, Thanassis Giannetsos, Symeon Tsintzos:

A PUF-based Root-of-Trust for resource-constrained IoT devices. 824-831 - Enrico Frumento, Katharina Lange, Alessia Golfetti:

CYRUS - A personalised, customised, work-based training framework for enhanced CYbeR-security skills across indUstrial Sectors. 832-837 - Antonios Makris, Apostolos P. Fournaris, Anita Aghaie, Ioannis Arakas, Anna Maria Anaxagorou, Ioannis Arapakis, Davide Bacciu, Battista Biggio, Georgios Bouloukakis, Stavros Bouras, Arne Bröring, Antonio Carta, Marco Caselli, Olympia Giannakopoulou

, Nikolaos Gkatzios, Alexandros Gkillas, Evangelos Haleplidis, Sotiris Ioannidis, Eleni-Maria Kalogeraki, Panagiotis Karantzias, Emmanouil Kritharakis, Aris S. Lalos, David Lenk, Stella Markopoulou, Entrit Metai, Andreas Miaoudakis
, Haralambos Mouratidis, Jihane Najar, Theodor Panagiotakopoulos
, Bernhard Peischl, Maura Pintor, Nikos Piperigkos, Vassilis Prevelakis, Carlos Segura, Georgios Spanoudakis, Orestis Tsirakis, Omar Veledar, Konstantinos Tserpes:
CoEvolution: A Comprehensive Trustworthy Framework For Connected Machine Learning And Secure Interconnected AI Solutions. 838-845 - Sarantis Kalafatidis

, George Kitsos, Nikos Papageorgopoulos:
C-Shield: A Holistic Solution for Secure End-to-End Kubernetes Multi-Cluster Management and Online Threat Mitigation using LLMs. 846-853 - Manabu Hirano, Ryotaro Kobayashi:

Hypervisor-based Double Extortion Ransomware Detection Method Using Kitsune Network Features. 854-860 - Theodora Anastasiou

, Stavroula Iatropoulou, Sophia Karagiorgou:
On Learning with Confidentiality through Encrypted AI Pipelines. 861-866 - Nikolaos Fotos, Stefanos Vasileiadis, Thanassis Giannetsos:

Trust or Bust: Reinforcing Trust-Aware Path Establishment with Implicit Attestation Capabilities. 867-874 - Javeyon Vaughn, Yaa Takyiwaa Acquaah, Kaushik Roy:

Feature-Enhanced Deep Learning Models for Cyber-Physical System Security. 875-880 - Konstantina Milousi, Nikolaos Vakakis

, Aristeidis Mystakidis, Mariana S. Mazi, Antonis Voulgaridis, Christos Tjortjis, Konstantinos Votis, Dimitrios Tzovaras:
MOMENT: A Multi-Objective Mitigation Engine using NSGA-II Techniques for Cyber Threat Response. 881-886 - Asterios Mpatziakas, Ioannis Schoinas, Antonios Lalas, Anastasios Drosou, Nestor D. Chatzidiamantis, Dimitrios Tzovaras:

Deciphering Standards for cybersecurity in Industry 4.0: Advisory AI for Cybersecure IIoT. 887-892 - Balaji Venkateswaran Venkatasubramanian, Christos Laoudias, Mathaios Panteli:

Quantifying Cascading Impacts of Natural Hazards on Power-Communication Interdependent Networks. 893-898 - José Palma-Oliveira, Dalila Antunes, Beatriz Rosa, David Garcia Sanchez, Ana Sarroeira, Alessandro Cardoni:

Towards a new taxonomy of infrastructures: implications for resilience. 899-904 - Dalila Antunes, Alexandre Salgado, Vasco Figueiredo

, Nádia Oliveira, José Ferreira
, Gonçalo Santos-Jorge, José Palma-Oliveira:
Beyond Technical Skills: Human, Emotional, and Resilience Demands in CSIRT Operations. 905-910 - Evita Roponena, Ralfs Matisons, Elizabete Citskovska

, Patriks Gustavs Rinkevics, Ruta Pirta, Girts Priedols:
Smart Cities Under Threat: A Systematic Review and Conceptual Risk Model. 911-916 - George Lazaridis, Amalia Damianou, Antonios Lalas, Periklis Chatzimisios, Konstantinos Votis, Dimitrios Tzovaras:

Advancing B5G Security: An AI-Augmented Intrusion Detection System using a Real-Time Attack Generator. 917-922 - Dimitrios Psaltis, Konstantinos Ntouros

, Alexios Lekidis
, Sotirios Brotsis, Nicholas Kolokotronis:
Evaluating 5G-enabled EV Charging Infrastructure's Resilience Through Stealthy Cyber-Attacks. 923-928 - Mohamed Faisal Elrawy, Lenos Hadjidemetriou, Christos Laoudias, Maria K. Michael:

Detection of Masquerade Attacks on Protection of Digital Substations Using Real-Time Measurements. 929-935 - Charis Eleftheriadis, Georgios Andronikidis, Anastasios Lytos, Eleftherios Fountoukidis, Paris-Alexandros Karypidis, Thomas Lagkas, Vasileios Argyriou, Ioannis Nanos, Panagiotis G. Sarigiannidis:

Neural Cryptanalysis of Lightweight Block Ciphers Using Residual MLPs. 936-943 - George Amponis, Panagiotis I. Radoglou-Grammatikis

, Thomas Lagkas, Vasileios Argyriou, Antonios Sarigiannidis, Natasa Kazakli, Thomas Boufikos, Panagiotis G. Sarigiannidis:
Fortified Control-Plane Encapsulation with Session-Key Derivation for Secure IP Mesh Routing. 944-949 - Dimitrios Christos Asimopoulos, Panagiotis I. Radoglou-Grammatikis

, Panagiotis E. Fouliras, Konstandinos Panitsidis, Georgios Efstathopoulos, Thomas Lagkas, Vasileios Argyriou, Igor Kotsiuba, Panagiotis G. Sarigiannidis:
Surrogate-Guided Adversarial Attacks: Enabling White-Box Methods in Black-Box Scenarios. 950-956 - George E. Raptis, Muhammad Taimoor Khan, Christos Koulamas

, Dimitrios Serpanos:
LLM-based Generation of Formal Specification for Run-time Security Monitoring of ICS. 957-962 - Abdulazeez AlAli, George Theodorakopoulos, Abdullah Emad:

Efficient Classification of Partially Faked Audio Using Deep Learning. 963-968 - Fiammetta Marulli, Lelio Campanile, Gennaro Ragucci, Sabatino Carbone, Marianna Bifulco:

Data Generation and Cybersecurity: A Major Opportunity or the Next Nightmare? 969-974 - Giovanni Ciaramella, Fabio Martinelli, Antonella Santone, Francesco Mercaldo:

Explainable Malware Detection by means of Federated Machine Learning. 975-982 - Luca Petrillo, Fabio Martinelli, Antonella Santone, Francesco Mercaldo:

An Explainable Method for Access Control Policies Classification. 983-989 - Alkistis Aikaterini Sigourou, Zoya Dyka, Peter Langendoerfer, Ievgen Kabin:

Atomic Patterns: Field Operation Distinguishability on Cryptographic ASICs. 990-995 - Samuel Kennedy, Basel Halak:

Acceleration of McEliece Cryptosystem with Instruction Set Extension for RISC-V. 996-1001 - Jing He

, Mark Zwolinski:
Miti-CAT: Mitigating Power Side-Channel Vulnerabilities in FPGA-Based CNN Accelerators Through Distributed Convolution Computation. 1002-1007 - Mahreen Khan, Maria Mushtaq, Renaud Pacalet, Ludovic Apvrille:

SpectreShield: Design and Analysis of Spectre Countermeasures on RISC-V Using gem5. 1008-1015 - Arman Allahverdi

, Vincent John Mooney:
A Hardware-Efficient AEAD Stream Cipher Based on a Hybrid Nonlinear Feedback Register Structure. 1016-1023 - Kareem Ahmad, Ece Öztürk

, Ceyda Körpe, Hyunsoo Yang, Junbin Yang, Kanishk Tihaiya, Ryanh Tran, Günhan Dündar, Vincent John Mooney, Kemal Ozanoglu:
Protection of the Digital Circuitry of a Single-Slope ADC Against Side-Channel Attacks. 1024-1030 - Ioannis Papadopoulos, Dimitris Merkouris, Christos Dalamagkas, Nikolaos Nikoloudakis, Athanasios Arvanitis:

Attacking the DLMS/COSEM Advanced Metering Infrastructure. 1031-1036 - Adamantini Peratikou, Evagoras Charalambous, Panayiota Smyrli

, Stavros Stavrou:
ATHENA: A Federated Architecture for Cross-Border Cybersecurity Operations and Situational Awareness. 1037-1042 - Remus M. Petrache, Camelia Lemnaru:

A Hybrid Transformer-LLM Pipeline for Function Name Recovery in Stripped Binaries. 1043-1048 - Diana-Elena Petrean, Rodica Potolea:

Privacy-Preserving Classification of Partially Encrypted Feature Vectors using Multi-Key Homomorphic Encryption. 1049-1056 - Dimitrios Kasimatis

, Pavlos Papadopoulos, William J. Buchanan, Christos Chrysoulas
, Sarwar Sayeed, Alexios Mylonas, Nikolaos Pitropakis:
DISTIL: Digital Identities for the Evaluation of Job Skills. 1057-1062 - Michail Smyrlis, Evangelos Floros

, Nikolaos Nikoloudakis, Eliana Stavrou, Dimitris Merkouris, Athanasios Arvanitis, Georgios Spanoudakis, Stelios E. Papadakis, Georgios Potamos, Stavros Stavrou:
SecAwarenessTruss: A Federated Cyber Range Solution for Critical Infrastructures. 1063-1068 - Andreea Dance, Andreas Fraticiu, Ciprian Oprisa:

Fraud Detection in Web Content Using Machine Learning and Natural Language Processing. 1069-1074 - Konstantinos Ntouros

, Eleftherios Poulitsis, Sotirios Brotsis, Konstantinos-Panagiotis Grammatikakis
, Nicholas Kolokotronis:
DLT-EVA: Hardening O-RAN Auditing and Digital Evidence Preservation Through Blockchain. 1075-1081 - Gueltoum Bendiab, Meriem Guerar, Houda Haiouni, Luca Verderame:

Zero-Trust and Reinforcement Learning for Secure Federated Intelligence in 6G Edge Networks. 1082-1087 - Khadidja Belhi, Souad Chabbi, Meriem Guerar:

AI-Enhanced Hybrid CFAR for 6G Integrated Sensing and Communication (ISAC). 1088-1093 - Syed Rizvi, Bander Ali Saleh Al-Rimy, Nasreen Anjum, Aikaterini Kanta:

Evaluating Forensic Log Readiness in Simulated 6G Networks. 1094-1099 - Emma Perales, Romain Verdy-Ricard, Mohamed Aymen Labiod, Gueltoum Bendiab, Yasmina Chenoune:

Federated Learning for Securing Medical Imaging Against Deepfakes in 6G Smart Hospitals. 1100-1105 - Daniel Zhukovsky, Muhammad Taimoor Khan:

Vulnerability Analysis of Web 3.0 based Decentralised Oracle Networks. 1106-1112 - George Hatzivasilis, Sotiris Ioannidis:

CyberHeraclius: Cyber Defence Evaluation Methodology. 1113-1118 - Sani M. Abdullahi

, Manuel Götz, Sanja Lazarova-Molnar:
Simulation-Based Analysis of OPC UA Set-Up Vulnerability and Its Security Risks in Cyber-Physical Manufacturing Systems. 1119-1126 - Nikos Fotiou, Lefteris Georgiadis, George C. Polyzos, Vasilios A. Siris:

Securing firmware updates using Transparency and Traceability services. 1127-1132

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














