


default search action
ISDFS 2025: Boston, MA, USA
- 13th International Symposium on Digital Forensics and Security, ISDFS 2025, Boston, MA, USA, April 24-25, 2025. IEEE 2025, ISBN 979-8-3315-0993-4

- Avinash Kumar, Nuri Alperen Kose, Kubra Kose, Hyuk Cho:

NIDS Using Hierarchical Attack Structure and Transformer. 1-8 - Amine Berqia, Oussama Ismaili, Manar Chahbi, Habiba Bouijij:

Advanced DDoS Detection in Online Learning Environments. 1-5 - Umang Patel, Shruti Bhilare, Avik Hati:

Speed as an Instrument: Exploiting Time-Scale Modification for Adversarial Attacks and Defenses in Speaker Recognition Systems. 1-6 - Jet Le, Mihai Lazarescu, Sie Teng Soh, Reza Ryan

, Peng Cai, Qian Li:
On the Application of Fundamental Clustering Methods to Large Scale Cyber Security Log Classification. 1-6 - Victor Obojo

, Richard Adeyemi Ikuesan, AbdulKabir Adekanye, Elias Iortom:
The Importance of Dark Web Access in Cyber Threat Intelligence. 1-6 - Muhammad Raheel Raza

, Shahbaz Ahmed, Fahad Ahmed KhoKhar
, Asaf Varol
:
Exploring the Potential of DeepSeek-R1 Model in Transforming Healthcare Solutions: An Overview. 1-4 - David Shapiro, Victor Fedoseev:

Protection of 3D Models by QIM Watermarking with Reduced Distortion. 1-5 - Chris Clark, Hala Strohmier Berry, Bryce Sullivan, Nicholas Maroney, Jonathan Galbraith:

Malware Exploitation and Vulnerability Assessment of CVE-2024-38063 in Windows 10 and 11 in Academic Networks Cybersecurity. 1-5 - Tugba Elmas, Adrien Chardon Fabian, Cihan Varol, Asaf Varol

:
Hardware Performance Evaluation of Freeware ETL Tools. 1-5 - Muhammad Irfan

, Myung J. Lee, Ashar Neyaz, Daiki Nobayashi:
A Novel Multi-Scale Spectral-Guided Graph Attention Network for DeepFake Video Detection. 1-7 - Hebert de Oliveira Silva, Aldrey Pedrazoli, Sergio Nascimento, Regina Moraes:

Ensuring Privacy in the Labour Market: Towards Full Compliance with LGPD and GDPR. 1-6 - Grazia Garzo, Alessandro Palumbo:

Legal & Ethical Implications of Predictive Digital Techniques in the Judicial Criminal Proceedings. 1-6 - Yagmur Çigdem Aktas, Jorge García Castaño:

CLIP-based Few-Shot Multi-Label Classification Methods: A Comparative Study. 1-6 - Boubacar Tawayé Abdoul Aziz, Mahamadou Issoufou Tiado, Boukar Abatchia Nicolas, Boureima Djibo Abasse:

Intrusion Detection System Based On Machine Learning Algorithms In the DOUNG Ad Hoc Network. 1-5 - Chennaiah Madduri, Ranita Ganguly, Dishant Banga:

Assessing the Usability of an AI-Powered Mobile App on Student Engagement in Remote Field Activities. 1-4 - Asmath Zakey, Dinura Bawantha, Dinuth Shehara, Nethmi Hasara

, Kavinga Yapa Abeywardena, Harinda Fernando:
A Dual-Branch CNN and Metadata Analysis Approach for Robust Image Tampering Detection. 1-6 - Khurram Shahzad, Muhammad Raheel Raza

, Asaf Varol
:
Security Threats Mitigation for Internet of Vehicles Using Cryptographic Protocols. 1-6 - Hala Strohmier Berry, Brecken Merrill, Shamreen Shakil Shaikh, Mary Alice Woolington:

A Comprehensive Comparative Analysis of RFID Devices Security in Supply Chain Geofencing Technologies. 1-4 - Hossein Jamali, Josh Watson, Sergiu M. Dascalu, Frederick C. Harris Jr.:

Harmonized Data Drive: Standardizing and Unifying Smart Car Information Storage for Enhanced Forensics and Interoperability. 1-6 - Bahaddin Erdem

, Murat Karabatak
:
Academic Fraud Detection in Online Exams with DNN's Multilayer Model. 1-6 - Razaq Jinad, ABM Islam, Narasimha Shashidhar:

Machine Learning Approaches for Classifying Encrypted Files. 1-7 - Thangavel Murugan

, Fotoon Khalifah Abdullah, Ghalya Salem Mohamed Alshuraiqi Almehrzi, Eiman Mohamed Mohamed Alsereidi, Aisha Aldahmani, Eiman Mubarak Masoud Alahbabi, N. Nasurudeen Ahamed
:
Almiqanaas T - A Crime Scene Evidence Detector. 1-6 - Ankur Chattopadhyay, Mohammad Q. Azhar, Ezra Faith, Alexandra Lisa, Oksana Piven, Suhaas Ravela:

Towards A Unique User-Centric Security & Privacy (S&P) Label For Social Robots. 1-7 - Bruno Silva

, Patrícia Leite, Óscar R. Ribeiro:
Evaluating Spam Detection Techniques: A Comparison of TF-IDF and Sentence Embeddings with Machine Learning Models. 1-4 - Grazia Garzo, Alessandro Palumbo:

Human-in-the-Loop: Legal Knowledge Formalization in Attempto Controlled English. 1-6 - Nadir Can Kavkas, Kazim Yildiz:

Enhancing loMT Security with Deep Learning Based Approach for Medical IoT Threat Detection. 1-5 - Firoz Khan, C. Sai Varun

, Balamurugan Balusamy
, Jeevanandam Jotheeswaran:
Quantized Hybrid Privacy Preserving Approach for Federated Learning with Flower Framework. 1-7 - Gordey Danilochkin, Fedir Ensary, Eva Tuba:

Muffins vs. Chihuahuas Revisited: Exploring Zero-Shot and Few-Shot CLIP-Based Methods for Similar Object Classification. 1-6 - Asura Akter Sunna

, Tanzina Sultana
, Naresh Kshetri
, Mohammed Majbah Uddin
:
AssessCICA: Assessing and Mitigating Financial Losses from Cyber Attacks with Role of Cyber Insurance in Post-Pandemic Era. 1-6 - Din Mohammad Dohan, Naheyan Prottush, Md. Ashiq Ul Islam Sajid, Sudipta Mondal, Sumaya Binte Zilani Choya, Md. Golam Rabiul Alam:

Customer Personality Analysis Using Machine Learning with Explainable AI. 1-6 - Jayanthi Ramamoorthy, Narasimha K. Shashidhar, Cihan Varol:

Packers and Features: Efficacy of Static Analysis for Packed Linux Malware. 1-6 - Boitumelo Nkwe, Michael Kyobe:

Using Machine Learning Techniques to Address IoT Forensics Challenges. 1-6 - Anil Sezgin, Gürkan Özkan, Esra Cosgun:

Leveraging Large Language Models in Software Testing: A Review of Applications and Challenges. 1-7 - Haywood Gelman, John D. Hastings

:
Scalable and Ethical Insider Threat Detection through Data Synthesis and Analysis by LLMs. 1-6 - Songül Karabatak, Aysenur Kuloglu, Müslim Alanoglu, Ezgi Bozkurt:

Unity-Supported Game-Based Learning: Teachers' Perspectives on the Development of Classroom Management Skills. 1-6 - Pawara Gunathilaka, Dinal Senadheera, Shenan Perara, Chamithu Gunawardana, Samantha Thelijjagoda, Jenny Krishara

:
Context-Aware Behavior-Driven Pipeline Generation. 1-6 - Songül Karabatak, Müslim Alanoglu, Aysenur Kuloglu, Ezgi Bozkurt:

Digital Assistants: AI to Reduce Teachers' Expectations of Reality Shock. 1-6 - Chaitanya Rahalkar, Anushka Virgaonkar:

Reconciling Safety and Privacy: A Systematic Review of Moderation in End-to-End Encrypted Messaging. 1-7 - Adiba Mahmud, Yasmeen Rawajfih, Fan Wu:

An Ensemble Transformer Approach with Cross-Attention for Automated Code Security Vulnerability Detection and Documentation. 1-6 - Ashar Neyaz, Avinash Kumar, Bingyu Liu:

Digital Forensics Analysis of iMazing Phone Explorer Tool to Aid Mobile Forensics Investigation. 1-8 - Nurettin Selcuk Senol, Anitha Chennamaneni, Amar Rasheed, Ahmet Furkan Aydogan:

Leveraging Machine Learning for Effective Device Detection and Security in LoRa-Based IoT Systems. 1-6 - Arda C. Varol, Larissa T. Coffee:

Gaming Without Harm: AI-Driven Content Moderation to Improve Safety in Roblox. 1-4 - Munirah Aljuwair, Emad-ul-Haq Qazi, Tanveer A. Zia:

Internet of Things (IoT) Forensics: Chip-Off Forensics. 1-6 - Amina Alnaqbi, Meera Alblooshi, Hessa Ali Nasser, Niyat Habtom, Farkhund Iqbal:

Forensic Investigations in the Age of AI: Identifying and Analyzing Artifacts from AI-Assisted Crimes. 1-6 - Thrushna Matharasi, Priyam Ganguly

:
Solving the Financial, Operational, and Reputational Impact of Commercial Fleet Collisions: Challenges and Mitigation Strategies Using Data-Driven Decision-Making Process. 1-4 - Said Berrezueta

, Maria G. Baldeon Calisto, Danny Navarrete, Noel Pérez-Pérez, Ricardo Flores Moyano, Daniel Riofrío, Diego S. Benítez:
Foundation Models for Medical Image Segmentation: A Literature Review. 1-7 - Amani Bacha, Farah Barika Ktata, Olfa Belkahla Driss

:
Multi-Agent Deep Q-Network Based Ant Colony Optimization for Advanced Network Intrusion Detection. 1-6 - Rui Fernandes

, Nuno Lopes, Joaquim Gonçalves, John Cosgrove
:
Comparing Traditional Hacking Tools and AI-Driven Alternatives. 1-5 - George Thompson, Serkan Varol, Derya Ucuz, Zachary Ridder:

Bridging Gaps in Understanding College Graduation Rates. 1-7 - Margorie Pérez, Danny Navarrete, Maria G. Baldeon Calisto, Yuvinne Guerrero, André Sarmiento:

Unlocking Student Success: Applying Machine Learning for Predicting Student Dropout in Higher Education. 1-6 - Vedant Gupta, Yuting Zhang:

From Snap to Evidence: Snapchat Footprint on iOS. 1-6 - Michael Stalford, Luis Felipe Zapata Rivera, Catalina Aranzazu Suescun:

Enhancing Online Laboratories' Security Through the Use of RFID Technology. 1-6 - Ahmet Furkan Aydogan, Cihan Varol, Hamadou Saliah-Hassane:

Security Assessments of Data Transfer Phase of Adapted EEG System in Learning Systems. 1-7 - Neha Adhikari, Manan Chhajed, Divya Raichura, Prasenjit Bhavathankar:

LexChain: A Blockchain-based Solution to Safeguard Electronic Evidence in Legal Systems. 1-6 - Abhinav B. V, Abhirup MVNS, Adithya D. Shetty, Akash Bhat, Clara Kanmani A:

Dynamic Threat Detection and Mitigation Using AI-Infused Firewalls. 1-5 - Weijie Pang, Ayrton Joseph DiPina, Ashar Neyaz:

Enhancing Phishing Website Detection with Machine Learning Algorithms. 1-5 - Megha Gopakumar, Saranya Chandran:

Detection of Dynamic Code Loading in Android. 1-6 - Khushi Gupta, Cihan Varol, Hamadou Saliah-Hassane:

Evaluating IEEE P2834.1 Standard: Use Case Scenarios for Enhancing Digital Forensics in Trusted Learning Systems. 1-7 - LD Herrera

:
Romance Scam Victimization: A Survey-Based Examination of Financial, Psychological, and Reporting Factors. 1-6 - Virguens Honorius, Cihan Varol:

Illuminated Secrets: Exploiting Display Brightness for Out-of-Band Optical Covert Communication. 1-6 - Alex Howe, Mauricio Papa:

Edge-Focused Temporal Graph Autoencoders for Anomalous Link Prediction in OT Networks. 1-6 - Murat Karabatak, Sevinç Ay, Songül Karabatak:

A Scientific Discovery in Virtual Reality and Augmented Reality Enriched with Artificial Intelligence. 1-5 - Jayaprakashreddy Cheenepalli

, John D. Hastings
, Khandaker Mamun Ahmed
, Chad Fenner
:
Advancing DevSecOps in SMEs: Challenges and Best Practices for Secure CI/CD Pipelines. 1-6 - Ramakrishna Garine

, Sunil Pradhan Sharma:
Probabilistic Deep Learning for Energy Time Series Forecasting: A Comparative Study. 1-6 - Prashant Vajpayee, Chittal Karuppiah, Gahangir Hossain

:
Insider Threat Pattern Detection Using Deep Learning to Evaluate Cyber Value at Risk (CVaR). 1-5 - Chunlan Gao, Yubao Wu:

Recognizing the Financial Fraud Type of Telegram Advertisement Posts Based on the Multimodal Learning. 1-6 - Chase Maschinot, Ankur Chattopadhyay, Seth Adjei:

COVID Infodemic Advisor (CIA): An Online Recommender For Content Consumers & Providers. 1-7 - Prajna Bhandary

, Charles Nicholas:
A Behavioral Analysis of Ransomware in Active Directory: A Case Study of BlackMatter, Conti, LockBit, and Midnight. 1-6 - Gary A. McCully, John D. Hastings

, Shengjie Xu, Adam Fortier:
Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code. 1-6 - Hajar Ouazza

, Fadoua Khennou, Abderrahim Abdellaoui:
Adversarial Retraining and White-Box Attacks for Robust Malware Detection. 1-6 - Chaitanya Krishnama, Raghavender Puchhakayala, Sudarshan Kotha, Faiz Gouri:

Cost-Optimized Cloud Scheduling for ETL and Big Data Using AI. 1-6 - Thrushna Matharasi, Priyam Ganguly, Isha Mukherjee

, Sanjeev Lakkaraju:
Enhancing Breast Cancer Detection with AI: Ensuring Image Security and Diagnostic Precision Through Deep Learning Techniques. 1-5 - Hariprasad Holla, Arun Ambika Sasikumar, Chandu Gutti, Karthik Thumula, Hemanth Gogineni:

Advanced Privacy and Security Techniques in Federated Learning Against Sophisticated Attacks. 1-6 - Fulya Görkem Orhan

, Aysenur Kuloglu
:
The Relationship Between Secondary School Students' Digital Game Addictions and Their Responsibilities Toward Learning. 1-5 - Hala Strohmier Berry, Keenan Golston, Autumn Hurley, Jadon Ott

, Julian Ward:
Critical Factors for Privacy and User Retention in Event-Based Social Media Apps. 1-6 - Zefang Liu:

AutoBnB: Multi-Agent Incident Response with Large Language Models. 1-6 - Ngoc Tuong Vy Nguyen, Felix D. Childress, Yunting Yin:

Debate-Driven Multi-Agent LLMs for Phishing Email Detection. 1-5 - Arafat Asim, Peter J. Hawrylak:

Leveraging Feature Engineering and Machine Learning for Internet of Things (IoT) Cyberattack Detection: A Scalable Approach. 1-6 - André Araújo

, David Rodrigues
, Patrícia Leite
, Joaquim Gonçalves
:
Network Intrusion Detection System Based on Multiple Datasets: Machine Learning Approaches. 1-5 - Adoum Youssouf, Abdramane Issa, Daouda Ahmat:

Privacy-Preserving Secret Sharing using Fully Homomorphic Encryption. 1-6 - K. C. Choo:

Keynote Speaker of ISDFS 2025. 1 - Khushi Gupta, Phani Lanka, Cihan Varol:

A Framework to Automate the Digital Forensics Pipeline of Electron-based Social Media Applications. 1-6 - Mahra Mohammed Alnaqbi, Shaikha Tareq Alblooshi, Elyazia Abdulla Alshamsi, Niyat Seghid, Farkhund Iqbal:

An Empirical Analysis of Security and Privacy Issues Associated with Selling and Purchasing of Secondhand Storage Devices. 1-7 - Pedro Ferreira

, Enmanuel Martins
, Joaquim Silva
, Paulo Teixeira
:
Feature Selection and XGBoost for Enhanced Intrusion Detection: A Comparative Study Across Benchmark Datasets. 1-6 - Omar Farshad Jeelani:

Anomaly Detection in Metaverse Healthcare for 6G-Enabled Internet of Things: An Approach Based on Feature Selection. 1-6 - Farhad Mofidi

, Sena G. Hounsinou, Gedare Bloom:
CrossSentry: A Cross-Layer Approach to Ransomware Detection in IoT. 1-6 - Bashaer Mohamed Alsalami, Richard Ikuesan:

An Integrated Framework for Video-Based Deepfake Forensic Analysis. 1-5 - Md. Zakir Hossain Zamil

, Byoung Jik Lee:
Enhancing Brain Tumor Detection Using a CNN-Powered Android Application. 1-6 - Sam Pastoriza, Iman Yousfi, Christopher Redino, Marc Vucovich, Abdul Rahman, Sal Aguiñaga, Dhruv Nandakumar:

Retrieval Augmented Anomaly Detection (RAAD): Nimble Model Adjustment Without Retraining. 1-6 - Kerem Erciyes, Mustafa Soydan, Özgür Gümüs:

Deep-Learning Based 3D Lung Segmentation. 1-6 - Chaoyue Huang, Hanzhou Wu:

A Game Between the Defender and the Attacker for Trigger-Based Black-box Model Watermarking. 1-6 - Songül Karabatak, Sevinç Ay, Murat Karabatak:

Artificial Intelligence Applications in Education Within the Scope of the National Artificial Intelligence Strategy in Turkey. 1-4 - Rebecca Kipanga Masele, Fadoua Khennou:

Leveraging Feature Selection and Deep Learning for Accurate Malware and Ransomware Detection in PE Files. 1-6 - Jacob Fricano, Nicholas Geigel, Daryl Johnson:

Covert Channels Through Docker Image Manipulation. 1-6 - Muhammad Nomani Kabir

, Yasser M. Alginahi
:
An Efficient Plagiarism Detection Algorithm by Ordering Texts of a Document under Scrutiny. 1-6 - Chukwuemeka Ihekweazu, Khushi Gupta, Chiamaka Femi-Adeyinka, Naomi Aghado, Pat Ko:

Enhancing the Digital Forensics Presentation Phase Through Immersive Virtual Reality Training Environments. 1-6 - Md. Zakir Hossain Zamil

, Tahir M. Khan:
AI-Driven Digital Evidence Triage in Digital Forensics: A Comprehensive Review. 1-6 - Eric Edge, James H. Jones, Kathryn B. Laskey:

Honeytrap Resilience: A Study of Malware Redirection Awareness. 1-7 - Anant Wairagade, Sumit Ranjan:

User Behavior Analysis for Cyber Threat Detection: A Comparative Study of Machine Learning Algorithms. 1-6 - Muhammad Umar Majigi, Richard Adeyemi Ikuesan, Ismaila Idris, Shafii Muhammad Abdulhamid:

Blockchain-Based Enhanced Secure Data Storage Model: A Framework for the Internet of Vehicle Networks. 1-7 - Mustafa Senol, Abdulsamet Hasiloglu:

Creating User-Centric and Artificial Intelligence-Enhanced Hybrid Authentication Systems and Policies: A Theoretical Approach. 1-6 - Zhanat Saukhanova, Sayat Raykul, Altynbek Sharipbay, Gulmira Shakhmetova, Alibek Barlybayev, Altay Khassenov:

Development of Two-Stage Steganography Method. 1-5 - Alpaslan Gökcen

, Arda Arsik, Akhan Akbulut, Cagatay Catal:
Deep Learning-Based Classification of Software Bugs Using Code Context and AST Features. 1-5 - Manuel Alejandro Cardona-López, Juan Carlos Chimal-Eguía, Víctor Manuel Silva García, Rolando Flores-Carapia:

Analysis of the SHA Function Selection on the Security of a Digital Signature Scheme. 1-6 - MD Nazmul Haque Siam, Ehsan Hallaji, Roozbeh Razavi-Far:

Enhancing Cyberspace Security with Phishing Detection and Defense Using Machine Learning Models. 1-6 - Esma Beydili, Umut Can Çabuk, Gökhan Dalkiliç

, Yusuf Öztürk:
Securing Blockchain-Based E-Voting Through Shamir's Secret Sharing over Ethereum. 1-6 - Shunmika Chidambaram, Swapna M. P:

MemLOL: Memory-Based LOLBins Dataset for Fileless Malware Detection. 1-5 - Aryan Kumar, Bharath Raja, Ashlin Furtado, Anoushka Vemireddy, Prasad B. Honnavalli, Sapna VM

:
Source Identification of DeepFake Videos in Social Media-like Networks using Centrality Measures. 1-7 - Mohsen Aydi, Houssem Eddine Nouri, Olfa Belkahla Driss

:
Multi-Objective Task Scheduling in Fog-Cloud Environments: LS-NSGA-II Optimization and Blockchain Integration for Enhanced Security and Efficiency. 1-6 - Maurel Kouekam, Fadoua Khennou:

Advancing IoMT Security with Privacy-Preserving Federated Learning Techniques. 1-8 - Sevinç Ay, Songül Karabatak, Murat Karabatak:

Artificial Intelligence and Classroom Management in Education: Evolution of Academic Studies and Research Trends. 1-6 - Christos Liambas, Athanasios Manios

:
Advanced Forensic Analysis for Vehicle Speed Estimation: A Two-Video Comparison Approach. 1-6 - Nasreddine Abdelli

, Abdelkamel Tari, Mohand Tahar Kechadi
:
Multi-Stage Attack Traffic Detection Using Self-Supervised Learning. 1-6 - Timothy Laryea, Anwah Pascal, Tahir M. Khan:

A Digital Forensic Analysis of WhatsApp Artifacts in Windows 11 Operating System Using Microsoft Edge. 1-6 - Bryan Anderson, Gahangir Hossain

:
Enhancing Kalman Filter Resilience in Electric Vehicles: Cyber-Attack Mitigation with Machine Learning Based Adaptive Filtering. 1-6 - H. M. H. M. Bandara, K. M. N. Ayeshani, M. M. P. M. Kumari, D. M. S. T. Wijerathna, Kavinga Yapa Abeywardena, Ayesha Wijesooriya:

Stealth Eye: Behavioral Analysis for Fileless Malware Detection. 1-6 - Natalija Vlajic, Melina Hajimi, Milos Stojadinovic:

Merging Attack Trees and MITRE ATT&CK Tactics for More Effective Attack Modeling. 1-8 - Sayed Abu Sayeed, Mir Mehedi Rahman, Samiul Alam, Naresh Kshetri:

FSCsec: Collaboration in Financial Sector Cybersecurity - Exploring the Impact of Resource Sharing on IT Security. 1-6 - Jean Rosemond Dora

, Ladislav Hluchý:
PowerShell Proxy-Aware Intercommunication and Manipulation. 1-5 - Harry Joseph Vecchio-Ferrer, Elizabeth Marie Jijon, Maria M. Larrondo-Petrie:

Remote Laboratory Security Case Study: Physical and Digital Risks of FPGA and Raspberry Pi Farms. 1-5 - Sidahmed Benabderrahmane, Petko Valtchev, James Cheney, Talal Rahwan:

APT-LLM: Embedding-Based Anomaly Detection of Cyber Advanced Persistent Threats Using Large Language Models. 1-6 - Luis A. Rivera, James H. Jones:

Real-time Practical Analysis of Data Decay in Physical Memory. 1-6 - Amine Berqia, Habiba Bouijij, Manar Chahbi, Oussama Ismaili:

Predicting Cyberattacks on Connected Healthcare Devices Using LightGBM-based Approach. 1-6 - Md. Zakir Hossain Zamil

, Md Raisul Islam, Sajib Debnath
, Md Tuhin Mia, Md Anisur Rahman, Arindam Kishor Biswas
:
Stroke Prediction on Healthcare Data Using SMOTE and Explainable Machine Learning. 1-6 - Jack Nunnelee, Alex Howe, Philip Rahal

, Mauricio Papa:
Enhancing Intrusion Detection in Industrial Control Systems: An Adaptive Protocol-Agnostic Approach. 1-6 - Michael C. Todd

, Gilbert L. Peterson
:
Focus: A One-vs-All Resolution Strategy for Temporal Metadata Analysis. 1-6 - Zainatul Yushaniza Mohamed Yusoff, Mohamad Khairi Ishak, Lukman AB Rahim, Khalid Ammar:

Implementation of Device-to-Device Authentication with Middleware Broker System for Secure Smart Homes. 1-6 - Rohit Venkata Satya Kuppili:

DockerGate: Automated Seccomp Policy Generation for Docker Images. 1-6 - Irin Sultana, Syed Mustavi Maheen, Naresh Kshetri, Md Nasim Fardous Zim:

detectGNN: Harnessing Graph Neural Networks for Enhanced Fraud Detection in Credit Card Transactions. 1-6 - Sayed Abu Sayeed, Naresh Kshetri, Mir Mehedi Rahman, Samiul Alam, Abdur Rahman:

dataLDA: Analyzing Data Quality in Big Data Using Traditional Approaches vs. Latent Dirichlet Allocation - Systematic Review. 1-6 - R. D. D. L. K. Jayasinghe, M. W. K. L. Sasanka, D. A. S. M. Athukorala, M. A. D. Sandeepani, Anuradha Jayakody, Amila Senarathna:

Blockchain-Based Custody Evidence Management System for Healthcare Forensics. 1-6 - Natalia A. Bueno Pizarro, Juan Guillermo Lalinde-Pulido

:
Enhancing Trust and Security in Learning Management Systems: Addressing Submission Concerns with Timestamp Transparency and Digital Signatures. 1-5 - Seydanur Ahi Duman

, Atahan Duman
, Rukiye Hayran, Ibrahim Sogukpinar
:
A Multi-Layer Model of Psychological Factors and Parametric Approaches for Human-Centric Phishing Prevention. 1-5 - Büsra Tan Saatçi

, Mustafa Ulas
, Turan Gürgenç
:
Thermographic Detection of Tool Wear: A Review on Deep Learning-Based Approaches. 1-5 - Abdullah Alan, Songül Karabatak, Murat Karabatak:

The Role of Machine Learning in Distance Education. 1-6 - Pranav Goda Narahari, Omkar Kulkarni, Anna Singh, Sathya Prasad:

SURF: Sequential Undersampling-Refinement Framework for Two-Stage Anomaly Detection. 1-6 - H. N. V. Sai Murali Krishna Tungala, Ganapathi Yeleswarapu, Mahesh Shivnatri, Sridhar Kumar Irujolla:

A Zero Trust Framework with AI-Driven Identity and Intrusion Detection for Multi-Cloud MLOps. 1-6 - Zhala Sarkawt Othman, Songül Karabatak, Murat Karabatak:

Bibliometric Analysis in AI Assistant for e-learning to Focus Students by Using Camera, Keyboard and Mouse. 1-6 - Olga Dye, Ebru Celikel Cankaya:

Cloud Service Analysis from the Security Principles Perspective. 1-6 - Hardi Matholia, Oluwasola Mary Adedayo:

Investigating NoSQL Injection Attacks on MongoDB Web Applications. 1-6 - Blake Pickett, Asaf Varol:

Strategic Placement of FACTS Devices for Optimizing Power Transmission Efficiency and Stability. 1-7 - Semih Cal, Ramazan Ozgur Dogan, Hülya Dogan:

Enhanced Multi-Head Self-Attention Transformer-Based Method for Prediction of Drug-Drug Interactions. 1-6 - Anil Sezgin, Gürkan Özkan, Aytug Boyaci:

Advancements and Challenges in AI-Powered Honeypots: A Comparative Study of Detection, Engagement and Ethical Implications. 1-6 - Neha Surendranath, Sai Annamaiah Basava Raju, Ranita Ganguly:

Migrating Traditional Applications to Cloud-Native DevOps: A Framework for Successful Cloud Migration and Modernization. 1-6 - Rosemary Uwem Usoroh, Ioana Ghergulescu, Arghir-Nicolae Moldovan:

Malware Detection in PDF and PE Files Using Machine Learning and Feature Selection. 1-6 - Jayanthi Ramamoorthy, Narasimha K. Shashidhar, Cihan Varol:

Automated Static Analysis of Linux ELF Malware: Framework and Application. 1-5 - Jenna Snead, Krishnendu Ghosh:

Deep Learning Models for Malware Family Detection. 1-6 - Elon Salfati

, Harry Yu:
Trigger Labs: Advancing Malware Detection Through Realistic Scenario Simulation. 1-7 - Xiao Hu, Mingyang Xie, Akif Ahsen Ozer, Umit Karabiyik:

From TikTok to RedNote: A Comprehensive Mobile Forensic and Security Analysis on Android. 1-6 - Shamalka Perera, Shenuka Dias, Vishwadinu Vithanage, Avishka Dilhara, Amila Senarathne, Deemantha Siriwardana, Chethana Liyanapathirana:

Project HyperAdapt: An Agent-Based Intelligent Sandbox Design to Deceive and Analyze Sophisticated Malware. 1-6 - Mohammed Rauf Ali Khan

, Ahmad Almulhem:
Behavioral and Propagation-Based Analysis of APT Attacks for Effective Attack Attribution. 1-8 - Hebert Silva, Thiago Gonçalves, Dirceu Lippi:

FIRM-OT: A Methodology for Cybersecurity Forensics and Incident Response in OT. 1-6 - Ding Wang:

Chaotic Time Series Forecasting Optimisation Based on Hybrid PSO Algorithm. 1-8 - Mario Raciti

, Simone Di Mauro
, Dimitri Van Landuyt
, Giampaolo Bella
:
To See or Not to See: A Privacy Threat Model for Digital Forensics in Crime Investigation. 1-6 - Gunay Abdiyeva-Aliyeva, Naila R. Allahverdiyeva, Nihad Alili, Ilkin Balazade:

Evaluating Machine Learning Algorithms for Enhancing Network Intrusion Detection Systems: A Comparative Study. 1-4 - Mukesh Yadav, Peter J. Hawrylak:

Extent of an Attack in an Attack Graph: Method to Evaluate Evidence Set. 1-6 - Mariana Carvalho

, Daniel Fernandes
, Nuno Lopes, Óscar R. Ribeiro:
A Comparison of Supervised Learning Models on Distinct Datasets for Malware Detection. 1-5 - Ahmet Saatçi

, Ergin Taskan
, Mehmet Sahin
:
A Deep Learning Approach for Rapid and Cost-Effective Detection of Pesticide Residues in Agricultural Products. 1-6 - Branly Alberto Martínez González

, Malena Pérez Sevilla
, Jaime Andrés Rincón Arango, Daniel Urda Muñoz:
IoT Cyberattack Detection via Fog Computing and Multilayer Perceptron Neural Networks. 1-5 - Abhay Kamath, Aditya Joshi, Aditya Sharma, Nikhil R. Shetty, Lenish Pramiee:

Automated Threat Detection in the Dark Web: A Multi-Model NLP Approach. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














