Accepted Papers (Main Track)
A Comprehensive Survey on Basic Safety Message Attacks and Their Detection
Author:
Mohamed, Ahmed (University of Tennessee at Chattanooga); Xie, Mengjun (University of Tennessee at Chattanooga)
A Digital Profiling Triage Model for Industrial Espionage
An IP Anti-Geolocation Method Based on Fake Landmarks
Author:
Lu, Enshang (Information Engineering University); Ding, Shichang (Henan Key Laboratory of Cyberspace Situation Awareness); Yang, Chunfang (Information Engineering University); Gong, Daofu (Information Engineering University); Li, Ruixiang (Henan Key Laboratory of Cyberspace Situation Awareness); Zhu, Kaijie (Zhongguancun Laboratory); Luo, Xiangyang (Information Engineering University)
AnGSL: Graph-Based Android Malware Detection Method
APTChaser: Cyber Threat Attribution via Attack Technique Modeling
Assessing Threats: Security Boundary and Side-channel Attack Detection in the Metaverse
ATKHunter: Towards Automated Attack Detection by Behavior Pattern Learning
Attention-Guided Contrastive Masked Autoencoders for Self-supervised Cross-modal Biometric Matching
Autonomous Driving System Configuration Defect Detection Method Based on Fuzzing
Auto-TFCE: Automatic Traffic Feature Code Extraction Method and Its Application in Cyber Security
BGETC: An Encrypted Traffic Classification Method Based on BERT and GRU
Burst Sequence Based Graph Neural Network for Video Traffic Identification
CTIMiner: Cyber Threat Intelligence Mining Using Adaptive Multi-Task Adversarial Active Learning
Driven to Evidence: The Digital Forensic Trail of Vehicles
EG-SAN: Evolving Graph Self-Attention Networks for Detecting Illicit Activities in Cryptocurrency
Heaker: Exfiltrating Data from Air-Gapped Computers via Thermal Signals
Improved Federated Learning Model Against Poisoning Attacks by Using Iterative Blockchain Validators
KP-WF: Cross-domain Few-shot Website Fingerprinting
MSP: A Zero-latency Lightweight Website Fingerprinting Defense for Tor Network
Multi-tool Approach for Advanced Quantum Key Distribution Network Modeling
Pixel-level Face Correction Task for More Generalized Deepfake Detection
SecureSem: Sensitive Text Classification based on Semantic Feature Optimization
Securing Social Relationships: An Algorithm for Privacy Preservation Targeting Vulnerable Nodes of Social Networks
Sky-Eye: Detect Multi-Stage Cyber Attacks at the Bigger Picture
The Hidden Realms of Router Apps: Forensic Analysis of TP-Link Tether and ASUS Router
Vehicle Forensics: Analysis of Forensic Tools, Mobile Device Extractions, and Live Network Capture Artifacts
SCOUT: Surveillance and Cyber harassment Observation of Unseen Threats
Detecting UAV Zero-Day Attacks and Developing Proactive IDS Signature with Honeypot Intelligence
Author:
Jamil, Abdul Majid <[email protected]> (Wuhan University)
Detecting Criminal Networks via Non-Content Communication Data Analysis
Investigating the Effectiveness of Bayesian Spam Filters in Detecting LLM-modified Spam Mails
Research on Minimum Receptive Field of Convolutional Neural Networks for Energy Analysis Attack
What Do We Know About the Psychology of Insider Threats?
Toward Forensic Friendly AI IntegratingBlockchain with Federated Learning to Enhance AI Trustworthiness
Image Segmentation Techniques for Bone Cancer Identification using X-ray and MRI Imagery
METAFRAUD: AN ANALYSIS OF MULTIDIMENSIONAL APPROACH TO FRAUD DETECTION
Reducing False Positives in Intrusion Detection System Alerts: A Novel Aggregation and Correlation Model
The Vulnerable Brain
UNMASKING ILLICT TRANSACTION USING MACHINE LEARNING STRATEGIES TO THWART CREDIT CARD FRAUD
Lightweight Multi-Tier IDS for UAV Security: Enhancing UAV Zero-Day Attacks with Honeypot Threat Intelligence
Author: Jamil, Abdul Majid (Wuhan University)
Social Media Threat Intelligence: A Framework for Collecting and Categorizing Threat-Related Data
Author: Ikuesan, Richard Adeyemi (Zayed University); Obojo, Victor (Cyber Threat Intelligence Division, CyberDome); Galadima, Haula (Cyber Threat Intelligence Division, CyberDome)
ENF Match with Masking: a new method for searching with sparse signal
Author: Landro, Nicola (European Commission – Joint Research Centre); Schiavone, Lorenzo (European Commission – Joint Research Centre); Ferreira, Anselmo Castelo Branco (European Commission – Joint Research Centre); Beslay, Laurent (European Commission – Joint Research Centre)
Evaluating and Extending Techniques for Fine-Grained Text-Topic Prediction for Digital Forensic Data
Author: Farabi, Khan Mohammad Al (University of Georgia); Agrawal, Gagan (University of Georgia); Dorai, Gokila (Augusta University); Bardhan, Rajon (Augusta University); Maleki, Hoda (Augusta University); Kadri, Thomas E. (University of Georgia)
ThreatResponder: Dynamic Markov-based Defense Mechanism for Real-time Cyber Threats
Author: Zhu, Zhiling (Zhejiang University of Technology); Chen, Tieming (Zhejiang University of Technology); Song, Qijie (Zhejiang University of Technology); Lu, Yiheng (Zhejiang University of Technology); Zheng, Yulin (Zhejiang University of Technology)
Uncovering Fraudulent Patterns in USDT Transactions on the TRON Blockchain with EDA and Machine Learning
Author: Lam, Yi Anson (The University of Hong Kong); Chow, Kam Pui (The University of Hong Kong); Yiu, Siu Ming (The University of Hong Kong)
The Hidden Dangers of Publicly Accessible LLMs: A Case Study on Gab AI
Author: Sakshi Singh (University at Albany), Kimberly Cornell (University at Albany), Lakshika Vaishnav (University of Albany)