Accepted Papers
| Title | Authors |
| Agentic AI Enhanced Security Workflow for Explainable Host-Based Intrusion Detection | Soni, Jayesh (Florida International University, USA); Kumar, Raja (Florida International University); Upadhyay, Himanshu (Florida International University, USA); Perez Pons, Alexander (Florida International University) |
| MEEA: Mere Exposure Effect-Driven Confrontational Optimization for LLM Jailbreaking | Zhang, Jianyi (Beijing Electronic Science and Technology Institute); Liu, Shizhao (Beijing Electronic Science and Technology Institute); Zhou, Ziyin (Beijing Electronic Science and Technology Institute); Li, Zhen (Beijing Electronic Science and Technology Institute) |
| Visualizing Differences in Versions of Software Files | Rowe, Neil (U.S. Naval Postgraduate School) |
| Context Before Content: A Forensic Ranking Framework for Digital Image Triage | Onyeashie, Belinda I (University of the West of England); McKeown, Sean (Edinburgh Napier); Leimich, Petra (Edinburgh Napier University) |
| Multimodal Online Black Industry Discovery with Long-Context Compression | Wang, Yinuo (Shanghai Jiao Tong University); Wang, Jiayi (Shanghai Jiao Tong University); Huang, Weikai (Shanghai Jiao Tong University); Huang, Zheng (Shanghai Jiao Tong University) |
| Risk-Based Digital Evidence Triage: A Framework for Artifact, Device, and Case Prioritization in Child Sexual Offense Investigations | Jaeckel, Lukas (Technische Universität Bergakademie Freiberg); Labudde, Dirk (Technische Universität Bergakademie Freiberg) |
| Role-Driven Comparative Forensic Analysis of an Android Marketplace Mobile Application | Gunestas, Murat (University of New Haven, USA); Daniels, Mark (University of New Haven, USA) |
| Archetypical Modelling for Cybersecurity and Personal Data Protection for SMEs | Almpani, Sofia (National Technical University of Athens); Loucopoulos, Pericles (Institute of Digital Innovation & Research (IDIR)); Skourtis, Yannis (Institute of Digital Innovation & Research (IDIR)) |
| A methodology for producing recursive medical forensic image analysis responses using VLMs | Koulouris, Dionysios (University of Piraeus); Kallipolitis, Athanasios (University of Piraeus); Kalathas, Dimitrios (University of Piraeus); Menychtas, Andreas (University of Piraeus); Maglogiannis, Ilias (University of Piraeus) |
| Unsupervised Detection of False Data Injection Attacks in Nuclear Radiation Dose Time Series Using Generative Models | Saripalli, Jyothsna ([email protected]); Gangwani, Pranav (Florida International University, USA); Upadhyay, Himanshu (Florida International University, USA); Perez Pons, Alexander (Florida International University); Lagos, Leonel (Florida International University) |
| Quantifying Cyber Attack Impact on UAV-Based Nuclear Containment Inspection: A Forensic-Ready Simulation Framework | Saripalli, Hari Hara Babu (Florida International University); Gangwani, Pranav (Florida International University, USA); Upadhyay, Himanshu (Florida International University, USA); Perez Pons, Alexander (Florida International University); Lagos, Leonel (Florida International University) |
| DHGNN-MambaNet: Encrypted Traffic Analysis Based on Dual-Granularity Heterogeneous Graphs and Bidirectional Mamba | Wang, Zhiqiang (Beijing Electronic Science and Technology Institute); Yang, Xuan (Beijing Electronic Science and Technology Institute); Que, Ke (Beijing Electronic Science and Technology Institute); Chi, Yaping (Beijing Electronic Science and Technology Institute) |
