Networking and cryptography library with a non-repudiation flavor for blockchain Mohamed RasslanMahmoud M. NasreldinHeba Aslan Original Paper Open access 05 August 2023 Pages: 1 - 14
DHCP DoS and starvation attacks on SDN controllers and their mitigation Hafiz Usama IshtiaqAreeb Ahmed BhuttaAdnan Noor Mian Original Paper 30 May 2023 Pages: 15 - 25
Persistent MobileApp-in-the-Middle (MAitM) attack Christian CatalanoFranco Tommasi Original Paper Open access 30 June 2023 Pages: 27 - 39
Exploiting number theory for dynamic software watermarking Mila Dalla PredaMichele Ianni Original Paper Open access 20 July 2023 Pages: 41 - 51
A comparison of graph neural networks for malware classification Vrinda MalhotraKaterina PotikaMark Stamp Original Paper 26 July 2023 Pages: 53 - 69
Android ransomware detection using a novel hamming distance based feature selection Hashida Haidros Rahima ManzilS. Manohar Naik Original Paper 22 August 2023 Pages: 71 - 93
Mal2GCN: a robust malware detection approach using deep graph convolutional networks with non-negative weights Omid KargarnovinAmir Mahdi SadeghzadehRasool Jalili Original Paper 27 September 2023 Pages: 95 - 111
Provably minimum data complexity integral distinguisher based on conventional division property Akram KhalesiZahra Ahmadian Original Paper 28 September 2023 Pages: 113 - 125
Protection against adversarial attacks with randomization of recognition algorithm Grigory MarshalkoSvetlana Koreshkova Original Paper 05 October 2023 Pages: 127 - 133
Use of cryptography in malware obfuscation Hassan Jameel AsgharBenjamin Zi Hao ZhaoDaniel Coscia Original Paper 25 September 2023 Pages: 135 - 152
Using deep graph learning to improve dynamic analysis-based malware detection in PE files Minh Tu NguyenViet Hung NguyenNathan Shone Original Paper 20 October 2023 Pages: 153 - 172
A natural language processing approach to Malware classification Ritik MehtaOlha JurečkováMark Stamp Original Paper 20 October 2023 Pages: 173 - 184
Partial key exposure attack on RSA using some private key blocks Santosh Kumar RavvaK. L. N. C. PrakashS. R. M. Krishna Original Paper 08 November 2023 Pages: 185 - 193
Cryptanalysis of RSA with composed decryption exponent with few most significant bits of one of the primes R. Santosh KumarK. L. N. C. PrakashS. R. M. Krishna Original Paper 20 October 2023 Pages: 195 - 202
Faulty use of the CIC-IDS 2017 dataset in information security research Rohit Dube Original Paper 28 December 2023 Pages: 203 - 211