.- A Novel Scoring Algorithm Against HID Attacks Based on Static Text Feature Matching.
.- Identifying Ransomware Functions through Microarchitectural Side-channel Analysis.
.- STARMAP: Multi-machine Malware Analysis System for Lateral Movement Observation.
.- LogSHIELD: A Graph-based Real-time Anomaly Detection Framework using Frequency Analysis.
.- Completeness Analysis of Mobile Apps’ Privacy Policies by Using Deep Learning.
.- Characterizing the Evolution of Psychological Tactics and Techniques Exploited by Malicious Emails.
.- Matching Knowledge Graphs for Cybersecurity Countermeasures Selection.
.- Graph-Based Profiling of Dependency Vulnerability Remediation.
.- Characterizing the Evolution of Psychological Factors Exploited by Malicious Emails.
.- An Enhanced Firewall for IoT Security.
.- Exploring the Effects of Cybersecurity Awareness and Decision-Making Under Risk.
.- SVSM-KMS: Safeguarding Keys for Cloud Services with Encrypted Virtualization.
.- GNNexPIDS: An Interpretation Method for Provenance-based Intrusion Detection Based on GNNExplainer.
.- Performance Evaluation of Lightweight Cryptographic Ciphers on ARM Processor for IoT Deployments.
.- AutoCRAT: Automatic Cumulative Reconstruction of Alert Trees.
.- FAF-BM: An Approach for False Alerts Filtering using BERT Model with Semi-supervised Active Learning.
.- Smart Home Cyber Insurance Pricing.
.- Exhaustive Exploratory Analysis of Low Degree Maximum Period NLFSRs By Graph Analysis.
.- Integrating Consortium Blockchain and Attribute-Based Searchable Encryption for Automotive Threat Intelligence Sharing Model.
.- Multi-Modal Multi-Task Tiered Expert (M3TTE): An Effective Method for CDN Website Classification.
.- Malware Variant Detection Based on Knowledge Transfer and Ensemble Learning.
.- An Efficient IOC-Driven BigData Tracing and Backtracking Model for Emergency Response.
.- Integrating CP-ABE and Device Fingerprint into Federated Learning.
.- Automatic Alert Categories Standardization for Heterogeneous Devices with Incomplete Semantic Knowledge Based on LSTM.
.- Family Similarity-Enhanced Implicit Data Augmentation for Malware Classification.