.- Artificial Intelligence & Security.
.- Hacking Mobile Biometrics with the Photograph of a Fingerprint.
.- Multi-tool Approach for Advanced Quantum Key Distribution Network Modeling.
.- Deep Learning Methods for Intrusion Detection Systems on the CSE-CIC-IDS2018 Dataset: A Review.
.- CTIMiner: Cyber Threat Intelligence Mining Using Adaptive Multi-Task Adversarial Active Learning.
.- Multimedia Forensics.
.- Toward Forensic-Friendly AI: Integrating Blockchain with Federated Learning to Enhance AI Trustworthiness.
.- The Hidden Realms of Router Apps: Forensic Analysis of TP-Link Tether and ASUS Router.
.- ENF Match with Masking: a new method for searching with sparse signal.
.- Lightweight Multi-Tier IDS for UAV Networks: Enhancing UAV Zero-Day Attack Detection with Honeypot Threat Intelligence.
.- Intrusion Detection.
.- Reducing False Positives in Intrusion Detection System Alerts: A Novel Aggregation and Correlation Model.
.- APTChaser: Cyber Threat Attribution via Attack Technique Modeling.
.- What Do We Know About the Psychology of Insider Threats?.
.- A Digital Profiling Triage Model for Industrial Espionage.
.- Intrusion and Fraud Detection.
.- Uncovering Fraudulent Patterns in USDT Transactions on the TRON Blockchain with EDA and Machine Learning.
.- Sky-Eye: Detect Multi-Stage Cyber Attacks at the Bigger Picture.
.- ATKHunter: Towards Automated Attack Detection by Behavior Pattern Learning.
.- Large Language Models, Advances in Security and Forensics.
.- Investigating the Effectiveness of Bayesian Spam Filters in Detecting LLM-modified Spam Mails.
.- SecureSem: Sensitive Text Classification based on Semantic Feature Optimization.
.- The Hidden Dangers of Publicly Accessible LLMs: A Case Study on Gab AI.
.- Advances in Security and Forensics.
.- Biologically Sustainable Cyber-Physical Spaces: a Systematic Literature Review.
.- Detecting Criminal Networks via Non-Content Communication Data Analysis Techniques from the TRACY Project.