Sort by
AI-Driven Dynamic Cryptography Selection in MapReduce: A
Deep Reinforcement Learning Approach for Lightweight
Encryption Optimization
Marwa Khadji
,Samira Khoulji
,Inass Khadji
Posted: 21 April 2026
AgentVerify: Compositional Formal Verification of AI Agent Safety Properties via LTL Model Checking
Eric Fang
Posted: 14 April 2026
Leveraging Reinforcement Learning for an Efficient Windows Registry Analysis During Cyber Incident Response
Mohamed Chahine Ghanem
,Dominik Wojtczak
,Elhadj Benkhelifa
,Hamza Kheddar
,Erivelton G. Nepomuceno
,Wanpeng Li
Posted: 14 April 2026
The Evaluation of a Double-Spend Attack Probability for Ouroboros-Like Proof-of-Stake Consensus
Lyudmila Kovalchuk
,Mariia Rodinko
,Roman Oliynykov
,Volodymyr Artemchuk
Posted: 10 April 2026
HQRT: A Hybrid Quantum-Resistant Resumption Framework for Zero-RTT TLS 1.3 Early Data Security
Tahera Begum Abdul
,K. Venkata Ramana
Posted: 08 April 2026
The Ultrasonic Jammer
Daniel Hoasov Cohen
,Coral Raz
,Raz Ben Yehuda
,Nezer J. Zaidenberg
Posted: 07 April 2026
A Survey on A Unified Web-Based Platform for Ransomware Detection and Network Intrusion Analysis
Chetan Mhaske
,Sarthak Dharam
,Kalpesh Mali
,Kalyani Zore
Posted: 07 April 2026
Evaluation of Explainable Artificial Intelligence in IoT Intrusion Detection Systems Under DeepFool Adversarial Conditions
Jorge Munilla
,Rana M. Khammas
Posted: 07 April 2026
Security, Privacy and Trust Issues in Cryptocurrencies—A Systematic Literature Review from Stakeholders’ Perspective
Waqas Aman
,Ammar Hassan
,Aqdas Malik
,Waseem Iqbal
,Firdous Kausar
Posted: 06 April 2026
Optimizing Multi-Scalar Multiplication Over Fixed Bases
Saulius Grigaitis
Posted: 02 April 2026
Efficient Online Computation of Mean, Median, and Standard Deviation as Continuous Health Tests for HRNGs
Sara Malik
,N.A. Ahmed
Posted: 24 March 2026
Human-Centric Zero Trust Identity Architecture for the Fifth Industrial Revolution: A JEPA-Driven Approach to Adaptive Identity Governance
Jovita T. Nsoh
Posted: 20 March 2026
Hybrid Deep Architectures in Contrastive Latent Space: Performance Analysis of VAE-MLP, VAE-MoTE, and VAE-GAT for IoT Botnet Detection
Hassan Wasswa
,Timothy Lynar
Posted: 19 March 2026
Challenges with Electronic Identity Authentication: A Qualitative Study with Disabled Participants
David Cropley
,Paul Whittington
,Huseyin Dogan
Posted: 18 March 2026
Managed Trust and Operational Resilience While Implementing Zero-Trust Architecture in a Multi-Stakeholder Telecommunications Organization
Guy E. Toibin
,Yotam Lurie
,Shlomo Mark
Posted: 17 March 2026
Attacks and Defenses in Differentially Private Deep Learning: New Security Risks in New Era
Kaiyan Zhao
,Zhe Sun
,Lihua Yin
,Tianqing Zhu
Posted: 16 March 2026
Real User Instruction: Black-Box Instruction Authentication Middleware Against Indirect Prompt Injection
Jingtang Luo
,Chenlin Zhang
Posted: 13 March 2026
GeoVault: Leveraging Human Spatial Memory for Secure Cryptographic Key Management
Marko Corn
,Primož Podržaj
Posted: 12 March 2026
A Survey on the Unique Security of Autonomous and Collaborative LLM Agents: Threats, Defenses, and Futures
Yinggang Sun
,Haining Yu
,Wei Jiang
,Xiangzhan Yu
,Dongyang Zhan
,Lixu Wang
,Siyue Ren
,Yue Sun
,Tianqing Zhu
Posted: 10 March 2026
LLM-Based Classification of CVEs for Vulnerability Analysis in Medical IT Systems
Pere Vidiella
,Pere Tuset-Peiró
,Josep Pegueroles
,Michael Pilgermann
Posted: 10 March 2026
of 21