Sort by
Trade-Offs in Kubernetes Security and Energy Consumption
Ioannis Dermentzis
,Georgios Koukis
,Vassilis Tsaoussidis
Posted: 07 January 2026
Comparing the Use of EMBA for IoT Firmware Security Analysis on Cloud Services and Standalone Servers
Kenan Sansal Nuray
,Oren Upton
,Nicole Lang Beebe
Posted: 06 January 2026
Auditing Inferential Blind Spots: A Framework for Evaluating Forensic Coverage in Network Telemetry Architectures
Mehrnoush Vaseghipanah
,Sam Jabbehdari
,Hamidreza Navidi
Posted: 06 January 2026
AEP-M: AI-Enhanced Anonymous E-Payment for Mobile Devices Using ARM Trust Zone and Divisible E-Cash
Vimal Teja Manne
Posted: 06 January 2026
Real-Time DDoS Detection in Industrial IoT Using Proximal Policy Optimisation and Deep Reinforcement Learning
Mikiyas Alemayehu
,Mohamed Chahine Ghanem
,Hamza Kheddar
,Dipo Dunsin
,Chaker Abdelaziz Kerrache
,Geetanjali Rathee
Posted: 02 January 2026
SOMA-DR: Decision Receipts for Explainable Recovery and Key Rotation in Post-Quantum IAM
SravanaKumar Nidamanooru
Posted: 01 January 2026
Microarchitectural Feedback-Driven Kernel Fuzzing Using Branch Buffer Telemetry
Marco Rinaldi
,Elena Conti
,Giovanni Ferraro
Posted: 31 December 2025
Hybrid Taint-Guided Kernel Fuzzing with Selective State Propagation
Arjun Mehta
,Rohan Srinivasan
,Neha Kapoor
Posted: 31 December 2025
Impact of Quantum Computing on Asymmetric Cryptography Infrastructures: Prospective Study and Post-Quantum Transition Roadmap
João Lucas
,Carlos Caleiro
,António Gonçalves
,Laercio Cruvinel
Posted: 29 December 2025
Domain-Knowledge-Infused Synthetic Data Generation for LLM-based ICS Intrusion Detection: Mitigating Data Scarcity and Imbalance
Seokhyun Ann
,Hongeun Kim
,Suhyeon Park
,Seong-je Cho
,Joonmo Kim
,Harksu Cho
Posted: 24 December 2025
Research on API Security Gateway and Data Access Control Model for Multi-Tenant Full-Stack Systems
Yu Mao
,Xiangjun Ma
,Jiawen Li
Posted: 22 December 2025
Secure Local Communication Between Browser Clients and Resource-Constrained Embedded IoT Devices
Christian Schwinne
,Jan Pelzl
Posted: 19 December 2025
A Review of Resilient IoT Systems: Trends, Challenges, and Future Directions
Bandar Alotaibi
Posted: 19 December 2025
Automated Vulnerability Scanning and Prioritisation for Domestic IoT Devices/Smart Homes: A Theoretical Framework
Diego Fernando Rivas Bustos
,Jairo Gutierrez
,Sandra Julieta Rueda
The expansion of the Internet of Things (IoT) devices in domestic smart homes has created new conveniences but also significant security risks. Insecure firmware, weak authentication and encryption leave households exposed to privacy breaches, data leakage, and systemic attacks. Although research has addressed several challenges contributions remain fragmented and difficult for non-technical users to apply. This work addresses the research question: How can a theoretical framework be developed to enable automated vulnerability scanning and prioritisation for non-technical users in domestic IoT environments? A Systematic Literature Review of 40 peer-reviewed studies, conducted under PRISMA 2020 guidelines, identified four structural gaps: dispersed vulnerability knowledge, fragmented scanning approaches, over-reliance on technical severity in prioritisation and weak protocol standardisation. The paper introduces a four-module framework: a Vulnerability Knowledge Base, an Automated Scanning Engine, a Context-Aware Prioritisation Module and a Standardisation and Interoperability Layer. The framework advances knowledge by integrating previously siloed approaches into a layered and iterative artefact tailored to households. While limited to conceptual evaluation, the framework establishes a foundation for future work in prototype development, household usability studies and empirical validation. By addressing fragmented evidence with a coherent and adaptive design, the study contributes to both academic understanding and practical resilience, offering a pathway toward more secure and trustworthy domestic IoT ecosystems.
The expansion of the Internet of Things (IoT) devices in domestic smart homes has created new conveniences but also significant security risks. Insecure firmware, weak authentication and encryption leave households exposed to privacy breaches, data leakage, and systemic attacks. Although research has addressed several challenges contributions remain fragmented and difficult for non-technical users to apply. This work addresses the research question: How can a theoretical framework be developed to enable automated vulnerability scanning and prioritisation for non-technical users in domestic IoT environments? A Systematic Literature Review of 40 peer-reviewed studies, conducted under PRISMA 2020 guidelines, identified four structural gaps: dispersed vulnerability knowledge, fragmented scanning approaches, over-reliance on technical severity in prioritisation and weak protocol standardisation. The paper introduces a four-module framework: a Vulnerability Knowledge Base, an Automated Scanning Engine, a Context-Aware Prioritisation Module and a Standardisation and Interoperability Layer. The framework advances knowledge by integrating previously siloed approaches into a layered and iterative artefact tailored to households. While limited to conceptual evaluation, the framework establishes a foundation for future work in prototype development, household usability studies and empirical validation. By addressing fragmented evidence with a coherent and adaptive design, the study contributes to both academic understanding and practical resilience, offering a pathway toward more secure and trustworthy domestic IoT ecosystems.
Posted: 19 December 2025
Using Steganography and Artificial Neural Network for Data Forensic Validation and Counter Image Deepfakes
Matimu Nkuna
,Ebenezer Esenogho
,Ahmed Ali
Posted: 18 December 2025
A Hybrid Hash–Encryption Scheme for Secure Transmission and Verification of Marine Scientific Research Data
Hanyu Wang
,Mo Chen
,Maoxu Wang
,Min Yang
Marine scientific research missions often face challenges such as heterogeneous multi-source data, unstable links, and high packet loss rates. Traditional approaches decouple integrity verification from encryption, rely on full-packet processing, and depend on synchronous sessions, making them inefficient and insecure under fragmented and out-of-order transmissions. The HMR+EMR mechanism proposed in this study integrates “block-level verification” with “hybrid encryption collaboration” into a unified workflow: HMR employs entropy-aware adaptive partitioning and chain-based indexing to enable incremental verification and breakpoint recovery, while EMR decouples key distribution from parallelized encryption, allowing encryption and verification to proceed concurrently under unstable links and reducing redundant retransmissions or session blocking. Experimental results show that the scheme not only reduces hashing latency by 45%–55% but also maintains a 94.1% successful transmission rate under 20% packet loss, demonstrating strong adaptability in high-loss, asynchronous, and heterogeneous network environments. Overall, HMR+EMR provides a transferable design concept for addressing integrity and security issues in marine data transmission, achieving a practical balance between performance and robustness.
Marine scientific research missions often face challenges such as heterogeneous multi-source data, unstable links, and high packet loss rates. Traditional approaches decouple integrity verification from encryption, rely on full-packet processing, and depend on synchronous sessions, making them inefficient and insecure under fragmented and out-of-order transmissions. The HMR+EMR mechanism proposed in this study integrates “block-level verification” with “hybrid encryption collaboration” into a unified workflow: HMR employs entropy-aware adaptive partitioning and chain-based indexing to enable incremental verification and breakpoint recovery, while EMR decouples key distribution from parallelized encryption, allowing encryption and verification to proceed concurrently under unstable links and reducing redundant retransmissions or session blocking. Experimental results show that the scheme not only reduces hashing latency by 45%–55% but also maintains a 94.1% successful transmission rate under 20% packet loss, demonstrating strong adaptability in high-loss, asynchronous, and heterogeneous network environments. Overall, HMR+EMR provides a transferable design concept for addressing integrity and security issues in marine data transmission, achieving a practical balance between performance and robustness.
Posted: 18 December 2025
Policy-CRDT: Conflict-Free Replicated Data Type with Remove-Wins Strategy for Convergent Access Control in Asynchronous Environments
Mahamdou Sidibe
Posted: 18 December 2025
Beyond Semantic Noise: Diagnosing and Correcting Structural Bias in Code-Mixed Script Detection via XAI-Driven Hybridization
Prasert Teppap
,Wirot Ponglangka
,Panudech Tipauksorn
,Prasert Luekhong
Posted: 18 December 2025
SplitML: A Unified Privacy-Preserving Architecture for Federated Split-Learning in Heterogeneous Environments
Devharsh Trivedi
,Aymen Boudguiga
,Nesrine Kaaniche
,Nikos Triandopoulos
Posted: 17 December 2025
5G-DAuth: Decentralized Privacy-Preserving Service Authorization for 5G Network Functions
Rui Ma
,Mingjun Wang
,Zheng Yan
,Haiguang Wang
,Tieyan Li
Posted: 11 December 2025
of 19