Sort by
Decoupled, Real-Time, Multi-Modal Program Execution State Monitoring
Ananda Biswas
,Dakota Berbrich
,Braedon Giblin
,Zelong Li
,Joyesh Philip
,Ravikumar Selvam
,Henry Duwe
,Akhilesh Tyagi
Posted: 05 December 2025
Empirical Study on Automation, AI Trust, and Framework Readiness in Cybersecurity Incident Response
Olufunsho Falowo
,Bou Abdo Jacques
Posted: 05 December 2025
Multi-Tenancy Security in IoT-Cloud Systems: Challenges, Mitigations, and Future Directions
Bader Alobaywi
,Mohammed G. Almutairi
,Frederick T. Sheldon
Posted: 04 December 2025
Challenges with Electronic Identity Authentication: A Qualitative Study with Disabled Participants
David George Kenneth Cropley
,Paul Whittington
,Huseyin Dogan
Posted: 04 December 2025
Detecting TLS Protocol Anomalies Through Network Monitoring and Compliance Tools
Diana Gratiela Berbecaru
,Marco De Santo
Posted: 02 December 2025
Prediction of the Financial Impacts of Cyber Threats on the Organization's Information Environment
Lukáš Pavlík
,Miroslav Tomek
,Martin Ficek
Posted: 27 November 2025
An Empirical Analysis of Phishing Simulation to Mitigate Social Engineering Attacks
Adilet Abdykerimov
,Ruslan Isaev
,Ruslan Amanov
Posted: 24 November 2025
A Multimodal Phishing Website Detection System Using Explainable Artificial Intelligence Technologies
Alexey Vulfin
,Alexey Sulavko
,Vladimir Vasiliev
,Alexander Minko
,Anastasia Kirillova
,Alexander Samotuga
Posted: 24 November 2025
Beyond the Achilles Heel: Securing Spatial Domain Reversible LSB Image Steganography
Khan Farhan Rafat
,Syed Muhammad Sajjad
,Mohammad Imran
,Ashfaq Hussain Farooqi
,Zafar Iqbal
,Zia Muhammad
Posted: 24 November 2025
Cyber Security Education by integrating Digital Twins and Generative AI
Atharv S. Avhad
Posted: 18 November 2025
EthiHack Pro v2.0: A Comprehensive Review of an Integrated, AI-Enhanced Ethical Hacking Toolkit
Anand Rawat
Posted: 13 November 2025
A SIEM-Integrated Cybersecurity Prototype for Insider Threat Anomaly Detection Using Enterprise Logs and Behavioural Biometrics
Mohamed salah Mahmoud Mohamed
,Abdullahi Arabo
Posted: 13 November 2025
A Multi-Layered AI-Driven E-Proctoring System Using Wearable EEG and Secure IoT Integration for Cheating Prevention and Cybersecurity in Online Exams
Qutaiba Ibrahim
,Hussein Mahmood
Posted: 12 November 2025
Cybersecurity as a Pillar of Digital Sovereignty: A Scoping Review in Rethinking Governance in Nigeria and West Africa
Ezekwueme Augustine E.
,Adewumi Dolapo Sunday
Posted: 11 November 2025
A Game-Theoretic Approach for Quantification of Strategic Behaviors in Digital Forensic Readiness
Mehrnoush Vaseghipanah
,Sam Jabbehdari
,Hamidreza Navidi
Posted: 11 November 2025
Threat Actor Attribution Applying a Tactics-Techniques-Procedures Approach: An Empirical Investigation
Shaheen Husain
,Krassie Petrova
Posted: 10 November 2025
A Secure Blockchain-based MFA Dynamic Mechanism
Vasilis Papaspirou
,Ioanna Kantzavelou
,Yagmur Yigit
,Leandros Maglaras
,Sokratis Katsikas
Posted: 07 November 2025
secRNNlong: Malicious Code Classification Using RNNs with LSTM and Transformers for Improved Cybersecurity
Sanjay Charitesh Makam
,Chowdary Adithya Sai Vidivada
,Hemanjali Villuri
,B Pavan Manideep Reddy
,Naresh Kshetri
Posted: 06 November 2025
APT Attribution Using Heterogeneous Graph Neural Networks with Contextual Threat Intelligence
Abdirahman Jibril Mead
,Abdullahi Arabo
Posted: 05 November 2025
RealPhish: An Algorithm for Real-Time Email Phishing Detection
Devendra Chapagain
,Naresh Kshetri
,Bishnu Bhusal
,Pradip Subedi
Posted: 05 November 2025
of 18