top of page
Desk With Paperwork

Research Papers

Relevant topics include innovative system design, protocols, and algorithms for detecting, preventing, mitigating, and responding to malicious threats in dependable and secure systems and networks, including experimentation and assessment. The topics of interest are in the security of hardware, software, networks, clouds, cyber-physical systems, socio-technical systems, blockchain, and healthcare.

ProofOps Copilot: LLM-Guided Counterexample Repair for MBSE

Authors: Mohammed Mafaz Nadherssa

2

RaDyX : Ransomware detection using Machine Learning withdynamic feature dataset and XAI 

Authors: Aryan Shabir, Ahtsham Khalid, Zafar Iqbal, Danish Shehzad, and Irfan Ud Din

3

A Tsetlin Machine–driven Intrusion Detection System forNext-Generation IoMT Security

Authors: Rahul Jaiswal, Per-Arne Andersen, Linga Reddy Cenkeramaddi, Lei Jiao, and Ole-Christoffer Granmo

4

PhishLite : A Client-Side Phishing Detection Utilizing URLand Web Content

Authors: Viona Widodo and Hayato Yamana

5

A Study of Large Language Model Performance for PhishingURL Detection and Explainability for User-Centric Security

Authors: Jaishnoor Kaur, Eugene Vuong, and Hongmin Li

6

Hybrid Quantum-Classical Layer-7 Traffic Classification: Methodology and Evaluation

Authors: Simone Mainardi, Kaushal Bansal, and Prabhat Singh

7

Tor for Cryptocurrency: Enhancing Mining Rewards while Preserving Anonymity

Authors: Nazmus Sakib, Kelei Zhang, Simeon Wuthier, Wenjun Fan, and Sang-Yoon Chang

8

Reducing Cognitive Load in Packet Analysis: APlain-Language Translation Framework for Novice SecurityAnalysts

Authors: Jhaell Jimenez, Yoohwan Kim, and Ju-Yeon Jo

9

Evaluating Website Fingerprinting Resistance Under VPNTunneling

Authors: Mohammed Ameenuddin Farooqui, Joshua Honig, Mohammed Abuhamad, and Eric Chan-Tin

10

From Shadow AI to Secure AI: Enabling Secure EnterpriseGenerative AI On-Premises

Authors: Syed Huzaifa Bin Afzal, Justin Bowman, Yu-Tien Renee Chiang, and Wenjun Fan

11

Risk-Driven Secure Software Engineering (RDSSE)

Authors: Neha Prakash and Madhushree Kumari

12

Secure Smart Home: Federated Learning with LLM-Based Recommendations and Differential Privacy

Authors: Sadia Asif Malik, Ashan Altaf, Adeel Anjum, Muazzam A. Khan
Khattak, Awais Ahmad, Goutham Reddy Alavalapati, and Sun
Shin Lee

13

Supervised Learning Approaches for Intrusion Detection Systems for Smart Grid Substation Networks

Authors: Sowmya Bandari, Venkat Sai Suman Lamba Karanam, and Byrav
Ramamurthy

14

Prompt-Language Leakage from LLM-Generated Data via Membership Inference on Downstream LSTMs

Authors: Kevin Jin and Amith Kamath Belman

15

Integrating Post-Quantum Cryptography into a CDN-Style PKI: Design, Trade-offs, and an Experimental Baseline

Authors: Katrina Parsom, Yoohwan Kim, and Ju-Yeon Jo

16

When Accuracy Is Not Enough: Evaluating Explainable Vulnerability Detection Beyond Accuracy

Authors: Fabion Walden and Mengjun Xie

17

Enhancing Anomaly Resilience in Research Networks: A Large-Scale Forecasting Benchmark for Dynamic Security Baselining

Authors: Mohammad Arafath Uddin Shariff and Byrav Ramamurthy

18

IoT-CyberAgent: An Intelligent Multi-Agent Cyber Threat Detection and Response System for IoT Networks

Authors: Potri Abhisri Barama, Michelle Kim and Younghee Park

19

Uncovering Weaknesses in Autonomous Driving: A Formal Approach to Adversarial Scenario Generation and Falsification

Authors: Carlos O. Hernadex, Luis Burbano, Diego Ortiz Barbosa,
Alvaro A. Cardenas, and Younghee Park

CONTACT US

event.manager AT svcsi.org

SUBSCRIBE FOR ALL SVCC-2026 UPDATES

QUESTIONS? 

LEAVE US A MESSAGE:

Thanks for submitting!

© All Copyrights @ SVCSI

SVCSI is a 501(c)(3) non-profit organization (Public Charity).

bottom of page