

Research Papers
Relevant topics include innovative system design, protocols, and algorithms for detecting, preventing, mitigating, and responding to malicious threats in dependable and secure systems and networks, including experimentation and assessment. The topics of interest are in the security of hardware, software, networks, clouds, cyber-physical systems, socio-technical systems, blockchain, and healthcare.
1
ProofOps Copilot: LLM-Guided Counterexample Repair for MBSE
Authors: Mohammed Mafaz Nadherssa
2
RaDyX : Ransomware detection using Machine Learning withdynamic feature dataset and XAI
Authors: Aryan Shabir, Ahtsham Khalid, Zafar Iqbal, Danish Shehzad, and Irfan Ud Din
3
A Tsetlin Machine–driven Intrusion Detection System forNext-Generation IoMT Security
Authors: Rahul Jaiswal, Per-Arne Andersen, Linga Reddy Cenkeramaddi, Lei Jiao, and Ole-Christoffer Granmo
4
PhishLite : A Client-Side Phishing Detection Utilizing URLand Web Content
Authors: Viona Widodo and Hayato Yamana
5
A Study of Large Language Model Performance for PhishingURL Detection and Explainability for User-Centric Security
Authors: Jaishnoor Kaur, Eugene Vuong, and Hongmin Li
6
Hybrid Quantum-Classical Layer-7 Traffic Classification: Methodology and Evaluation
Authors: Simone Mainardi, Kaushal Bansal, and Prabhat Singh
7
Tor for Cryptocurrency: Enhancing Mining Rewards while Preserving Anonymity
Authors: Nazmus Sakib, Kelei Zhang, Simeon Wuthier, Wenjun Fan, and Sang-Yoon Chang
8
Reducing Cognitive Load in Packet Analysis: APlain-Language Translation Framework for Novice SecurityAnalysts
Authors: Jhaell Jimenez, Yoohwan Kim, and Ju-Yeon Jo
9
Evaluating Website Fingerprinting Resistance Under VPNTunneling
Authors: Mohammed Ameenuddin Farooqui, Joshua Honig, Mohammed Abuhamad, and Eric Chan-Tin
10
From Shadow AI to Secure AI: Enabling Secure EnterpriseGenerative AI On-Premises
Authors: Syed Huzaifa Bin Afzal, Justin Bowman, Yu-Tien Renee Chiang, and Wenjun Fan
11
Risk-Driven Secure Software Engineering (RDSSE)
Authors: Neha Prakash and Madhushree Kumari
12
Secure Smart Home: Federated Learning with LLM-Based Recommendations and Differential Privacy
Authors: Sadia Asif Malik, Ashan Altaf, Adeel Anjum, Muazzam A. Khan
Khattak, Awais Ahmad, Goutham Reddy Alavalapati, and Sun
Shin Lee
13
Supervised Learning Approaches for Intrusion Detection Systems for Smart Grid Substation Networks
Authors: Sowmya Bandari, Venkat Sai Suman Lamba Karanam, and Byrav
Ramamurthy
14
Prompt-Language Leakage from LLM-Generated Data via Membership Inference on Downstream LSTMs
Authors: Kevin Jin and Amith Kamath Belman
15
Integrating Post-Quantum Cryptography into a CDN-Style PKI: Design, Trade-offs, and an Experimental Baseline
Authors: Katrina Parsom, Yoohwan Kim, and Ju-Yeon Jo
16
When Accuracy Is Not Enough: Evaluating Explainable Vulnerability Detection Beyond Accuracy
Authors: Fabion Walden and Mengjun Xie
17
Enhancing Anomaly Resilience in Research Networks: A Large-Scale Forecasting Benchmark for Dynamic Security Baselining
Authors: Mohammad Arafath Uddin Shariff and Byrav Ramamurthy
18
IoT-CyberAgent: An Intelligent Multi-Agent Cyber Threat Detection and Response System for IoT Networks
Authors: Potri Abhisri Barama, Michelle Kim and Younghee Park
19
Uncovering Weaknesses in Autonomous Driving: A Formal Approach to Adversarial Scenario Generation and Falsification
Authors: Carlos O. Hernadex, Luis Burbano, Diego Ortiz Barbosa,
Alvaro A. Cardenas, and Younghee Park

