1 |
Enhancing User Authentication for Online Credit Card Transactions |
Jia-Ning Luo, Shu-Chen Yang, Ming-Hour Yang, and Ray-Lin Tso |
2 |
RTKA-PUF: Real-Time Keyless Authentication via PUF and Time-Driven Masking in Satellite Emergency Networks |
Jheng-Jia Huang, Yung-Yi Lin, Nai-Wei Lo, I-Cheng Lee and Po-Wen Chi |
3 |
A Comprehensive Evaluation of Endpoint Detection and Response (EDR) Products Using the MITRE ATT&CK Framework |
Nikhil Kumar Agarwal and Eslam G. AbdAllah |
4 |
Ensuring Information Security in Inclusive Digital Environments: Securing Assistive Technologies for Neurodiverse Workforces using ISO 27001 |
Damilola Innomesanghan, Emmanuel Kiwamu, Sergey Butakov, and Eslam G. AbdAllah |
5 |
Exploring Flow Features and Deep/Metric Learning for Network Traffic Classification |
Goun Kim, Taewoong Kwon, and Jungsuk Song |
6 |
Approach to Improving LIME for Real SOC Data through Tree-based Text Sampling |
Doyeon Kim, Hayoung Seong, Jun Lee, Jungsuk Song |
7 |
Automatic Detection of Label Noises in NIDS Data Using Normalizing Flow |
Youngmin Ko, Hansol Park, Taewoong Kwon, Taeyong Kim |
8 |
Evaluation of Real-World Applicability of Public Dataset–Based Threat Detection Models |
Dohyun Ahn, Hayoung Seong, Jun Lee, Jungsuk Song |