Self-Healing Cyber-Physical Systems (SH-CPS) effectively recover from sy...
With increased reliance on Internet based technologies, cyberattacks
com...
The rapid evolvement of deepfake creation technologies is seriously thre...
The popularity of encryption mechanisms poses a great challenge to malic...
Cyber intrusion attacks that compromise the users' critical and sensitiv...
Smart sensors, devices and systems deployed in smart cities have brought...
Data splitting preserves privacy by partitioning data into various fragm...
Internet of Things (IoT) has become a popular paradigm to fulfil needs o...
Malwares are the key means leveraged by threat actors in the cyber space...
Cybercrimes are on the rise, in part due to technological advancements, ...
The explanation to an AI model's prediction used to support decision mak...
As people's demand for personal privacy and data security becomes a prio...
AI methods have been proven to yield impressive performance on Android
m...
Deception techniques have been widely seen as a game changer in cyber
de...
Power demand forecasting is a critical task for achieving efficiency and...