No 2. CS(25) 2025
Papers
-
Malware Analysis: A Perspective from Dynamic Symbolic Execution of Binary Code
Abstract views: 427 / PDF downloads: 334
-
A secure image steganography based on Hamming codes and image block complexity estimation using a zig-zag order
Abstract views: 305 / PDF downloads: 97
-
A Scalable Telegram-Based Botnet Framework for Stealthy Remote Command and Control
Abstract views: 426 / PDF downloads: 277
-
Generating evasive payloads for assessing Web Application Firewalls with Reinforcement Learning and Pre-trained Language Models
Abstract views: 908 / PDF downloads: 246
-
FedPC Cloud CPU Forecasting using Federated Learning and Periodicity-based Clustering
Abstract views: 267 / PDF downloads: 114










