No 2. CS(25) 2025
Papers
-
Malware Analysis: A Perspective from Dynamic Symbolic Execution of Binary Code
Abstract views: 36 / PDF downloads: 22
-
A secure image steganography based on Hamming codes and image block complexity estimation using a zig-zag order
Abstract views: 29 / PDF downloads: 11
-
A Scalable Telegram-Based Botnet Framework for Stealthy Remote Command and Control
Abstract views: 61 / PDF downloads: 22
-
Generating evasive payloads for assessing Web Application Firewalls with Reinforcement Learning and Pre-trained Language Models
Abstract views: 78 / PDF downloads: 1
-
FedPC Cloud CPU Forecasting using Federated Learning and Periodicity-based Clustering
Abstract views: 35 / PDF downloads: 0