No 2. CS(25) 2025
Papers
-
Malware Analysis: A Perspective from Dynamic Symbolic Execution of Binary Code
Abstract views: 377 / PDF downloads: 264
-
A secure image steganography based on Hamming codes and image block complexity estimation using a zig-zag order
Abstract views: 257 / PDF downloads: 85
-
A Scalable Telegram-Based Botnet Framework for Stealthy Remote Command and Control
Abstract views: 364 / PDF downloads: 229
-
Generating evasive payloads for assessing Web Application Firewalls with Reinforcement Learning and Pre-trained Language Models
Abstract views: 772 / PDF downloads: 204
-
FedPC Cloud CPU Forecasting using Federated Learning and Periodicity-based Clustering
Abstract views: 224 / PDF downloads: 96










