No 2. CS(25) 2025
Papers
-
Malware Analysis: A Perspective from Dynamic Symbolic Execution of Binary Code
Abstract views: 359 / PDF downloads: 222
-
A secure image steganography based on Hamming codes and image block complexity estimation using a zig-zag order
Abstract views: 239 / PDF downloads: 78
-
A Scalable Telegram-Based Botnet Framework for Stealthy Remote Command and Control
Abstract views: 332 / PDF downloads: 195
-
Generating evasive payloads for assessing Web Application Firewalls with Reinforcement Learning and Pre-trained Language Models
Abstract views: 693 / PDF downloads: 181
-
FedPC Cloud CPU Forecasting using Federated Learning and Periodicity-based Clustering
Abstract views: 213 / PDF downloads: 83










