No 3. CS (26) 2025
Papers
-
Research on the Design and Development of a Secure Cold Wallet Device for Blockchain
Abstract views: 1095 / PDF downloads: 93
-
Weak Links in Smart Surveillance: An Empirical Security Evaluation of Evil Twin Attacks on IoT Cameras
Abstract views: 1112 / PDF downloads: 90
-
Memory-Resident Malware Detection via a Hybrid Deep Learning Framework
Abstract views: 1212 / PDF downloads: 148
-
FPGA-Based inline encryption bridge using AES-XTS for storage systems
Abstract views: 1150 / PDF downloads: 76
-
A Blockchain-Based Chain of Custody for Digital Evidence: Design and Evaluation
Abstract views: 1512 / PDF downloads: 234
-
AI-Enhanced SQL Injection Detection Framework: A Novel Approach Combines LLMs with Traditional Fuzzing to Improve Web Application Vulnerability Detection
Abstract views: 1197 / PDF downloads: 118
-
Enhancing MITM Attack Detection Mechanism for ICS using LSTM-based Hybrid Ensemble Learning
Abstract views: 1222 / PDF downloads: 137
-
Proposal of an End-to-End Encrypted Chat System with Digital Signature and Vietnamese Character Support Based on Elliptic Curve
Abstract views: 1080 / PDF downloads: 174
-
Throughput Optimization of the ASCON Lightweight Cryptographic Algorithm on IoT Devices
Abstract views: 1233 / PDF downloads: 250










