Posters > 2025
Artificial Intelligence
- Adversarial Attack Analysis of a Phishing Email Detection System based on Machine Learning and Word Error Correction [F46-QRU]
- Autonomous Flight of Fixed-Wing Aircraft Using Motion Capture [NTY-KPW]
- Ensemble Feature Selection for Network Intrusion Detection Systems Using Explainable AI: A Frequency-Based Approach [T0L-HGE]
- Text embeddings for efficient search in digital investigations [QSD-LQW]
- UAV-LLM Research Lab Platform [NMG-HOR]
- Unlearning Machine Learning Bias using Task Vector Arithmetic [6FC-5PV]
Assured Identity and Privacy
- Diffstats: Mitigating Data Poisoning Attacks to Local Differential Privacy [4EM-LWQ]
- DPFace: Formal Privacy for Facial Images [SOD-QEQ]
- Simulating Risks & Impacts of Cyberattacks on Critical Infrastructure [RNC-MJV]
End System Security
- Cyber Analysis of OT Through Rehosting [MXE-JVP]
- FuzzUEr: Enabling Fuzzing of UEFI Interfaces on EDK-2 [NMJ-GCT]
- Memory-Hard Proofs of Work [4NX-Y7D]
- Modular Prime Bias in Exponential Prime-Generating Functions [LDF-Q2D]
Human Centric Security
- Does Phishing Training Work? A Large-Scale Empirical Assessment of Multi-Modal Training Grounded in the NIST Phish Scale [T5I-7DS]
- Mechanisms of Virality in Public Online Discourse [3YL-I0K]
- Rationality of Learning Algorithms in Repeated Games [FDZ-UJ3]
- Real-Time Viewer Perceptions of 'Pedohunter' Content on Twitch [YL5-JBW]
- Software Signing: Practical Adoption, Challenges, and Tooling Usability [C1Y-OBE]
Network Security
- A Quantal Response Analysis of Human Decision-making in Interdependent Security Games Modeled by Attack Graphs [UQI-JMI]
- Can Investigators Rely on DeepSeek Artifacts from Mobile Devices? An In-depth Forensic Analysis [FGV-HEM]
- Data-free backdoor approach in Malware Image Classification Models. [QHC-J1K]
- Deceptive Directions: Understanding Route Guidance and GPS Spoofing Attacks [JPT-6N8]
- Exploiting Intent State and Flow Configuration Discrepancy [Y8H-C5A]
- Learning Adversarial Attacks on Adaptive Traffic Signal Control Systems Under Cooperative Perception [RGP-NF7]
- Post-Quantum Secure Distributed Computing from Lightweight Cryptography [SGH-DQX]
- PR-DRA: PageRank-based defense resource allocation methods for securing interdependent systems modeled by attack graphs [JRY-WEG]
- Securing Aviation Communications: A Network-Based Approach [G6E-JZR]
- Small Trains, Big Risk: Physically Modeling Critical Freight Rail Infrastructure [OBR-I50]
- When TikTok is No Longer: A Forensic Analysis of Rednote on Android [9BV-JPO]
Policy, Law and Management
Prevention, Detection and Response
- Cascading Risk in Cyber-Physical Systems Under Climate Uncertainty [EIL-OGH]
- iGEM: A Multi-Device Forensic Visualization Software for Geolocation and Digital Evidence Matching [KCV-CTR]
- Model Order Reduction of Cyber-Physical Systems Considering Stealthy Attacks [9ER-COR]
- Range-Based Multi-Robot Integrity Monitoring For Cyberattacks and Faults: An Anchor-Free Approach [G1F-JBE]
- Resilient Multi-Robot Coverage Control Under Stealthy Cyberattacks [HQL-RIA]
- Secure Chain: A Knowledge Graph for Resilient, Trustworthy, and Secure Software Supply Chains [3FV-EHU]
- Sensor Scheduling in Intrusion Detection Games with Uncertain Payoffs [2FK-XHB]
- SiDG-ATRID: Simulator for Data Generation for Automatic Target Recognition, Identification and Detection [OBY-49M]
- Unleashing Insights from Terabytes: Microservices Architecture for Digital Intelligence and Evidence [82F-RTX]
- Using a Modified Delphi Method: Identify Cyber Secure Competencies for Older Adults [4CE-9CY]
- Wearable Action Camera Forensics: GoPro HERO13 Black on Android [DFX-AEI]
- Weighted Anomaly Detection and Arbitrage Analysis: A Blockchain Forensics Framework Leveraging Bitcoin and Dogecoin Transactions [D3U-1HI]