source: export.arxiv.org/rss/cs.CR
maintainer: @tmaehara.bsky.social
IoTEdu: Access Control, Detection, and Automatic Incident Response in Academic IoT Networks
https://arxiv.org/abs/2512.09934
IoTEdu: Access Control, Detection, and Automatic Incident Response in Academic IoT Networks
https://arxiv.org/abs/2512.09934
Blockchain-Anchored Audit Trail Model for Transparent Inter-Operator Settlement
https://arxiv.org/abs/2512.09938
Blockchain-Anchored Audit Trail Model for Transparent Inter-Operator Settlement
https://arxiv.org/abs/2512.09938
ZK-APEX: Zero-Knowledge Approximate Personalized Unlearning with Executable Proofs
https://arxiv.org/abs/2512.09953
ZK-APEX: Zero-Knowledge Approximate Personalized Unlearning with Executable Proofs
https://arxiv.org/abs/2512.09953
Cross-Layer Isochronous Diffusion Protocol (CIDP): A Rigorous Information-Theoretic and Control-Theoretic Framework for Sovereign Tactical Anonymity
https://arxiv.org/abs/2512.09954
Cross-Layer Isochronous Diffusion Protocol (CIDP): A Rigorous Information-Theoretic and Control-Theoretic Framework for Sovereign Tactical Anonymity
https://arxiv.org/abs/2512.09954
When Quantum Federated Learning Meets Blockchain in 6G Networks
https://arxiv.org/abs/2512.09958
When Quantum Federated Learning Meets Blockchain in 6G Networks
https://arxiv.org/abs/2512.09958
TRUCE: TRUsted Compliance Enforcement Service for Secure Health Data Exchange
https://arxiv.org/abs/2512.09959
TRUCE: TRUsted Compliance Enforcement Service for Secure Health Data Exchange
https://arxiv.org/abs/2512.09959
A Comparative Analysis of zk-SNARKs and zk-STARKs: Theory and Practice
https://arxiv.org/abs/2512.10020
A Comparative Analysis of zk-SNARKs and zk-STARKs: Theory and Practice
https://arxiv.org/abs/2512.10020
Malicious GenAI Chrome Extensions: Unpacking Data Exfiltration and Malicious Behaviours
https://arxiv.org/abs/2512.10029
Malicious GenAI Chrome Extensions: Unpacking Data Exfiltration and Malicious Behaviours
https://arxiv.org/abs/2512.10029
Evaluation of Risk and Resilience of the MBTA Green Rapid Transit System
https://arxiv.org/abs/2512.10088
Evaluation of Risk and Resilience of the MBTA Green Rapid Transit System
https://arxiv.org/abs/2512.10088
LLM-PEA: Leveraging Large Language Models Against Phishing Email Attacks
https://arxiv.org/abs/2512.10104
LLM-PEA: Leveraging Large Language Models Against Phishing Email Attacks
https://arxiv.org/abs/2512.10104
Lightweight Security for Private Networks: Real-World Evaluation of WireGuard
https://arxiv.org/abs/2512.10135
Lightweight Security for Private Networks: Real-World Evaluation of WireGuard
https://arxiv.org/abs/2512.10135
Watermarks for Language Models via Probabilistic Automata
https://arxiv.org/abs/2512.10185
Watermarks for Language Models via Probabilistic Automata
https://arxiv.org/abs/2512.10185
Graph Neural Network Based Adaptive Threat Detection for Cloud Identity and Access Management Logs
https://arxiv.org/abs/2512.10280
Graph Neural Network Based Adaptive Threat Detection for Cloud Identity and Access Management Logs
https://arxiv.org/abs/2512.10280
FLARE: A Wireless Side-Channel Fingerprinting Attack on Federated Learning
https://arxiv.org/abs/2512.10296
FLARE: A Wireless Side-Channel Fingerprinting Attack on Federated Learning
https://arxiv.org/abs/2512.10296
Bit of a Close Talker: A Practical Guide to Serverless Cloud Co-Location Attacks
https://arxiv.org/abs/2512.10361
Bit of a Close Talker: A Practical Guide to Serverless Cloud Co-Location Attacks
https://arxiv.org/abs/2512.10361
D2M: A Decentralized, Privacy-Preserving, Incentive-Compatible Data Marketplace for Collaborative Learning
https://arxiv.org/abs/2512.10372
D2M: A Decentralized, Privacy-Preserving, Incentive-Compatible Data Marketplace for Collaborative Learning
https://arxiv.org/abs/2512.10372
Differential Privacy for Secure Machine Learning in Healthcare IoT-Cloud Systems
https://arxiv.org/abs/2512.10426
Differential Privacy for Secure Machine Learning in Healthcare IoT-Cloud Systems
https://arxiv.org/abs/2512.10426
Stealth and Evasion in Rogue AP Attacks: An Analysis of Modern Detection and Bypass Techniques
https://arxiv.org/abs/2512.10470
Stealth and Evasion in Rogue AP Attacks: An Analysis of Modern Detection and Bypass Techniques
https://arxiv.org/abs/2512.10470
From Lab to Reality: A Practical Evaluation of Deep Learning Models and LLMs for Vulnerability Detection
https://arxiv.org/abs/2512.10485
From Lab to Reality: A Practical Evaluation of Deep Learning Models and LLMs for Vulnerability Detection
https://arxiv.org/abs/2512.10485
LLM-Assisted AHP for Explainable Cyber Range Evaluation
https://arxiv.org/abs/2512.10487
LLM-Assisted AHP for Explainable Cyber Range Evaluation
https://arxiv.org/abs/2512.10487
Authority Backdoor: A Certifiable Backdoor Mechanism for Authoring DNNs
https://arxiv.org/abs/2512.10600
Authority Backdoor: A Certifiable Backdoor Mechanism for Authoring DNNs
https://arxiv.org/abs/2512.10600
Objectives and Design Principles in Offline Payments with Central Bank Digital Currency (CBDC)
https://arxiv.org/abs/2512.10636
Objectives and Design Principles in Offline Payments with Central Bank Digital Currency (CBDC)
https://arxiv.org/abs/2512.10636
Adaptive Intrusion Detection System Leveraging Dynamic Neural Models with Adversarial Learning for 5G/6G Networks
https://arxiv.org/abs/2512.10637
Adaptive Intrusion Detection System Leveraging Dynamic Neural Models with Adversarial Learning for 5G/6G Networks
https://arxiv.org/abs/2512.10637
Virtual camera detection: Catching video injection attacks in remote biometric systems
https://arxiv.org/abs/2512.10653
Virtual camera detection: Catching video injection attacks in remote biometric systems
https://arxiv.org/abs/2512.10653
A Proof of Success and Reward Distribution Protocol for Multi-bridge Architecture in Cross-chain Communication
https://arxiv.org/abs/2512.10667
A Proof of Success and Reward Distribution Protocol for Multi-bridge Architecture in Cross-chain Communication
https://arxiv.org/abs/2512.10667