
Sign up to save your podcasts
Or


Development of a Quantum-Resistant File Transfer System with Blockchain
QubitHammer Attacks: Qubit Flipping Attacks in Multi-tenant
SAFARI: a Scalable Air-gapped Framework for Automated Ransomware
Deep Learning-based Intrusion Detection Systems: A Survey
Realigning Incentives to Build Better Software: a Holistic Approach to
Exploring a Patch-Wise Approach for Privacy-Preserving Fake ID Detection
PR-Attack: Coordinated Prompt-RAG Attacks on Retrieval-Augmented
DWFS-Obfuscation: Dynamic Weighted Feature Selection for Robust Malware
Privacy-Preserving Vertical K-Means Clustering
Malware analysis assisted by AI with R2AI
MUFFLER: Secure Tor Traffic Obfuscation with Dynamic Connection
Intelligent DoS and DDoS Detection: A Hybrid GRU-NTM Approach to Network
CyberAlly: Leveraging LLMs and Knowledge Graphs to Empower Cyber
Exploring Vulnerabilities and Concerns in Solana Smart Contracts
Decomposition-Based Optimal Bounds for Privacy Amplification via
Augmented Shuffle Protocols for Accurate and Robust Frequency Estimation
Electronic Warfare Cyberattacks, Countermeasures and Modern Defensive
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuDevelopment of a Quantum-Resistant File Transfer System with Blockchain
QubitHammer Attacks: Qubit Flipping Attacks in Multi-tenant
SAFARI: a Scalable Air-gapped Framework for Automated Ransomware
Deep Learning-based Intrusion Detection Systems: A Survey
Realigning Incentives to Build Better Software: a Holistic Approach to
Exploring a Patch-Wise Approach for Privacy-Preserving Fake ID Detection
PR-Attack: Coordinated Prompt-RAG Attacks on Retrieval-Augmented
DWFS-Obfuscation: Dynamic Weighted Feature Selection for Robust Malware
Privacy-Preserving Vertical K-Means Clustering
Malware analysis assisted by AI with R2AI
MUFFLER: Secure Tor Traffic Obfuscation with Dynamic Connection
Intelligent DoS and DDoS Detection: A Hybrid GRU-NTM Approach to Network
CyberAlly: Leveraging LLMs and Knowledge Graphs to Empower Cyber
Exploring Vulnerabilities and Concerns in Solana Smart Contracts
Decomposition-Based Optimal Bounds for Privacy Amplification via
Augmented Shuffle Protocols for Accurate and Robust Frequency Estimation
Electronic Warfare Cyberattacks, Countermeasures and Modern Defensive
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>