Development of a Quantum-Resistant File Transfer System with Blockchain
Audit Trail
http://arxiv.org/abs/2504.07938v1
QubitHammer Attacks: Qubit Flipping Attacks in Multi-tenant
Superconducting Quantum Computers
http://arxiv.org/abs/2504.07875v1
SAFARI: a Scalable Air-gapped Framework for Automated Ransomware
Investigation
http://arxiv.org/abs/2504.07868v1
Deep Learning-based Intrusion Detection Systems: A Survey
http://arxiv.org/abs/2504.07839v1
Realigning Incentives to Build Better Software: a Holistic Approach to
Vendor Accountability
http://arxiv.org/abs/2504.07766v1
Exploring a Patch-Wise Approach for Privacy-Preserving Fake ID Detection
http://arxiv.org/abs/2504.07761v1
PR-Attack: Coordinated Prompt-RAG Attacks on Retrieval-Augmented
Generation in Large Language Models via Bilevel Optimization
http://arxiv.org/abs/2504.07717v1
DWFS-Obfuscation: Dynamic Weighted Feature Selection for Robust Malware
Familial Classification under Obfuscation
http://arxiv.org/abs/2504.07590v1
Privacy-Preserving Vertical K-Means Clustering
http://arxiv.org/abs/2504.07578v1
Malware analysis assisted by AI with R2AI
http://arxiv.org/abs/2504.07574v1
MUFFLER: Secure Tor Traffic Obfuscation with Dynamic Connection
Shuffling and Splitting
http://arxiv.org/abs/2504.07543v1
Intelligent DoS and DDoS Detection: A Hybrid GRU-NTM Approach to Network
Security
http://arxiv.org/abs/2504.07478v1
CyberAlly: Leveraging LLMs and Knowledge Graphs to Empower Cyber
Defenders
http://arxiv.org/abs/2504.07457v1
Exploring Vulnerabilities and Concerns in Solana Smart Contracts
http://arxiv.org/abs/2504.07419v1
Decomposition-Based Optimal Bounds for Privacy Amplification via
Shuffling
http://arxiv.org/abs/2504.07414v1
Augmented Shuffle Protocols for Accurate and Robust Frequency Estimation
under Differential Privacy
http://arxiv.org/abs/2504.07362v1
Electronic Warfare Cyberattacks, Countermeasures and Modern Defensive
Strategies of UAV Avionics: A Survey
http://arxiv.org/abs/2504.07358v1
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>