Honeypots are essential tools in cybersecurity. However, most of them (e...
Due to the proliferation of malware, defenders are increasingly turning ...
Ransomware-as-a-service (RaaS) is increasing the scale and complexity of...
Large Language Models (LLMs) have gained widespread popularity across di...
Honeypots are a well-known and widely used technology in the cybersecuri...
Most network security datasets do not have comprehensive label assignmen...
The ongoing rise in cyberattacks and the lack of skilled professionals i...
Model stealing attacks have been successfully used in many machine learn...
Many activities related to cybercrime operations do not require much sec...
Active Directory (AD) is a crucial element of large organizations, given...
Several encryption proposals for DNS have been presented since 2016, but...
This report presents the current state of security in IPv6 for IoT devic...
As machine learning becomes more widely used, the need to study its
impl...
Domain Name Service is a trusted protocol made for name resolution, but
...