TALK KEYWORD INDEX
This page contains an index consisting of author-provided keywords.
| - | |
| - dynamic tuner | |
| - Firmware Update | |
| - IoT Anomaly detection | |
| - Low Earth Oribt | |
| - Over-the-Air Transmission | |
| - pareto front optimization | |
| - power saving | |
| - Satellite Communication | |
| 5 | |
| 5G | |
| 5G Authentication and Key Agreement (5G-AKA) | |
| 5G Core (5GC) | |
| 5G NAS | |
| 5G Network | |
| 5G Networks | |
| 5G Private Network | |
| 5G Security | |
| 5G-AKA | |
| 5G/6G network | |
| 6 | |
| 6G network | |
| 6G Networks | |
| A | |
| Access and Mobility Management Function (AMF) | |
| Access Control | |
| Account Sharing | |
| ACK-bit Voltage | |
| Activation-Guided Fuzzing | |
| Active defense | |
| Adapter Fusion | |
| Adapter-based Parameter-Efficient Transfer Learning | |
| Adaptive | |
| Adaptive Guard Interval | |
| Adaptive multi-link response | |
| Adaptive Scheduling | |
| Additive homomorphism | |
| Adjacent Channel Interference (ACI) | |
| advanced persistent threats | |
| Adversarial Attack | |
| Adversarial Attack Defense | |
| Adversarial Attacks | |
| Adversarial Perturbations | |
| Adversarial Robustness | |
| Agentic AI | |
| Agentic AI Threats | |
| agents | |
| AI | |
| AI Agent Security | |
| AI governance | |
| AI risk management | |
| AI Risk Management Framework (AI RMF 1.0) | |
| AI risk taxonomy | |
| AI Safety | |
| AI Safety and Security | |
| AI Security | |
| AI-based Security Operations | |
| AI-based Threat Simulation | |
| AI-driven cyber threats | |
| AI-driven Cybersecurity Framework | |
| AIML | |
| Air-gap attack | |
| Air-gapped system | |
| Algorithm | |
| Allowed-Only | |
| Allowed-only permission detection | |
| Allowed-Used | |
| Ambient | |
| Anomaly Detection | |
| Anomaly Detection for Secure Streaming | |
| anomaly packet detection | |
| Anonymity | |
| Anonymous Authentication | |
| Antivirus evaluation | |
| Application to a Commercial Private 5G Network | |
| Artificial intelligence (AI) | |
| AST | |
| Athena | |
| Attack Detection | |
| Attack Graph | |
| Attack Path | |
| Attack Taxonomy | |
| Attribute Authentication | |
| Attribute Inference Attack | |
| Attribute Revocation | |
| Attribute-based encryption | |
| Authenticated key exchange | |
| Autoencoder | |
| Automated formal verification | |
| Automated least privilege enforcement | |
| Automated Threat Scenario Generation | |
| Automatic Exposure Control (AEC) | |
| Automotive | |
| Automotive Cybersecurity | |
| Automotive Security | |
| Autonomous Driving | |
| Autonomous Robots | |
| Autonomous Vehicle | |
| AVN(Audio Video Navigation) | |
| AWS | |
| AWS Athena | |
| B | |
| Backdoor Embedding | |
| Basic safety message | |
| Basic Safety Message (BSM) | |
| Beacon Synchronization | |
| Behavioural anti-malware | |
| Binary Code Analysis | |
| Binary Lifting | |
| Biometric Authentication | |
| Biometric information | |
| Block Korkine–Zolotarev | |
| Blockchain | |
| Bluetooth BR/EDR | |
| C | |
| cahce | |
| Camera Attack | |
| Camera Sensor Security | |
| CAN bus | |
| Capture the Flag (CTF) | |
| CDS | |
| Cellular Networks | |
| Cellular Security | |
| Chain of Custody | |
| chameleon hash | |
| Chameleon Hash Function (CH) | |
| channel-state information | |
| CICFlowMeter | |
| CICIoMT2024 | |
| Ciphertext Policy | |
| Circuit | |
| Circuit Breaker | |
| Circuit breaking | |
| Circuit optimization | |
| classification | |
| CLIP | |
| Clock Drift | |
| cloud native applications | |
| Cloud storage | |
| CloudTrail | |
| CNN model | |
| Code Transformation | |
| Cognitive Security | |
| Column vector | |
| Compliance | |
| Congestion Control | |
| constrained Markov decision process (CMDP) | |
| Constraint Standardization | |
| Content Popularity Prediction | |
| Continual Learning | |
| Continuous Authentication | |
| Control Correlation Identifier (CCI) | |
| Controller Area Network (CAN) | |
| Cookie | |
| Cooperative detection | |
| Course Design Analysis | |
| covert communication | |
| CPS Security | |
| CRA | |
| Cross Domain Solution | |
| Cross Domain Solution (CDS) | |
| Cross-artifact | |
| Cross-Domain Solution | |
| Cross-sector policy alignment | |
| Cryptanalysis | |
| Cryptography | |
| Cryptography Engineering | |
| CTI | |
| Cumulative Malicious User Injection | |
| Curriculum learning | |
| CuSum algorithm | |
| Cyber Attack Scenarios | |
| Cyber Attack Simulation | |
| Cyber Defense Training | |
| Cyber Security | |
| Cyber Threat Intelligence (CTI) | |
| Cyberattack Mitigation | |
| Cybersecurity | |
| Cybersecurity policy response model | |
| Cybersecurity Training | |
| D | |
| Data Anonymization | |
| Data Exfiltration | |
| Data Governance | |
| Data integrity | |
| Data Poisoning Attacks | |
| Data tampering | |
| Data-at-rest encryption | |
| DDoS | |
| Decision-Making | |
| Deep Learning | |
| Deep Neural Network | |
| Deep Optical Imaging | |
| Deep Q-Learning | |
| Deep Reinforcement Learning | |
| Deepfake Datasets | |
| Deepfake incident case study | |
| defense network | |
| deniable encryption | |
| Device Binding | |
| DevSecOps | |
| Differential Privacy | |
| Digital Evidence | |
| Digital Forensics | |
| Digital Signature | |
| digital signatures | |
| Digital Trace Analysis | |
| Digital Watermark | |
| Digital watermarking | |
| direct interconnection | |
| Disaster Information System | |
| Disaster Response | |
| Discrete Wavelet Transform | |
| DNN Model | |
| Dolev-Yao Model | |
| Domain-specific features | |
| DoS | |
| DPKT | |
| Drain Parser | |
| Drone security | |
| Dynamic Membership Management | |
| Dynamic Memory Allocation | |
| E | |
| Early Warning System for Heavy Rainfall | |
| eBPF-XDP | |
| ECDIS | |
| ECG | |
| Edge Computing | |
| edge-cloud | |
| EDHOC | |
| Efficiency Optimization | |
| Elliptic Curve Cryptography | |
| Embedded Security | |
| ENC Update | |
| encrypted flow | |
| Encrypted Network Traffic | |
| Encrypted Traffic Classification | |
| Encryption heuristics | |
| Energy Efficiency | |
| Energy-Aware Computing | |
| Entropy analysis | |
| Error-driven strategies | |
| eSIM | |
| ET-BERT | |
| Ethical and Trustworthy AI | |
| Event Data Recorder (EDR) | |
| Explainable Artificial Intelligence (XAI) | |
| Exponentially Weighted Moving Average (EWMA) | |
| F | |
| Face–Skeleton–Voice Fusion | |
| Facial Beauty Prediction | |
| Fail-Operational | |
| Fail-Safe | |
| Fairness | |
| fake base station | |
| False Base Station | |
| False positives in security software | |
| Fault Attack | |
| Feature Extraction | |
| Federated Learning | |
| Federated-Inspired Coordination | |
| Firewalling | |
| Flow Optimization | |
| flow sequences | |
| forensic | |
| Forensic framework | |
| Forgery Detection Method | |
| formal analysis | |
| Formal security verification | |
| Formal Verification | |
| Free Floating Space Robots | |
| Frequency | |
| Frequency Hopping | |
| Fully Homomorphic Encryption (FHE) | |
| Fuzzy Extractor | |
| G | |
| Gemini | |
| Generative AI | |
| Generative Remediation | |
| Genetic Algorithm | |
| Google Gemini | |
| Google Takeout | |
| Google Workspace | |
| Government and corporate AI regulations | |
| GPS security | |
| Grover's algorithm | |
| H | |
| H-Risk | |
| HDFS Dataset | |
| Hidden service | |
| High-level assurance | |
| Homomorphic encryption | |
| Hybrid Cryptographic Protocols | |
| Hybrid scheme | |
| I | |
| IaC | |
| IAM and Cognito | |
| IAM privilege validation | |
| ID-Based Signature | |
| Identity-Based Encryption | |
| IDS | |
| IETF LAKE WG | |
| IKEv2 | |
| Illegal Streaming Sites | |
| Implementation | |
| Implicit Authentication | |
| In-Vehicle IDS | |
| In-Vehicle Network (IVN) | |
| In-vehicle Network Security | |
| incompressible signatures | |
| Incremental Learning | |
| Industrial Control System | |
| Industrial control systems | |
| Industrial Control Systems Security | |
| Industrial Sensor Data | |
| Inference Efficiency | |
| information leakage monitoring | |
| Infrastructure as Code(IaC) | |
| Input Filtering | |
| Integrity | |
| Integrity Verification | |
| Intellectual Property | |
| intent-based networking | |
| intent-based resource allocation | |
| International Training Course | |
| Internet of Things | |
| intruder detection | |
| Intrusion Detection | |
| Intrusion Detection System | |
| Intrusion Detection System (IDS) | |
| Invisible Watermark | |
| IoMT | |
| IoMT (Internet of Medical Things) | |
| IoT | |
| IoT security | |
| IoT--Edge Continuum | |
| IPFS (Inter-Planetary File System) | |
| IPS | |
| Isogeny-Based Cryptography | |
| Isolation Forest | |
| Istio | |
| ITU-T SG17 | |
| IWOA | |
| J | |
| Jailbreak | |
| Jailbreak Attacks | |
| Jailbreak Template Generation | |
| Jamming attack detection | |
| JSON Web Tokens (JWTs) | |
| K | |
| Kalman Filter | |
| Key Encapsulation Mechanism | |
| Key management mechanism | |
| Known IV attack | |
| Kubernetes | |
| L | |
| L1/L2 Plausibility Checks | |
| Lambda-based log analysis | |
| Lane Detection | |
| Large Language Model | |
| Large language model (LLM) | |
| Large Language Models | |
| Large Language Models(LLM) | |
| Large Language Models(LLMs) | |
| Latency Reduction | |
| Lattice attack | |
| Lattice-Based Cryptography | |
| Learning With Errors | |
| Legal | |
| Leo Satellite | |
| lexicographic optimization | |
| LiDAR Security | |
| LightGBM | |
| Lightweight Cryptography | |
| Lightweight Security | |
| LLM | |
| LLM agent | |
| LLM Jailbreak | |
| LLM safety | |
| LLM Security | |
| LLM Supply Chain Attack | |
| LLVM IR | |
| Local LLMs | |
| Log Parsing | |
| Logistic regression | |
| Low earth orbit (LEO) satellite communications | |
| LSTM-Autoencoder | |
| M | |
| Machine Learning | |
| Machine Learning-based Misbehavior Detection Systems (ML-MDS) | |
| Malware Analysis | |
| Malware Creation | |
| management control mechanism | |
| Maritime Cybersecurity | |
| Markov Matrix | |
| Matrix | |
| Maude Strategy | |
| Meet-in-the-Middle | |
| Memory Vulnerability Detection | |
| Message Authentication Code (MAC) | |
| Metadata | |
| Military Network | |
| Mitigation Strategy | |
| MITRE ATT&CK | |
| MITRE ATT&CK Framework | |
| MITRE ATT&CK Techniques Simulation | |
| MITRE D3FEND | |
| ML | |
| ML-KEM | |
| MLS CDS | |
| Mobile Edge Computing | |
| Mobile Forensics | |
| mobile network | |
| Mobile Security | |
| Model Context Protocol | |
| model watermark | |
| Model-based Testing | |
| model-stealing attack | |
| Multi-Agent | |
| Multi-cloud | |
| Multi-Condition Backdoor | |
| multi-domain network intent resolution | |
| Multi-factor Authentication | |
| Multi-Keyword Search | |
| Multi-Link Operation (MLO) | |
| multi-modal learning | |
| Multi-modal Model | |
| Multi-policy Enforcement | |
| Multi-Resolution Feature Fusion | |
| Multi-User Detection | |
| Multimodal Biometrics | |
| Multiple Authorities | |
| Multiplicative Complexity reduction | |
| Multivariate Quadratic Signature | |
| Music Recommendation | |
| N | |
| NAS Count | |
| Natural Language Inference | |
| Near-RT | |
| Network | |
| network behavior analysis | |
| Network communtication protocol | |
| Network Digital Twin | |
| Network Security | |
| Network Separation | |
| Network Slicing | |
| Network Traffic Data | |
| Neural Network Analysis | |
| NFT | |
| NG Application Protocol (NGAP) | |
| NLP for Systems | |
| Non-stored | |
| Noninvasive glucose monitoring | |
| NTN | |
| Nuclear Nonproliferation and Security | |
| O | |
| Obfuscation | |
| object detection | |
| Obstacle Avoidance | |
| offloading | |
| On-device AI | |
| On-Device AI Model | |
| Open RAN | |
| Open-Source Software | |
| OpenAI | |
| Optimization | |
| OQS-TLS | |
| Orchestration | |
| OSCAL | |
| OSS | |
| OT–IT Convergence Vulnerability | |
| Overlapping Basic Service Set | |
| P | |
| P-frame | |
| Panama Stream Cipher | |
| Parameter Tampering Attack | |
| Partial Homomorphic Encryption (PHE) | |
| Passport.js | |
| Path Orchestration | |
| Pattern Matching | |
| PBFT | |
| Pedersen commitment | |
| Perfect forward secrecy | |
| Persona Conditioning | |
| Persona Governance | |
| Phishing | |
| Phishing detection | |
| Physical Layer Security | |
| Poisoning Attack | |
| Policy as Code | |
| Policy as Code(PaC) | |
| Policy requirements and control mapping | |
| PoLP | |
| Portal-Resource Model | |
| Post-Quantum | |
| Post-Quantum Cryptography | |
| Post-Quantum Cryptography (PQC | |
| Post-Quantum Cryptography (PQC) | |
| post-quantum encryption | |
| PoW | |
| power allocation | |
| PPG | |
| Preamble Protection | |
| Preemptive Framework | |
| Prefetching | |
| Principal Component Analysis(PCA) | |
| Privacy | |
| Privacy At Ransom Testbed (PART) | |
| Privacy forwarding | |
| privacy preservation | |
| Privacy Protection | |
| Privacy-enhancing technologies (PETs) | |
| Privacy-free | |
| privacy-preserving | |
| Privacy-preserving anomaly detection | |
| Privacy-Preserving Security Monitoring | |
| Private 5G | |
| Private 5G Network | |
| Private 5G Security Assesement Framework | |
| process file system | |
| Prompt engineering | |
| Protocol | |
| Protocol Compliance | |
| Protocol fuzzing | |
| Protocol vulnerability | |
| provenance analysis | |
| Proverif | |
| Proxy Re-Encryption | |
| Pseudo-Labeling | |
| Public-key Cryptography | |
| Q | |
| Qiskit | |
| QR-code authentication | |
| Quantum | |
| Quantum entanglement | |
| Quantum Key Distribution (QKD) | |
| Quantum Resistance | |
| Quantum security | |
| Qwen | |
| R | |
| Rank-1 Constraint System | |
| Ransomware detection | |
| Rate-Distorion Theory | |
| Real-time Defense | |
| Real-time SNS alert | |
| Real-time speech protection | |
| Recommendation Systems | |
| Reconstruction attack | |
| Red-Teaming | |
| Regulatory compliance | |
| Regulatory sandbox | |
| Reinforcement Learning Security | |
| Remote SIM Provisioning | |
| Requirement Relationship Analysis | |
| Resilience | |
| RESTful API | |
| Retransmission | |
| Risk-based Authentication | |
| Roaming | |
| Robotic Manipulation | |
| routing | |
| S | |
| Saliency-Weighted Exposure Control (DSWEC) | |
| Satellite | |
| Satellite Communication | |
| Satellite-Terrestrial Integrated Network | |
| SBOM | |
| Schnorr ID Protocol | |
| Searchable Encryption | |
| Secondary Data Transmission | |
| Secure Communication Protocol | |
| Secure deletion | |
| Secure Information Exchange | |
| Secure Simple Pairing | |
| Security | |
| security applications | |
| Security Architecture | |
| Security as a Service | |
| Security Education | |
| Security for AI | |
| Security Governance | |
| Security Patching | |
| Security Requirement | |
| Security Service Function | |
| Security System Operation | |
| Security usability conflicts | |
| Self-HarmLLM | |
| Semantic Caching | |
| Semantic consistency | |
| Semantic Vulnerability Detection | |
| Semi-Supervised Learning | |
| Sensitive Attribute | |
| Sequential Recommendation | |
| Service Mesh | |
| Service Orchestration | |
| Service-Based Architecture | |
| Session Security | |
| Shamir's Secret Sharing | |
| Shared Multimodal Encoder | |
| Shipboard Cyberattack | |
| Short-Term Event Detection | |
| side-channel attack | |
| Sidecar | |
| Signal Overshadowing | |
| Signal Reconstruction | |
| signature leak | |
| Simulation Analysis | |
| Slope-based SAD | |
| Small Language Model (SLM) | |
| Smart Irrigation | |
| Software Vulnerability | |
| Software-Defined Network | |
| SOME/IP | |
| Specification-based Cellular | |
| SpikeDecay Model | |
| Split | |
| Spoofing Attack Detection | |
| Stable Diffusion | |
| Stake voting system | |
| Steganalysis | |
| Steganalysis Residual Network | |
| Steganography | |
| STIX | |
| Strand Space | |
| Stream Cipher | |
| Strengthening ZTA with CDS | |
| Structure-Aware Fuzzing | |
| Succinct Proofs | |
| Supply chain | |
| Supply Chain Attacks | |
| Supply Chain Security | |
| Syntax mutation | |
| System Prompt | |
| system security | |
| T | |
| Tabular Data | |
| Task Offloading | |
| TBD | |
| TBDD | |
| TBDDD | |
| Telematics | |
| Template Mining | |
| Temporal Attack Dynamics | |
| Terraform | |
| Testbed | |
| Testbed Validation | |
| Testimony Reliability | |
| Text-to-Image | |
| Threat classification and mapping model | |
| threat detection | |
| Time-Bound Access Control | |
| Time-Indexed Key Management | |
| Time-to-Collision (TTC) | |
| TLS | |
| TLS 1.3 Integration | |
| TLS protocol | |
| TLS verification | |
| Tool Development | |
| Tor | |
| traceability attack | |
| Transfer CDS | |
| Transmit Power Control | |
| Transparency | |
| Trusted Execution Environments (TEEs) | |
| U | |
| UAV Swarm Networks | |
| UE Registration | |
| Unified risk categorization framework | |
| unmanned aerial vehicle (UAV) cooperative jamming | |
| UPPAAL Model Checking | |
| Usable-Security | |
| V | |
| V2X | |
| VANET | |
| Vehicle-to-Everything (V2X) | |
| Verifiability | |
| Vessel Cyber Resilience | |
| Video processing | |
| Video Watermarking | |
| virtual machine monitor | |
| Virtualization | |
| Vision-Language-Action (VLA) | |
| Visualization | |
| Visualization System | |
| Voice cloning defense | |
| voting protocol | |
| Vulnerability Detection | |
| Vulnerability Identification | |
| W | |
| Wake-up Time Correction | |
| Web applications | |
| Web artifacts | |
| Weight Estimation | |
| White-box Cryptography | |
| Wi-Fi sensing obfuscation | |
| Wireless Communication Efficiency | |
| Wireless Network | |
| Wireless networks | |
| Wireless security | |
| Wireless Sensor Networks | |
| X | |
| X.509 certificate | |
| xApp | |
| Y | |
| YOLO | |
| Z | |
| Zero Knowledge (ZK) rollups | |
| Zero Trust | |
| Zero Trust Architecture | |
| Zero Trust Architecture (ZTA) | |
| Zero Trust Network Access (ZTNA) | |
| Zero Trust Security | |
| Zero-knowledge proof | |
| Zero-Knowledge Proofs | |
| Zero-shot | |
| ZTA 5 Pillars | |