Systems Security.- A Security Analysis of Password Managers on Android.- The Design and Application of a Unified Ontology for Cyber Security.- Big Data Forensics on Apache Kafka.- A Survey on Security Threats and Mitigation Strategies for NoSQL Databases MongoDB as a Use Case.- Theoretical Enumeration of Deployable Single-output Strong PUF Instances based on Uniformity and Uniqueness Constraints.- Network Security.- Detection and Hardening Strategies to Secure an Enterprise Network.- Attack Graph Based Security Metrics For Dynamic Networks.- An Energy-conscious surveillance scheme for intrusion detection in underwater sensor networks using Tunicate swarm optimization.- Security in AI/ML.- STN-Net: A Robust GAN-Generated Face Detector.- MDLDroid: Multimodal Deep Learning based Android Malware Detection.- A Cycle-GAN Based Image Encoding Scheme for Privacy Enhanced Deep Neural Networks.- Secure KNN Computation On Cloud.- A Multi-Stage Multi-Modal Classification Model for DeepFakes Combining Deep Learned and Computer Vision Oriented Features.- Privacy.- Security and Privacy in Machine Learning.- Attack on the Privacy-Preserving Carpooling Service TAROT.- Democracy in Your Hands!: Practical Multi-Key Homomorphic E-Voting.- Cryptography.- Secured Collaboration with Ciphertext Policy Attribute Based Signcryption in a Distributed Fog Environment for Medical Data Sharing.- Verifiable Timed Accountable Subgroup Multi-signatures.- Verifiable Timed Accountable Subgroup Multi-signatures.- Blockchains.- Ensuring Data Security in the Context of IoT Forensics Evidence Preservation with Blockchain and Self-Sovereign Identities.- Analysis of Optimal Number of Shards using ShardEval, A Simulator for Sharded Blockchains.- SoK: Digital Signatures and Taproot Transactions in Bitcoin.- BCTPV-NIZK: Publicly-verifiable non-interactive zero-knowledge proof system from minimal blockchain assumptions.- Proof-of-Variable-Authority: A blockchain consensus mechanism for securing IoT networks.- An Efficient Two-Party ECDSA Scheme for Cryptocurrencies.- Secure Smart Grid Data Aggregation Based on Fog Computing and Blockchain Technology.- Crypto-Ransomware Detection: A Honey-file based approach using chi-square test.- PSDP: Blockchain-Based Computationally Efficient Provably Secure Data Possession.- Private and Verifiable Inter-bank Transactions and Settlements on Blockchain.