Large Language Models (LLMs) are increasingly deployed as autonomous agents capable of sustained, multi-turn interactions. While safety research focuses heavily on content filtering (e.g., preventing hate speech or instructional harm),...
Global cybersecurity workforce shortages persist as a critical challenge, exacerbated by a gap between academic competencies and practical industry skills. Traditional theoretical instruction often fails to prepare graduates for real-world...
Generative UI, where interfaces are dynamically constructed by Large Language Models (LLMs) at runtime, promises unparalleled personalization. However, the foundational assumption—that providing a user persona to an LLM actually results...
Higher education’s complexity and the demand for AI in decision-making necessitate exploring assessment and evaluation tasks. This systematic literature review of 10 articles from the ACM Digital Library and Scopus identifies six primary...
Technology for human–wildlife interaction has largely focused on monitoring, sensing, and risk-reduction systems, with fewer efforts supporting interactive learning and perception-building tools for underrepresented species such as...
Agentic AI systems increasingly move beyond text generation to goal-directed operation that can plan, use tools, manage state, and coordinate across multiple agents. As autonomy increases, security risk shifts from incorrect outputs...
Bats provide important ecosystem services and serve as bioindicators, making their monitoring critical for ecosystem health. However, bat monitoring typically relies on single-sensor acoustic data, lacking environmental context. Moreover,...
Cryptojacking is the unauthorized use of computational resources to mine cryptocurrency without the owner's consent. What began as browser-based mining scripts has evolved into a broader set of attacks targeting endpoints, networks,...
Privacy-preserving techniques protect user data in mobile apps, where heavy data collection elevates risk. This systematic literature review examines techniques used in mobile software engineering, their adoption across development...
This study investigates the role of large language model (LLM) agents in enhancing student learning in computing education. Through a systematic review of the literature, we analyzed 46 peer-reviewed publications published between...
A study done in 2022 on popularity of accessibility features in games found that as of the conduction of the research there were a recorded 3 billion individuals who played digital games, approximately one third of which experience...
Smart water systems rely on wireless sensor networks (WSNs) to monitor critical physical assets such as pipes, valves, junctions, and pumps, but these cyber-physical systems are vulnerable to sensor outages and communication disruption....
Android mobile games often embed third-party analytics and advertising SDKs, raising concerns about how frequently these apps request access to privacy-sensitive and other critical resources. This study examines permissions in top...
Privacy interfaces often fail because they rely on technical jargon rather than clearly communicating the consequences of data sharing. Grounding our approach in Situational Awareness theory, we developed the Privacy Nudge Evaluation...
The rapid expansion of cloud computing has made it a prime target for cryptojacking—a stealthy attack where unauthorized actors hijack cloud resources to mine cryptocurrency. These attacks degrade performance and inflict significant...
Live event streams serve millions of viewers. When quality drops during a match, operations teams need the root cause in seconds. Current tools alert but do not isolate the faulty component. A football goal triggers a 3x viewer surge...
Effective management of open-source software (OSS) projects is vital for their sustainability and success, yet many projects struggle with contributor retention, issue resolution, and maintainer burnout. This study applies Mining Software...
The rapid adoption of Generative AI (Gen-AI) tools across educational and professional sectors has outpaced the development of standard measures to evaluate user competency. Without validated assessment tools, organizations face significant...
The dynamic nature of the darknet, especially in decentralized anonymity systems such as the Invisible Internet Project (I2P), is a major problem to forensic investigation and long-term preservation of digital data. The inability to...
The Industrial Internet of Things (IIoT) integrates physical systems with digital networks, unlocking immense operational efficiency but introducing critical cyber-physical security risks. Understanding these threats and developing...
The paper presents a systematic literature review of 16 studies (2010–2025) comparing AI models with rule-based systems and human analysts for insider-threat detection in terms of accuracy and speed. AI approaches generally achieve...
Crowdsourced urban safety applications have successfully democratized real-time incident awareness, yet they predominantly operate as reactive alerting systems. As these platforms transition toward proactive, AI-driven interventions—such...
Early melanoma detection is critical to improving patient survival, yet accurate screening remains dependent on specialized clinical expertise. SPECTRA is a deep learning prototype for melanoma classification using transfer learning...
This poster presents a socio-technical approach to security threat planning to create a "living persona repository". Addressing the challenge that information system failures are often behavioral rather than technical, the research...
Water and Wastewater (W&Ww) networks are vital for the smooth running of economies, environments, and general populations worldwide. Because cyber and physical systems are interconnected, they are highly vulnerable, so ensuring their...
The Invisible Internet Project (I2P) is a decentralized anonymity network that routes user traffic through peer-selected, multi-hop encrypted tunnels. While I2P's goal is to prevent network observers from correlating user identity...
Modern software heavily relies on Open Source Software (OSS) libraries and dependencies, creating complex digital supply chains. However, this reliance introduces significant vulnerabilities. The Dependency Paradox occurs when the...
Modern security operations centers (SOCs) are overwhelmed by alert fatigue and persistent blind spots, largely due to inefficient detection engineering. Too often, teams rely on vendor-provided, untuned rules that generate excessive...
When users configure privacy settings online, they often fail to understand the long-term, compounding consequences of their choices. This "Projection Gap" results in users unknowingly consenting to data practices that misalign with...
The rapid adoption of Artificial Intelligence (AI) into Smart Home Systems (SHSs) is changing how we engage in our home into continuously sensing and adaptive environments. These systems promise enhance safety and convenience, but...
Premier Sponsor
Gold Sponsor
Silver Sponsor
#ITExpo26