Works Published in 2025

search works

Displaying all 7 works

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2025 journal article

Thor: A Non-Speculative Value Dependent Timing Side Channel Attack Exploiting Intel AMX

IEEE Computer Architecture Letters.

By: F. Dizani, A. Ghanbari, J. Kalyanapu, D. Asher & S. Ajorpaz

topics (OpenAlex): Cryptographic Implementations and Security; Physical Unclonable Functions (PUFs) and Hardware Security; Security and Verification in Computing
Source: ORCID
Added: March 25, 2025

2025 journal article

Effects of Multimedia-based Education on Learning Outcomes: An Evidence Gap Map Analysis and A Second Order Meta-analysis

Journal of Educational Multimedia and Hypermedia. https://www.learntechlib.org/primary/p/222742/

Contributors: T. Sun, T. Wu, F. Martin & C. Westine

Source: ORCID
Added: March 14, 2025

2025 article

Automated Generation of Behavioral Signatures for Malicious Web Campaigns

INFORMATION SECURITY, PT II, ISC 2024, Vol. 15258, pp. 226–245.

topics (OpenAlex): Spam and Phishing Detection; Advanced Malware Detection Techniques; Network Security and Intrusion Detection
Source: Web Of Science
Added: March 10, 2025

2025 article

JSHint: Revealing API Usage to Improve Detection of Malicious JavaScript

INFORMATION SECURITY, PT II, ISC 2024, Vol. 15258, pp. 205–225.

By: S. Sarker n, K. Schulz n, A. Nahapetyan n, A. Das n & A. Kapravelos n

topics (OpenAlex): Spam and Phishing Detection; Advanced Malware Detection Techniques; Web Application Security Vulnerabilities
Source: Web Of Science
Added: March 10, 2025

2025 journal article

Comparing effectiveness and efficiency of Interactive Application Security Testing (IAST) and Runtime Application Self-Protection (RASP) tools in a large java-based system

EMPIRICAL SOFTWARE ENGINEERING, 30(3).

By: A. Seth, S. Bhattacharya, S. Elder*, N. Zahan* & L. Williams*

author keywords: Vulnerability management; Web application security; Security analysis tools; Vulnerability scanners; Interactive application security testing; Runtime application self-protection
topics (OpenAlex): Web Application Security Vulnerabilities; Advanced Malware Detection Techniques; Security and Verification in Computing
Source: Web Of Science
Added: February 24, 2025

2025 journal article

Tailoring generative AI chatbots for multiethnic communities in disaster preparedness communication: extending the CASA paradigm

JOURNAL OF COMPUTER-MEDIATED COMMUNICATION, 30(1).

By: X. Zhao*, Y. Sun*, W. Liu* & C. Wong n

author keywords: generative AI; chatbots; disaster communication; multiethnic communities; humanness; cultural tailoring
topics (OpenAlex): AI in Service Interactions; Sentiment Analysis and Opinion Mining; Knowledge Management and Technology
Sources: Web Of Science, NC State University Libraries
Added: February 10, 2025

2025 article

Best Practices for Conducting Systematic Reviews: Perspectives of Experienced Systematic Review Researchers in Educational Sciences

Fromm, Y. M., Martin, F., Gezer, T., & Ifenthaler, D. (2025, February 4). TECHNOLOGY KNOWLEDGE AND LEARNING, Vol. 2.

By: Y. Fromm, F. Martin*, T. Gezer & D. Ifenthaler

author keywords: Systematic review; Best practice; Guideline; Interview study
topics (OpenAlex): Meta-analysis and systematic reviews
Sources: ORCID, Web Of Science, NC State University Libraries
Added: February 4, 2025

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2025) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.