Most Popular Papers *
China’s Maxim – Leave No Access Point Unexploited: The Hidden Story of China Telecom’s BGP Hijacking
Chris C. Demchak and Yuval Shavitt
Throughput of ASCON Compared with Popular IoT Encryption Algorithms
Mitchel R. Harvey (Ryan), Andrew M. Kaiser, and Garrett W. Hoiness
Using Blockchain Technology to Help Secure America's Defense Critical Infrastructure
Vimal Buck, Aerin Krebs, Brynn Hillard, Jakob Gerha, Joseph Lutma, Srikar Maduposu, and Ted Allen
Brandishing the Cybered Bear: Information War and the Russia-Ukraine Conflict
Azhar Unwala and Shaheen Ghori
Understanding Russia’s Cyber Policies, Strategies, and Doctrines
Bryan Hancock, Hanh Nguyen, Olga Karpoyan, Ekzhin Ear, and Shouhuai Xu
Characterizing Caldera’s Cyber Attack Emulation Capabilities
Caleb Chang, Matthew Cao, Kenyou Teoh, Ekzhin Ear, and Shouhuai Xu
The Digital Battlefield: Safeguarding Military Drones Against Cyberattacks
Jason Ashong, Arun Venkitanarayanan, and Benjamin Yankson
Enter the Battleverse: China's Metaverse War
Josh Baughman
* Based on the average number of full-text downloads per day since the paper was posted.
» Updated as of 11/05/25.