Academic Research & Publications

Explore peer-reviewed papers, technical reports, and whitepapers published by the CyberVault Research Division. Our work advances AI-driven threat detection, zero-trust architectures, and next-generation cryptographic protocols.

42 Peer-Reviewed Papers
1.2k+ Citations
15 Active Labs
8 Top-Tier Venues
IEEE S&P 2024 2024

Adaptive Graph Neural Networks for Real-Time APT Detection in Enterprise Networks

A. Chen, L. Martinez, CyberVault AI Lab

We propose a dynamic graph neural network architecture that models lateral movement patterns in enterprise environments. Our framework achieves 99.4% accuracy in detecting Advanced Persistent Threats with sub-second latency, outperforming static baseline models by 18.2%.

GNNAPTNetwork SecurityReal-time
ACM CCS 2024 2024

Cross-Cloud Integrity Verification Using Lightweight Zero-Knowledge Proofs

R. Patel, K. Nakamura, CyberVault Cloud Security Team

This paper introduces ZK-CloudVerify, a protocol enabling continuous integrity checks across hybrid cloud deployments without exposing raw telemetry. We demonstrate 60% lower computational overhead compared to traditional hash-chain methods while maintaining cryptographic assurance.

Zero-KnowledgeCloudHybrid Infrastructure
USENIX Security 2023 2023

Behavioral Telemetry Analysis for Continuous Zero-Trust Authentication

J. Vance, M. Okoye, CyberVault Identity Group

Traditional MFA creates friction and blind spots between authentications. We present a continuous verification model leveraging keyboard dynamics, cursor trajectories, and session entropy to maintain trust scores without interrupting user workflows.

Zero TrustBehavioral BiometricsAuthentication
NDSS 2023 2023

Automated Triage & Containment Using Reinforcement Learning in SOC Environments

S. Dubois, T. Reyes, CyberVault IR Division

We train a multi-agent RL system to simulate security operations center workflows. The agents learn optimal triage, isolation, and remediation sequences from historical breach data, reducing mean time to containment (MTTC) by 63% in controlled enterprise simulations.

Reinforcement LearningSOC AutomationIncident Response
Eurocrypt 2024 2024

Post-Quantum Key Exchange for Low-Latency IoT Mesh Networks

E. Novak, L. Zhang, CyberVault Crypto Lab

We design a lattice-based key encapsulation mechanism optimized for constrained IoT devices. Our protocol achieves quantum-resistant security with 40% smaller ciphertexts and 2.3x faster handshakes compared to CRYSTALS-Kyber baseline implementations.

Post-QuantumIoT SecurityLattice Crypto
ICLR 2023 2023
\n

Adversarial Robustness in Threat Classification: Mitigating Model Poisoning Attacks

M. Al-Farsi, J. Chen, CyberVault ML Security

We investigate data poisoning vectors targeting ML-based IDS systems and propose a robust training pipeline incorporating differential privacy and anomaly-aware weighting. The method maintains 96% F1-score under heavy attack scenarios while standard models degrade to 68%.

Adversarial MLModel PoisoningIDSPrivacy