<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://www.acejournal.org/2020/01/15/introducing-ACE-journal.html</loc>
<lastmod>2020-01-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2020/01/20/call-for-contributors.html</loc>
<lastmod>2020-01-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2020/02/01/update-submissions-and-peer-review.html</loc>
<lastmod>2020-02-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2020/03/01/pt1-blockchain-fundamentals.html</loc>
<lastmod>2020-03-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2020/03/14/zero-trust-security.html</loc>
<lastmod>2020-03-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2020/03/17/scaling-digital-learning-infrastructure.html</loc>
<lastmod>2020-03-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2020/04/01/pt2-blockchain-advanced.html</loc>
<lastmod>2020-04-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2020/04/14/zero-trust-in-practice.html</loc>
<lastmod>2020-04-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2020/05/01/pt3-blockchain-applications.html</loc>
<lastmod>2020-05-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2020/05/11/learning-analytics-without-surveillance.html</loc>
<lastmod>2020-05-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2020/05/12/remote-work-security-checklist.html</loc>
<lastmod>2020-05-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2020/06/18/supply-chain-attacks.html</loc>
<lastmod>2020-06-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2020/06/22/why-web3-matters.html</loc>
<lastmod>2020-06-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2020/07/15/threat-modeling-fast-and-light.html</loc>
<lastmod>2020-07-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2020/08/03/token-governance-in-practice.html</loc>
<lastmod>2020-08-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2020/08/13/infrastructure-as-code-risks.html</loc>
<lastmod>2020-08-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2020/08/24/adaptive-learning-paths.html</loc>
<lastmod>2020-08-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2020/09/14/attacker-mindset.html</loc>
<lastmod>2020-09-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2020/09/18/smart-contract-security-checklist.html</loc>
<lastmod>2020-09-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2020/10/26/understanding-rollups.html</loc>
<lastmod>2020-10-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2020/11/02/building-inclusive-edtech.html</loc>
<lastmod>2020-11-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2020/12/07/decentralized-identity-explained.html</loc>
<lastmod>2020-12-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2021/02/11/cache-hierarchy-tradeoffs.html</loc>
<lastmod>2021-02-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2021/03/15/automating-ci-cd-pipelines.html</loc>
<lastmod>2021-03-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2021/03/17/zk-proof-optimizations.html</loc>
<lastmod>2021-03-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2021/07/08/effective-security-monitoring.html</loc>
<lastmod>2021-07-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2021/09/23/wrapping-asic-design-flow.html</loc>
<lastmod>2021-09-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2021/11/05/layer2-rollup-comparisons.html</loc>
<lastmod>2021-11-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2022/04/05/heterogeneous-multi-core-systems.html</loc>
<lastmod>2022-04-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2022/07/22/post-quantum-crypto-blockchain.html</loc>
<lastmod>2022-07-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2022/11/02/kubernetes-operator-development.html</loc>
<lastmod>2022-11-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2022/11/17/power-efficient-controller-architect.html</loc>
<lastmod>2022-11-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2022/12/05/strategic-risk-mitigation-frameworks.html</loc>
<lastmod>2022-12-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2023/02/14/cross-chain-interoperability.html</loc>
<lastmod>2023-02-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2023/03/30/ai-accelerator-microarchitecture.html</loc>
<lastmod>2023-03-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2023/10/08/thermal-aware-chip-layout.html</loc>
<lastmod>2023-10-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2023/10/30/defi-security-audits.html</loc>
<lastmod>2023-10-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2024/01/22/security-focused-processor-isolation.html</loc>
<lastmod>2024-01-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2024/06/14/fpga-based-prototyping-best-practices.html</loc>
<lastmod>2024-06-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2024/06/20/container-security-in-devops.html</loc>
<lastmod>2024-06-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2024/08/19/nft-standards-evolution.html</loc>
<lastmod>2024-08-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2024/10/14/zero-trust-architecture-evolution.html</loc>
<lastmod>2024-10-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2024/12/03/quantum-inspired-accelerators.html</loc>
<lastmod>2024-12-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2025/03/11/decentralized-identity-solutions.html</loc>
<lastmod>2025-03-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2025/04/11/zero-trust-network-implementation.html</loc>
<lastmod>2025-04-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2025/05/02/neuromorphic-chip-design-considerations.html</loc>
<lastmod>2025-05-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2025/05/19/behavioral-analytics-insider-threat-det.html</loc>
<lastmod>2025-05-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2025/05/31/ACEJ-sponsored-hackathon.html</loc>
<lastmod>2025-05-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2025/05/31/advancements-in-quantum-computing-architecture.html</loc>
<lastmod>2025-05-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2025/06/03/designing-adaptive-multimodal-interfaces.html</loc>
<lastmod>2025-06-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2025/06/03/ethical-challenges-in-ai-decision-making.html</loc>
<lastmod>2025-06-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2025/06/04/securing-software-supply-chains-in-devops.html</loc>
<lastmod>2025-06-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2025/06/05/advancements-in-automated-testing-for-continuous-integration.html</loc>
<lastmod>2025-06-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/2025/06/05/intent-based-network-automation.html</loc>
<lastmod>2025-06-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/software%20engineering/devops/2025/06/07/infrastructure-as-code-hybrid-cloud-environments.html</loc>
<lastmod>2025-06-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/cybersecurity/identity%20management/2025/06/08/zero-trust-identity-brokers.html</loc>
<lastmod>2025-06-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/machine%20learning/data%20science/2025/06/09/graph-neural-networks-for-social-data.html</loc>
<lastmod>2025-06-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/autonomous%20systems/robotics/2025/06/10/adaptive-collision-avoidance-for-autonomous-vehicles.html</loc>
<lastmod>2025-06-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/cloud%20computing/security/2025/06/11/secure-multi-tenant-architectures-in-serverless.html</loc>
<lastmod>2025-06-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/software%20engineering/devops/2025/06/14/observability-driven-development.html</loc>
<lastmod>2025-06-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/robotics/embedded%20systems/2025/06/15/edge-based-slam-for-low-power-robots.html</loc>
<lastmod>2025-06-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/cybersecurity/threat%20intelligence/2025/06/16/advanced-persistent-threat-simulation.html</loc>
<lastmod>2025-06-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/machine%20learning/natural%20language%20processing/2025/06/18/efficient-transformers-for-on-device-nlp.html</loc>
<lastmod>2025-06-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/devsecops/cloud%20security/2025/06/19/implementing-devsecops-for-cloud-native-apps.html</loc>
<lastmod>2025-06-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/software%20engineering/devops/2025/06/20/scaling-feature-flags-in-microservices.html</loc>
<lastmod>2025-06-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/robotics/distributed%20systems/2025/06/21/swarm-coordination-via-distributed-consensus.html</loc>
<lastmod>2025-06-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/cybersecurity/risk%20management/2025/06/24/cyber-risk-quantification-with-fair.html</loc>
<lastmod>2025-06-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/machine%20learning/speech%20processing/2025/06/25/self-supervised-pretraining-for-speech-recognition.html</loc>
<lastmod>2025-06-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/cloud%20security/compliance/2025/06/26/continuous-compliance-in-multi-cloud.html</loc>
<lastmod>2025-06-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.acejournal.org/about</loc>
</url>
<url>
<loc>https://www.acejournal.org/contact</loc>
</url>
<url>
<loc>https://www.acejournal.org/</loc>
</url>
<url>
<loc>https://www.acejournal.org/search</loc>
</url>
<url>
<loc>https://www.acejournal.org/page/2/</loc>
</url>
<url>
<loc>https://www.acejournal.org/page/3/</loc>
</url>
<url>
<loc>https://www.acejournal.org/page/4/</loc>
</url>
<url>
<loc>https://www.acejournal.org/page/5/</loc>
</url>
<url>
<loc>https://www.acejournal.org/page/6/</loc>
</url>
<url>
<loc>https://www.acejournal.org/page/7/</loc>
</url>
<url>
<loc>https://www.acejournal.org/page/8/</loc>
</url>
<url>
<loc>https://www.acejournal.org/page/9/</loc>
</url>
<url>
<loc>https://www.acejournal.org/page/10/</loc>
</url>
<url>
<loc>https://www.acejournal.org/page/11/</loc>
</url>
<url>
<loc>https://www.acejournal.org/page/12/</loc>
</url>
<url>
<loc>https://www.acejournal.org/page/13/</loc>
</url>
<url>
<loc>https://www.acejournal.org/page/14/</loc>
</url>
<url>
<loc>https://www.acejournal.org/page/15/</loc>
</url>
<url>
<loc>https://www.acejournal.org/page/16/</loc>
</url>
<url>
<loc>https://www.acejournal.org/page/17/</loc>
</url>
<url>
<loc>https://www.acejournal.org/page/18/</loc>
</url>
</urlset>
