Journal: DTRAP

Volume 2, Issue 4

0 -- 0Ahmed AlEroud, Fan Yang, Sai C. Pallaprolu, Zhiyuan Chen 0003, George Karabatis. Anonymization of Network Traces Data through Condensation-based Differential Privacy
0 -- 0Patrick McCorry, Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, Feng Hao 0001. On Secure E-Voting over Blockchain
0 -- 0Sinan G. Aksoy, Emilie Purvine, Stephen J. Young. Directional Laplacian Centrality for Cyber Situational Awareness
0 -- 0Sagar Samtani, Weifeng Li 0002, Victor A. Benjamin, Hsinchun Chen. Informing Cyber Threat Intelligence through Dark Web Situational Awareness: The AZSecure Hacker Assets Portal
0 -- 0Josiah Dykstra, Neil C. Rowe, Timothy J. Shimeall, Angela Horneman, Marisa Midler. Introduction: On the Nature of Situational Awareness
0 -- 0John H. Ring, Colin Michael Van Oort, Samson Durst, Vanessa White, Joseph P. Near, Christian Skalka. Methods for Host-based Intrusion Detection with Deep Learning
0 -- 0Jassim Happa, Thomas Bashford-Rogers, Alastair Janse van Rensburg, Michael Goldsmith, Sadie Creese. Deception in Network Defences Using Unpredictability
0 -- 0Leigh Metcalf. Editorial on the Special Issue on Election Security
0 -- 0Amanda K. Glazer, Jacob V. Spertus, Philip B. Stark. More Style, Less Work: Card-style Data Decrease Risk-limiting Audit Sample Sizes

Volume 2, Issue 3

0 -- 0Josephine Lamp, Carlos E. Rubio-Medrano, Ziming Zhao 0001, Gail-Joon Ahn. ExSol: Collaboratively Assessing Cybersecurity Risks for Protecting Energy Delivery Systems
0 -- 0Jay Jacobs, Sasha Romanosky, Benjamin Edwards, Idris Adjerid, Michael Roytman. Exploit Prediction Scoring System (EPSS)
0 -- 0Leigh Metcalf, Jonathan M. Spring. The Ecosystem of Detection and Blocklisting of Domain Generation
0 -- 0Christos Iliou, Theodoros Kostoulas, Theodora Tsikrika, Vasilis Katos, Stefanos Vrochidis, Ioannis Kompatsiaris. Detection of Advanced Web Bots by Combining Web Logs with Mouse Behavioural Biometrics
0 -- 0Jassim Happa, Ioannis Agrafiotis, Martin Helmhout, Thomas Bashford-Rogers, Michael Goldsmith, Sadie Creese. Assessing a Decision Support Tool for SOC Analysts
0 -- 0Rajesh Kumar, Can Isik, Vir V. Phoha. Treadmill Assisted Gait Spoofing (TAGS): An Emerging Threat to Wearable Sensor-based Gait Authentication
0 -- 0Jeroen van der Ham. Toward a Better Understanding of "Cybersecurity"

Volume 2, Issue 2

0 -- 0Shubhra Tewari, Renos Zabounidis, Ammina Kothari, Reynold Bailey, Cecilia Ovesdotter Alm. Perceptions of Human and Machine-Generated Articles
0 -- 0Reza Zafarani, Huan Liu 0001, Vir V. Phoha, Javad Azimi. Inroduction on Recent Trends and Perspectives in Fake News Research
0 -- 0Rohit Valecha, Srikrishna Krishnarao Srinivasan, Tejaswi Volety, K. Hazel Kwon, Manish Agrawal, H. Raghav Rao. Fake News Sharing: An Investigation of Threat and Coping Cues in the Context of the Zika Virus
0 -- 0Lev Konstantinovskiy, Oliver Price, Mevan Babakar, Arkaitz Zubiaga. Toward Automated Factchecking: Developing an Annotation Schema and Benchmark for Consistent Automated Claim Detection
0 -- 0Teng-chieh Huang, Razieh Nokhbeh Zaeem, K. Suzanne Barber. Identifying Real-world Credible Experts in the Financial Domain
0 -- 0Pratim Datta 0001, Mark Whitmore, Joseph K. Nwankpa. A Perfect Storm: Social Media News, Psychological Biases, and AI
0 -- 0Jonathan M. Spring, Phyllis Illari. Review of Human Decision-making during Computer Security Incident Analysis
0 -- 0Nils Amiet. Blockchain Vulnerabilities in Practice
0 -- 0Li Wang, S. Sitharama Iyengar, Amith K. Belman, Pawel Sniatala, Vir V. Phoha, Changsheng Wan. Game Theory based Cyber-Insurance to Cover Potential Loss from Mobile Malware Exploitation
0 -- 0Daniel W. Woods, Tyler Moore 0001, Andrew C. Simpson. The County Fair Cyber Loss Distribution: Drawing Inferences from Insurance Prices

Volume 2, Issue 1

0 -- 0Lieven Desmet, Jan Spooren, Thomas Vissers, Peter Janssen, Wouter Joosen. Premadoma: An Operational Solution to Prevent Malicious Domain Name Registrations in the .eu TLD
0 -- 0Ziya Alper Genç, Gabriele Lenzini, Daniele Sgandurra. Cut-and-Mouse and Ghost Control: Exploiting Antivirus Software with Synthesized Inputs
0 -- 0Amit Kumar Sikder, Leonardo Babun, A. Selcuk Uluagac. Aegis+: A Context-aware Platform-independent Security Framework for Smart Home Systems
0 -- 0Yoshimichi Nakatsuka, Andrew Paverd, Gene Tsudik. PDoT: Private DNS-over-TLS with TEE Support
0 -- 0Pritam Dash, Mehdi Karimibiuki, Karthik Pattabiraman. Stealthy Attacks against Robotic Vehicles Protected by Control-based Intrusion Detection Techniques
0 -- 0Toshinori Usui, Yuto Otsuki, Tomonori Ikuse, Yuhei Kawakoya, Makoto Iwamura, Jun Miyoshi, Kanta Matsuura. Automatic Reverse Engineering of Script Engine Binaries for Building Script API Tracers
0 -- 0Roberto Perdisci, Martina Lindorfer, Adam Doupé, Andrea Lanzi, Alexandros Kapravelos, Gianluca Stringhini. Introduction to the ACSAC'19 Special Issue - Vol. 2