| 0 | -- | 0 | Ahmed AlEroud, Fan Yang, Sai C. Pallaprolu, Zhiyuan Chen 0003, George Karabatis. Anonymization of Network Traces Data through Condensation-based Differential Privacy |
| 0 | -- | 0 | Patrick McCorry, Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, Feng Hao 0001. On Secure E-Voting over Blockchain |
| 0 | -- | 0 | Sinan G. Aksoy, Emilie Purvine, Stephen J. Young. Directional Laplacian Centrality for Cyber Situational Awareness |
| 0 | -- | 0 | Sagar Samtani, Weifeng Li 0002, Victor A. Benjamin, Hsinchun Chen. Informing Cyber Threat Intelligence through Dark Web Situational Awareness: The AZSecure Hacker Assets Portal |
| 0 | -- | 0 | Josiah Dykstra, Neil C. Rowe, Timothy J. Shimeall, Angela Horneman, Marisa Midler. Introduction: On the Nature of Situational Awareness |
| 0 | -- | 0 | John H. Ring, Colin Michael Van Oort, Samson Durst, Vanessa White, Joseph P. Near, Christian Skalka. Methods for Host-based Intrusion Detection with Deep Learning |
| 0 | -- | 0 | Jassim Happa, Thomas Bashford-Rogers, Alastair Janse van Rensburg, Michael Goldsmith, Sadie Creese. Deception in Network Defences Using Unpredictability |
| 0 | -- | 0 | Leigh Metcalf. Editorial on the Special Issue on Election Security |
| 0 | -- | 0 | Amanda K. Glazer, Jacob V. Spertus, Philip B. Stark. More Style, Less Work: Card-style Data Decrease Risk-limiting Audit Sample Sizes |