| 0 | -- | 0 | Huili Chen, Cheng Fu, Jishen Zhao, Farinaz Koushanfar. GALU: A Genetic Algorithm Framework for Logic Unlocking |
| 0 | -- | 0 | Karim Lounis, Mohammad Zulkernine. Lessons Learned: Analysis of PUF-based Authentication Protocols for IoT |
| 0 | -- | 0 | Lionel Morel, Damien Couroussé, Thomas Hiscock. Code Polymorphism Meets Code Encryption: Confidentiality and Side-channel Protection of Software Components |
| 0 | -- | 0 | Robert A. Bridges, Sean Oesch, Michael D. Iannacone, Kelly M. T. Huffer, Brian Jewell, Jeffrey A. Nichols, Brian Weber, Miki E. Verma, Daniel Scofield, Craig Miles, Thomas Plummer, Mark Daniell, Anne M. Tall, Justin M. Beaver, Jared M. Smith. Beyond the Hype: An Evaluation of Commercially Available Machine Learning-based Malware Detectors |
| 0 | -- | 0 | Pierre Graux, Jean-François Lalande, Valérie Viet Triem Tong, Pierre Wilke. OATs'inside: Retrieving Object Behaviors From Native-based Obfuscated Android Applications |
| 0 | -- | 0 | Abdurhman Albasir, Kshirasagar Naik, Ricardo Manzano. Toward Improving the Security of IoT and CPS Devices: An AI Approach |
| 0 | -- | 0 | Fran Casino, Nikolaos Totosis, Theodoros Apostolopoulos, Nikolaos Lykousas, Constantinos Patsakis. Analysis and Correlation of Visual Evidence in Campaigns of Malicious Office Documents |
| 0 | -- | 0 | Jonathan Oakley 0001, Carl R. Worley, Lu Yu 0001, Richard R. Brooks, Ilker Özçelik, Anthony Skjellum, Jihad S. Obeid. Scrybe: A Secure Audit Trail for Clinical Trial Data Fusion |
| 0 | -- | 0 | Girish Vaidya, T. V. Prabhakar 0001, Nithish K. Gnani, Ryan Shah, Shishir Nagaraja. Sensor Identification via Acoustic Physically Unclonable Function |
| 0 | -- | 0 | Aydin Aysu, Scott R. Graham. Introduction to the Special Issue on the Digital Threats of Hardware Security |
| 0 | -- | 0 | Thomas Walshe, Andrew Simpson 0001. Towards a Greater Understanding of Coordinated Vulnerability Disclosure Policy Documents |
| 0 | -- | 0 | Poushali Sengupta, Sudipta Paul 0004, Subhankar Mishra. BUDS+: Better Privacy with Converger and Noisy Shuffling |
| 0 | -- | 0 | S. S. Iyengar 0001, Bhavani Thuraisingham, Marek Zmuda. Special Issue on Actionable Information for Digital Threat Discovery Using Contextualized Data or Multi Sensor Data Fusion |
| 0 | -- | 0 | Rajat Subhra Bhowmick, Rahul Indra, Isha Ganguli, Jayanta Paul, Jaya Sil. Breaking Captcha System with Minimal Exertion through Deep Learning: Real-time Risk Assessment on Indian Government Websites |
| 0 | -- | 0 | Tor J. Langehaug, Brett J. Borghetti, Scott R. Graham. Classifying Co-resident Computer Programs Using Information Revealed by Resource Contention |