| 3 | -- | 4 | Nathalie Japkowicz, Yuval Elovici. Introduction to the Special Issue on Data Mining for Cybersecurity |
| 5 | -- | 18 | Jordan Noble, Niall M. Adams. Real-Time Dynamic Network Anomaly Detection |
| 19 | -- | 28 | Paulo Henrique Pisani, Ana Carolina Lorena, André C. P. L. F. Carvalho. Adaptive Biometric Systems using Ensembles |
| 29 | -- | 39 | Aunshul Rege, Zoran Obradovic, Nima Asadi, Edward Parker, Rohan Pandit, Nicholas Masceri, Brian Singer. Predicting Adversarial Cyber-Intrusion Stages Using Autoregressive Neural Networks |
| 40 | -- | 53 | Edita Grolman, Andrey Finkelshtein, Rami Puzis, Asaf Shabtai, Gershon Celniker, Ziv Katzir, Liron Rosenfeld. Transfer Learning for User Action Identication in Mobile Apps via Encrypted Trafc Analysis |
| 54 | -- | 62 | Adrian Taylor, Sylvain Leblanc, Nathalie Japkowicz. Probing the Limits of Anomaly Detectors for Automobiles with a Cyberattack Framework |
| 63 | -- | 73 | Sagar Samtani, Shuo Yu, Hongyi Zhu, Mark W. Patton, John Matherly, Hsinchun Chen. Identifying SCADA Systems and Their Vulnerabilities on the Internet of Things: A Text-Mining Approach |
| 74 | -- | 82 | James Paulin, Anisoara Calinescu, Michael Wooldridge. Agent-Based Modeling for Complex Financial Systems |
| 83 | -- | 88 | Gary Klein. Explaining Explanation, Part 3: The Causal Landscape |