153 | -- | 166 | Anthony J. Rose, Scott R. Graham, Christine M. Schubert Kabban, Jacob J. Krasnov, Wayne C. Henry. ScriptBlock Smuggling: Uncovering Stealthy Evasion Techniques in PowerShell and .NET Environments |
167 | -- | 195 | Jan Domnik, Alexander Holland 0003. On Data Leakage Prevention Maturity: Adapting the C2M2 Framework |
196 | -- | 222 | Ratna Halder, Dipanjan Das Roy, Dongwan Shin. A Blockchain-Based Decentralized Public Key Infrastructure Using the Web of Trust |
223 | -- | 240 | Arslan Munir, Alexander J. Aved, Khanh Pham, Joonho Kong. Trustworthiness of Situational Awareness: Significance and Quantification |
241 | -- | 263 | Eric Muhati, Danda B. Rawat. Data-Driven Network Anomaly Detection with Cyber Attack and Defense Visualization |
264 | -- | 277 | Avi Shaked. Facilitating the Integrative Use of Security Knowledge Bases within a Modelling Environment |
278 | -- | 297 | Tunde Oduguwa, Abdullahi Arabo. Passwordless Authentication Using a Combination of Cryptography, Steganography, and Biometrics |
298 | -- | 323 | Pankajeshwara Sharma, Michael Govorov, Michael Martin. A Usable Encryption Solution for File-Based Geospatial Data within a Database File System |
324 | -- | 339 | Stanislav Abaimov. Understanding and Classifying Permanent Denial-of-Service Attacks |
340 | -- | 356 | Pete Burnap, Eirini Anthi, Philipp Reinecke, Lowri Williams, Fengnian Cao, Rakan Aldmour, Kevin Jones. Mapping Automated Cyber Attack Intelligence to Context-Based Impact on System-Level Goals |
357 | -- | 381 | Habib El Amin, Abed Ellatif Samhat, Maroun Chamoun, Lina Oueidat, Antoine Feghali. An Integrated Approach to Cyber Risk Management with Cyber Threat Intelligence Framework to Secure Critical Infrastructure |
382 | -- | 387 | Feng Wang 0017, Yongning Tang. Diverse Intrusion and Malware Detection: AI-Based and Non-AI-Based Solutions |