0 | -- | 0 | Christopher Sweet, Stephen Moskal, Shanchieh Jay Yang. On the Variety and Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks |
0 | -- | 0 | Sicong Shao, Cihan Tunc, Amany Al-Shawi, Salim Hariri. An Ensemble of Ensembles Approach to Author Attribution for Internet Relay Chat Forensics |
0 | -- | 0 | Antonio Mangino, Morteza Safaei Pour, Elias Bou-Harb. Internet-scale Insecurity of Consumer Internet of Things: An Empirical Measurements Perspective |
0 | -- | 0 | Sharad Mehrotra, Shantanu Sharma 0001, Jeffrey D. Ullman, Dhrubajyoti Ghosh, Peeyush Gupta, Anurag Mishra. PANDA: Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data |
0 | -- | 0 | Anand Mudgerikar, Puneet Sharma, Elisa Bertino. Edge-Based Intrusion Detection for IoT devices |
0 | -- | 0 | Henanksha Sainani, Josephine M. Namayanja, Guneeti Sharma, Vasundhara Misal, Vandana P. Janeja. IP Reputation Scoring with Geo-Contextual Feature Augmentation |
0 | -- | 0 | Mahdi R. Alagheband, Atefeh Mashatan, Morteza ZiHayat. Time-based Gap Analysis of Cybersecurity Trends in Academic and Digital Media |
0 | -- | 0 | Martin Husák, Tomás Bajtos, Jaroslav Kaspar, Elias Bou-Harb, Pavel Celeda. Predictive Cyber Situational Awareness and Personalized Blacklisting: A Sequential Rule Mining Approach |
0 | -- | 0 | Jay P. Kesan, Linfeng Zhang. Analysis of Cyber Incident Categories Based on Losses |