Abstract is missing.
- An Easy-to-use Framework to Build and Operate AI-based Intrusion Detection for In-situ MonitoringIkje Choi, Jun Lee, Taewoong Kwon, Kyuil Kim, Yoonsu Choi, Jungsuk Song. 1-8 [doi]
- Which Packet Did They Catch? Associating NIDS Alerts with Their Communication SessionsRyosuke Ishibashi, Hiroki Goto, Chansu Han, Tao Ban, Takeshi Takahashi 0001, Jun'ichi Takeuchi. 9-16 [doi]
- A framework to protect National Cyber Borders in peace and warNabeel Shakeel, Nadeem Kafi Khan. 17-22 [doi]
- Vulnerability Exploiting SMS Push NotificationsRina Shibayama, Hiroaki Kikuchi. 23-30 [doi]
- Identity-Based Signature from Quadratic Residues and Its Extension to ID-Based Multi-SignatureYi-Fan Tseng, Jheng-Jia Huang. 31-36 [doi]
- Improved Proxy Re-encryption Scheme with Equality TestChih-Chen Yang, Raylin Tso, Zi-Yuan Liu, Jen-Chieh Hsu, Yi-Fan Tseng. 37-44 [doi]
- A Privacy Preserving Scheme with Dimensionality Reduction for Distributed Machine LearningZhaoheng Chen, Kazumasa Omote. 45-50 [doi]
- A Privacy-Preserving Enforced Bill Collection System using Smart ContractsTomoki Fujitani, Keita Emura, Kazumasa Omote. 51-60 [doi]
- Multi-Level Privacy Preserving K-AnonymityJui-Hung Weng, Po-Wen Chi. 61-67 [doi]