Abstract is missing.
- Tracking Network Events with Write Optimized Data StructuresNolan P. Donoghue, Bridger Hahn, Helen Xu, Thomas M. Kroeger, David Zage, Rob Johnson. 1-7 [doi]
- MAD: A Middleware Framework for Multi-step Attack DetectionPanagiotis Papadopoulos, Thanasis Petsas, Giorgos Christou, Giorgos Vasiliadis. 8-15 [doi]
- INTERCEPT+: SDN Support for Live Migration-Based HoneypotsAyumu Hirata, Daisuke Miyamoto, Masaya Nakayama, Hiroshi Esaki. 16-24 [doi]
- The Significant Features of the UNSW-NB15 and the KDD99 Data Sets for Network Intrusion Detection SystemsNour Moustafa, Jill Slay. 25-31 [doi]
- Using Bayesian Decision Making to Detect Slow ScansIchiro Shimada, Yu Tsuda, Masashi Eto, Daisuke Inoue. 32-41 [doi]
- DGA Bot Detection with Time Series Decision TreesAnael Bonneton, Daniel Migault, Stéphane Sénécal, Nizar Kheir. 42-53 [doi]
- Social Forensics: Searching for Needles in Digital HaystacksIasonas Polakis, Panagiotis Ilia, Zacharias Tzermias, Sotiris Ioannidis, Paraskevi Fragopoulou. 54-66 [doi]
- Text-Mining Approach for Estimating Vulnerability ScoreYasuhiro Yamamoto, Daisuke Miyamoto, Masaya Nakayama. 67-73 [doi]
- AJNA: Anti-phishing JS-based Visual Analysis, to Mitigate Users' Excessive Trust in SSL/TLSPernelle Mensah, Gregory Blanc, Kazuya Okada, Daisuke Miyamoto, Youki Kadobayashi. 74-84 [doi]