Abstract is missing.
- Affinity Propagation Initialisation Based Proximity Clustering For Labeling in Natural Language Based Big Data SystemsAdithya Bandi, Karuna P. Joshi, Varish Mulwad. 1-7 [doi]
- Multi-Generational Database Inference ControllersBhavani Thuraisingham. 8-12 [doi]
- Research on Maintenance Strategy of Distribution Network based on Monte Carlo TreeYundan Liang, Zhengdong Ren, Jiawei Liao, Peipei Jin, Yu Huang 0004, Guangxian Lv, Yiming Lu. 13-18 [doi]
- ABInfer: A Novel Field Boundaries inference Approach for Protocol Reverse EngineeringDongxiao Jiang, Chenggang Li, Lixin Ma, Xiaoyu Ji, Yanjiao Chen, Bo Li. 19-23 [doi]
- Access Control Vulnerabilities Detection for Web Application ComponentsQian Wang, Jinan Sun, Chen Wang 0005, Shikun Zhang, Sisi Xuanyuan, Bin Zheng. 24-28 [doi]
- A Smart-Farming Ontology for Attribute Based Access ControlSai Sree Laya Chukkapalli, Aritran Piplai, Sudip Mittal, Maanak Gupta, Anupam Joshi. 29-34 [doi]
- Context Sensitive Access Control in Smart Home EnvironmentsSofia Dutta, Sai Sree Laya Chukkapalli, Madhura Sulgekar, Swathi Krithivasan, Prajit Kumar Das, Anupam Joshi. 35-41 [doi]
- An Improved Fuzziness based Random Vector Functional Link Network for Liver Disease DetectionWeipeng Cao, Pengfei Yang, Zhong Ming 0001, Shubin Cai, Jiyong Zhang. 42-48 [doi]
- NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusionAritran Piplai, Sai Sree Laya Chukkapalli, Anupam Joshi. 49-54 [doi]
- A Hybrid Deep Learning Model for Malicious Behavior DetectionAidong Xu, Lin Chen, Xiaoyun Kuang, Huahui Lv, Hang Yang, Yixin Jiang, Bo Li. 55-59 [doi]
- Detecting Advanced Attacks Based On Linux LogsLin Chen, Aidong Xu, Xiaoyun Kuang, Huahui Lv, Hang Yang, Yiwei Yang, Bo Li. 60-64 [doi]
- Malware Detection Techniques Based on Deep LearningPrasanthi Sreekumari. 65-70 [doi]
- Application of Blockchain in Asset-Backed SecuritizationWenxuan Pan, Meikang Qiu. 71-76 [doi]
- Blockchain-based Data Traceability Platform Architecture for Supply Chain ManagementYihang Wei. 77-85 [doi]
- Automating GDPR Compliance using Policy Integrated BlockchainAbhishek Mahindrakar, Karuna Pande Joshi. 86-93 [doi]
- Review on Image Processing Based Adversarial Example Defenses in Computer VisionMeikang Qiu, Han Qiu 0001. 94-99 [doi]
- Adaptive Margin Based Deep Adversarial Metric LearningZhuoyi Wang, Yigong Wang, Bo Dong, Pracheta Sahoo, Kevin W. Hamlen, Latifur Khan. 100-108 [doi]
- Solving the Dependency Conflict of Java Components: A Comparative Empirical AnalysisYongzhi Wang, Chengli Xing, Jinan Sun, Shikun Zhang, Sisi Xuanyuan, Long Zhang. 109-114 [doi]
- Temporal Understanding of Cybersecurity ThreatsJennifer Sleeman, Tim Finin, Milton Halem. 115-121 [doi]
- Intelligent generation algorithm of ceramic decorative patternXinxin Liu, Hua Huang, Hao Wu. 122-126 [doi]
- Imbalanced Learning in Massive Phishing DatasetsAli Azari, Josephine M. Namayanja, Navneet Kaur, Vasundhara Misal, Suraksha Shukla. 127-132 [doi]
- Research on Automatic Generation and Analysis Technology of Network Attack GraphWenhui Hu, Long Zhang, Xueyang Liu, Yu Huang 0004, Minghui Zhang, Liang Xing. 133-139 [doi]
- Finding Gold in the Sand: Identifying Anomaly Indicators Though Huge Amount Security LogsAidong Xu, Lin Chen, Yixin Jiang, Huahui Lv, Hang Yang, Bo Li. 140-144 [doi]
- Detecting SQL Injection Attacks in Cloud SaaS using Machine LearningDharitri Tripathy, Rudrarajsinh Gohil, Talal Halabi. 145-150 [doi]
- Predicting Future Malware Attacks on Cloud Systems using Machine LearningVrushang Patel, Seungho Choe, Talal Halabi. 151-156 [doi]
- SDN-based Stateful Firewall for CloudJian Li, Hao Jiang 0010, Wei Jiang, Jing Wu 0016, Wen Du. 157-161 [doi]
- Cost Optimised Heuristic Algorithm (COHA) for Scientific Workflow Scheduling in IaaS Cloud EnvironmentJ. Kok Konjaang, Lina Xu. 162-168 [doi]
- Gaussian Privacy Protector for Online Data Communication in a Public WorldZahir Alsulaimawi. 169-173 [doi]
- A Navigation Satellite Selection Method Based on optimized DPSO AlgorithmYunqing Hong, Si Xu. 174-179 [doi]
- A Parallel Integer Relative Robust Mean-RCVaR Model for Portfolio optimizationXueying Yang, Zhonghua Lu, Meikang Qiu, Yonghong Hu. 180-185 [doi]
- Multi-label Classification for Clinical Text with Feature-level AttentionDisheng Pan, Xizi Zheng, Weijie Liu 0002, Mengya Li, Meng Ma, Ying Zhou, Li Yang, Ping Wang 0003. 186-191 [doi]
- A Reflective Neural Network Based Learning Framework for Intelligent Physical SystemsSathish A. P. Kumar, Michael A. Brown. 192-197 [doi]
- Access Control Model for Google Cloud IoTDeepti Gupta, Smriti Bhatt, Maanak Gupta, Olumide Kayode, Ali Saman Tosun. 198-208 [doi]
- Experimental Study of ModSecurity Web Application FirewallsTimilehin David Sobola, Pavol Zavarsky, Sergey Butakov. 209-213 [doi]
- PassGAN Based Honeywords System for Machine-Generated Passwords DatabaseMuhammad Ali Fauzi, Bian Yang, Edlira Martiri. 214-220 [doi]
- IFLBC: On the Edge Intelligence Using Federated Learning Blockchain NetworkRonald Doku, Danda B. Rawat. 221-226 [doi]
- Machine Learning based Intrusion Detection System for Web-Based AttacksSushant Sharma, Pavol Zavarsky, Sergey Butakov. 227-230 [doi]
- Detection Efficiency of Static Analyzers against Obfuscated Android MalwareVictor Ajiri, Sergey Butakov, Pavol Zavarsky. 231-234 [doi]
- SLA as a mechanism to manage risks related to chatbot servicesKrishna Gondaliya, Sergey Butakov, Pavol Zavarsky. 235-240 [doi]
- Deep Packet Inspection in Industrial Automation Control System to Mitigate Attacks Exploiting Modbus/TCP VulnerabilitiesOsborn N. Nyasore, Pavol Zavarsky, Bobby Swar, Raphael Naiyeju, Shubham Dabra. 241-245 [doi]
- Automatic Event Coding Framework for Spanish Political News ArticlesSayeed Salam, Lamisah Khan, Amir El-Ghamry, Patrick T. Brandt, Jennifer Holmes, Vito D'Orazio, Javier Osorio. 246-253 [doi]
- An Efficient Private Set Intersection Protocol for the Cloud Computing EnvironmentsOu Ruan, Xiongbo Huang, Hao Mao. 254-259 [doi]
- Storage and Querying of Large Provenance Graphs Using NoSQL DSEAndrii Kashliev. 260-262 [doi]
- A Survey of Intelligent Transportation Systems Security: Challenges and SolutionsJulie L. Harvey, Sathish A. P. Kumar. 263-268 [doi]