Abstract is missing.
- Review into State of the Art of Vulnerability Assessment using Artificial IntelligenceSaad Khan, Simon Parkinson. 3-32 [doi]
- A Survey of Machine Learning Algorithms and Their Application in Information SecurityMark Stamp. 33-55 [doi]
- Vulnerability Assessment of Cyber Security for SCADA SystemsKyle Coffey, Leandros A. Maglaras, Richard Smith 0002, Helge Janicke, Mohamed Amine Ferrag, Abdelouahid Derhab, Mithun Mukherjee 0001, Stylianos Rallis, Awais Yousaf. 59-80 [doi]
- A Predictive Model for Risk and Trust Assessment in Cloud Computing: Taxonomy and Analysis for Attack Pattern DetectionAlexandros Chrysikos, Stephen McGuire. 81-99 [doi]
- AI- and Metrics-Based Vulnerability-Centric Cyber Security Assessment and Countermeasure SelectionIgor V. Kotenko, Elena Doynikova, Andrey Chechulin, Andrey Fedorchenko. 101-130 [doi]
- Artificial Intelligence Agents as Mediators of Trustless Security Systems and Distributed Computing ApplicationsSteven Walker-Roberts, Mohammad Hammoudeh. 131-155 [doi]
- Automated Planning of Administrative Tasks Using Historic Events: A File System Case StudySaad Khan, Simon Parkinson. 159-182 [doi]
- Defending Against Chained Cyber-Attacks by Adversarial AgentsVivin Paliath, Paulo Shakarian. 183-209 [doi]
- Vulnerability Detection and Analysis in Adversarial Deep LearningYi Shi 0001, Yalin E. Sagduyu, Kemal Davaslioglu, Renato Levy. 211-234 [doi]
- SOCIO-LENS: Spotting Unsolicited Caller Through Network AnalysisMuhammad Ajmal Azad, Junaid Arshad, Farhan Riaz. 235-258 [doi]
- Function Call Graphs Versus Machine Learning for Malware DetectionDeebiga Rajeswaran, Fabio Di Troia, Thomas H. Austin, Mark Stamp. 259-279 [doi]
- Detecting Encrypted and Polymorphic Malware Using Hidden Markov ModelsDhiviya Dhanasekar, Fabio Di Troia, Katerina Potika, Mark Stamp. 281-299 [doi]
- Masquerade Detection on Mobile DevicesSwathi Nambiar Kadala Manikoth, Fabio Di Troia, Mark Stamp. 301-315 [doi]
- Identifying File Interaction Patterns in Ransomware BehaviourLiam Grant, Simon Parkinson. 317-335 [doi]
- A Framework for the Visualisation of Cyber Security Requirements and Its Application in BPMNBo Zhou, Curtis L. Maines, Stephen Tang, Qi Shi. 339-366 [doi]
- Big Data and Cyber Security: A Visual Analytics PerspectiveSuvodeep Mazumdar, Jing Wang. 367-381 [doi]