Abstract is missing.
- Judging a site by its content: learning the textual, structural, and visual features of malicious web pagesSushma Nagesh Bannur, Lawrence K. Saul, Stefan Savage. 1-10 [doi]
- Topic modeling of freelance job postings to monitor web service abuseDo-kyum Kim, Marti Motoyama, Geoffrey M. Voelker, Lawrence K. Saul. 11-20 [doi]
- A comparative assessment of malware classification using binary texture analysis and dynamic analysisLakshmanan Nataraj, Vinod Yegneswaran, Phillip A. Porras, Jian Zhang 0004. 21-30 [doi]
- ZDVUE: prioritization of javascript attacks to discover new vulnerabilitiesSandeep Karanth, Srivatsan Laxman, Prasad Naldurg, Ramarathnam Venkatesan, John Lambert, Jinwook Shin. 31-42 [doi]
- Adversarial machine learningLing Huang, Anthony D. Joseph, Blaine Nelson, Benjamin I. P. Rubinstein, J. D. Tygar. 43-58 [doi]
- Prioritizing intrusion analysis using Dempster-Shafer theoryLoai Zomlot, Sathya Chandran Sundaramurthy, Kui Luo, Xinming Ou, Siva Raj Rajagopalan. 59-70 [doi]
- An algorithm to find optimal attack paths in nondeterministic scenariosCarlos Sarraute, Gerardo Richarte, Jorge Lucángeli Obes. 71-80 [doi]
- Evolutionary construction of de bruijn sequencesMeltem Sönmez Turan. 81-86 [doi]
- Understanding the risk factors of learning in adversarial environmentsBlaine Nelson, Battista Biggio, Pavel Laskov. 87-92 [doi]
- Artificial intelligence and the future of cybersecurityBenoit Morel. 93-98 [doi]
- Machine learning in computer forensics (and the lessons learned from machine learning in computer security)Davide Ariu, Giorgio Giacinto, Fabio Roli. 99-104 [doi]
- Exploitation as an inference problemDavid A. Cock. 105-106 [doi]
- Categorizing CAPTCHASajad Shirali-Shahreza, Mohammad Hassan Shirali-Shahreza. 107-108 [doi]
- Accessibility of CAPTCHA methodsSajad Shirali-Shahreza, Mohammad Hassan Shirali-Shahreza. 109-110 [doi]
- A robust one-class bayesian approach for masquerade detectionQifan Wang, Luo Si. 111-112 [doi]
- On deployable adversarial classification modelsAnshuman Singh, Sumi Singh, Andrew Walenstein, Arun Lakhotia. 113-114 [doi]