Abstract is missing.
- SherLock vs Moriarty: A Smartphone Dataset for Cybersecurity ResearchYisroel Mirsky, Asaf Shabtai, Lior Rokach, Bracha Shapira, Yuval Elovici. 1-12 [doi]
- DeepDGA: Adversarially-Tuned Domain Generation and DetectionHyrum S. Anderson, Jonathan Woodbridge, Bobby Filar. 13-21 [doi]
- Tracked Without a Trace: Linking Sessions of Users by Unsupervised Learning of Patterns in Their DNS TrafficMatthias Kirchler, Dominik Herrmann, Jens Lindemann, Marius Kloft. 23-34 [doi]
- Identifying Encrypted Malware Traffic with Contextual Flow DataBlake Anderson, David A. McGrew. 35-46 [doi]
- Causality-based Sensemaking of Network Traffic for Android Application SecurityHao Zhang 0023, Danfeng (Daphne) Yao, Naren Ramakrishnan. 47-58 [doi]
- Secure Kernel Machines against Evasion AttacksPaolo Russu, Ambra Demontis, Battista Biggio, Giorgio Fumera, Fabio Roli. 59-69 [doi]
- Prescience: Probabilistic Guidance on the Retraining Conundrum for Malware DetectionAmit Deo, Santanu Kumar Dash, Guillermo Suarez-Tangil, Volodya Vovk, Lorenzo Cavallaro. 71-82 [doi]
- Discriminative Models for Multi-instance Problems with Tree StructureTomás Pevný, Petr Somol. 83-91 [doi]
- True Friends Let You Down: Benchmarking Social Graph Anonymization SchemesKumar Sharad. 93-104 [doi]
- Change of Guard: The Next Generation of Social Graph De-anonymization AttacksKumar Sharad. 105-116 [doi]
- Differentially Private Online Active Learning with Applications to Anomaly DetectionMohsen Ghassemi, Anand D. Sarwate, Rebecca N. Wright. 117-128 [doi]
- A Dual Perturbation Approach for Differential Private ADMM-Based Distributed Empirical Risk MinimizationTao Zhang, Quanyan Zhu. 129-137 [doi]