Abstract is missing.
- Evaluation of Android Malware Detection Based on System CallsMarko Dimjasevic, Simone Atzeni, Ivo Ugrina, Zvonimir Rakamaric. 1-8 [doi]
- Differential Privacy for Collaborative Filtering Recommender AlgorithmXue Zhu, Yuqing Sun. 9-16 [doi]
- Countering Phishing from Brands' Vantage PointVlad Bulakh, Minaxi Gupta. 17-24 [doi]
- Clone or Relative?: Understanding the Origins of Similar Android AppsYuta Ishii, Takuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori. 25-32 [doi]
- Towards Automatic Identification of JavaScript-oriented Machine-Based TrackingAndrew J. Kaizer, Minaxi Gupta. 33-40 [doi]
- Malware Detection Using Dynamic BirthmarksSwapna Vemparala, Fabio Di Troia, Visaggio Aaron Corrado, Thomas H. Austin, Mark Stamp. 41-46 [doi]
- How Can We Enable Privacy in an Age of Big Data Analytics?Carl E. Landwehr. 47 [doi]
- Data Driven Data Center Network SecurityVimalkumar Jeyakumar, Omid Madani, Ali ParandehGheibi, Navindra Yadav. 48 [doi]
- Security Analytics in the Context of Adversarial Machine LearningJ. Doug Tygar. 49 [doi]
- Acquiring and Analyzing App Metrics for Effective Mobile Malware DetectionGerardo Canfora, Eric Medvet, Francesco Mercaldo, Corrado Aaron Visaggio. 50-57 [doi]
- Static Analysis of Malicious Java AppletsNikitha Ganesh, Fabio Di Troia, Visaggio Aaron Corrado, Thomas H. Austin, Mark Stamp. 58-63 [doi]
- Detecting Advanced Persistent Threats using Fractal Dimension based Machine Learning ClassificationSana Siddiqui, Muhammad Salman Khan, Ken Ferens, Witold Kinsner. 64-69 [doi]