Abstract is missing.
- Non-interactive (t, n)-Incidence Counting from Differentially Private Indicator VectorsMohammad Alaggan, Mathieu Cunche, Marine Minier. 1-9 [doi]
- An Internal/Insider Threat Score for Data Loss Prevention and DetectionKyrre Wahl Kongsgård, Nils A. Nordbotten, Federico Mancini, Paal E. Engelstad. 11-16 [doi]
- Model-based Cluster Analysis for Identifying Suspicious Activity Sequences in SoftwareHemank Lamba, Thomas J. Glazier, Javier Cámara, Bradley R. Schmerl, David Garlan, Jürgen Pfeffer. 17-22 [doi]
- Identifying Key Cyber-Physical TerrainBrian Thompson, Richard E. Harang. 23-28 [doi]
- Continuous Authentication Using Behavioral BiometricsShambhu J. Upadhyaya. 29 [doi]
- Analysis of Causative Attacks against SVMs Learning from Data StreamsCody Burkard, Brent Lagesse. 31-36 [doi]
- MCDefender: Toward Effective Cyberbullying Defense in Mobile Online Social NetworksNishant Vishwamitra, Xiang Zhang, Jonathan Tong, Hongxin Hu, Feng Luo, Robin Kowalski, Joseph P. Mazer. 37-42 [doi]
- Tracing the Arc of Smartphone Application SecurityPatrick D. McDaniel. 43 [doi]
- Predicting Exploitation of Disclosed Software Vulnerabilities Using Open-source DataBenjamin L. Bullough, Anna K. Yanchenko, Christopher L. Smith, Joseph R. Zipkin. 45-53 [doi]
- What's in a URL: Fast Feature Extraction and Malicious URL DetectionRakesh Verma, Avisha Das. 55-63 [doi]
- EMULATOR vs REAL PHONE: Android Malware Detection Using Machine LearningMohammed K. Alzaylaee, Suleiman Y. Yerima, Sakir Sezer. 65-72 [doi]
- Feature Cultivation in Privileged Information-augmented DetectionZ. Berkay Celik, Patrick D. McDaniel, Rauf Izmailov. 73-80 [doi]