Abstract is missing.
- Regex-Based Linkography Abstraction Refinement for Information SecurityAbhiram Kothapalli, Robert Mitchell. 1-7 [doi]
- On De-anonymization of Single Tweet MessagesHoi Le, Reihaneh Safavi-Naini. 8-14 [doi]
- PrivacyGuide: Towards an Implementation of the EU GDPR on Internet Privacy Policy EvaluationWelderufael B. Tesfay, Peter Hofmann, Toru Nakamura, Shinsaku Kiyomoto, Jetzabel Serna. 15-21 [doi]
- Big IoT Data Stream Analytics with Issues in Privacy and SecurityLatifur Khan. 22 [doi]
- Unsure How to Authenticate on Your VR Headset?: Come on, Use Your Head!Tahrima Mustafa, Richard Matovu, Abdul Serwadda, Nicholas Muirhead. 23-30 [doi]
- Machine Learning Methods for Software Vulnerability DetectionBoris Chernis, Rakesh Verma. 31-39 [doi]
- Security Analytics: Adapting Data Science for Security ChallengesRakesh Verma. 40-41 [doi]
- Differential Privacy in the Local SettingNinghui Li. 42 [doi]
- Differentially Private Feature Selection for Data MiningBalamurugan Anandan, Chris Clifton. 43-53 [doi]
- Adversarially Robust Malware Detection Using Monotonic ClassificationInigo Incer, Michael Theodorides, Sadia Afroz, David A. Wagner 0001. 54-63 [doi]