Abstract is missing.
- Optical Cryptography for Cyber Secured and Stealthy Fiber-Optic Communication Transmission - Invited PaperTomer Yeminy, Eyal Wohlgemuth, Dan Sadot, Zeev Zalevsky. 1-5 [doi]
- Efficient Construction of the Kite Generator RevisitedOrr Dunkelman, Ariel Weizmann. 6-19 [doi]
- Using Noisy Binary Search for Differentially Private Anomaly DetectionDaniel M. Bittner, Anand D. Sarwate, Rebecca N. Wright. 20-37 [doi]
- Distributed Web Mining of EthereumTrishita Tiwari, David Starobinski, Ari Trachtenberg. 38-54 [doi]
- An Information-Flow Control Model for Online Social Networks Based on User-Attribute Credibility and Connection-Strength FactorsEhud Gudes, Nadav Voloch. 55-67 [doi]
- Detecting and Coloring Anomalies in Real Cellular Network Using Principle Component AnalysisYoram Segal, Dan Vilenchik, Ofer Hadar. 68-83 [doi]
- Self-stabilizing Byzantine Tolerant Replicated State Machine Based on Failure DetectorsShlomi Dolev, Chryssis Georgiou, Ioannis Marcoullis, Elad Michael Schiller. 84-100 [doi]
- Brief Announcement: Providing End-to-End Secure Communication in Low-Power Wide Area NetworksIoannis Chatzigiannakis, Vasiliki Liagkou, Paul G. Spirakis. 101-104 [doi]
- Privacy via Maintaining Small Similitude Data for Big Data Statistical RepresentationPhilip Derbeko, Shlomi Dolev, Ehud Gudes. 105-119 [doi]
- Highway State Gating for Recurrent Highway Networks: Improving Information Flow Through TimeRon Shoham, Haim H. Permuter. 120-128 [doi]
- Secured Data Gathering Protocol for IoT NetworksAlejandro Cohen, Asaf Cohen 0001, Omer Gurewitz. 129-143 [doi]
- Towards Building Active Defense Systems for Software ApplicationsZara Perumal, Kalyan Veeramachaneni. 144-161 [doi]
- Secure Non-interactive User Re-enrollment in Biometrics-Based Identification and Authentication SystemsIvan De Oliveira Nunes, Karim Eldefrawy, Tancrède Lepoint. 162-180 [doi]
- Brief Announcement: Image Authentication Using Hyperspectral LayersGuy Leshem, Menachem Domb. 181-183 [doi]
- Brief Announcement: Graph-Based and Probabilistic Discrete Models Used in Detection of Malicious AttacksSergey Frenkel, Victor N. Zakharov. 184-187 [doi]
- Intercepting a Stealthy NetworkMai Ben-Adar Bessos, Amir Herzberg. 188-205 [doi]
- Privacy in e-Shopping Transactions: Exploring and Addressing the Trade-OffsJesus Diaz, Seung Geol Choi, David Arroyo, Angelos D. Keromytis, Francisco B. RodrÃguez, Moti Yung. 206-226 [doi]
- Detection in the Dark - Exploiting XSS Vulnerability in C&C Panels to Detect MalwaresShay Nachum, Assaf Schuster, Opher Etzion. 227-242 [doi]
- A Planning Approach to Monitoring Computer Programs' BehaviorAlexandre Cukier, Ronen I. Brafman, Yotam Perkal, David Tolpin. 243-254 [doi]
- One-Round Secure Multiparty Computation of Arithmetic Streams and Functions - (Extended Abstract)Dor Bitan, Shlomi Dolev. 255-273 [doi]
- Brief Announcement: Gradual Learning of Deep Recurrent Neural NetworkZiv Aharoni, Gal Rattner, Haim H. Permuter. 274-277 [doi]
- Brief Announcement: Adversarial Evasion of an Adaptive Version of Western Electric RulesOded Margalit. 278-282 [doi]
- Brief Announcement: Deriving Context for Touch EventsMoran Azran, Niv Ben Shabat, Tal Shkolnik, Yossi Oren. 283-286 [doi]