Abstract is missing.
- Jamming Strategies in Covert CommunicationOri Shmuel, Asaf Cohen 0001, Omer Gurewitz. 1-15 [doi]
- Linear Cryptanalysis Reduced Round of Piccolo-80Tomer Ashur, Orr Dunkelman, Nael Masalha. 16-32 [doi]
- Continuous Key Agreement with Reduced BandwidthNir Drucker, Shay Gueron. 33-46 [doi]
- Covert Channel Cyber-Attack over Video Stream DCT Payload - (Copyright Protection Algorithm for Video and Audio Streams)Yoram Segal, Ofer Hadar. 47-66 [doi]
- Effects of Weather on Drone to IoT QKDShlomi Arnon, Judy Kupferman. 67-74 [doi]
- Malware Classification Using Image RepresentationAjay Singh, Anand Handa, Nitesh Kumar, Sandeep Kumar Shukla. 75-92 [doi]
- MLDStore - DNNs as Similitude Models for Sharing Big Data (Brief Announcement)Philip Derbeko, Shlomi Dolev, Ehud Gudes. 93-96 [doi]
- Cyber Attack Localization in Smart Grids by Graph Modulation (Brief Announcement)Elisabeth Drayer, Tirza Routtenberg. 97-100 [doi]
- Beyond Replications in Blockchain - On/Off-Blockchain IDA for Storage Efficiency and Confidentiality (Brief Announcement)Shlomi Dolev, Yuval Poleg. 101-105 [doi]
- Self-stabilizing Byzantine Consensus for Blockchain - (Brief Announcement)Alexander Binun, Shlomi Dolev, Tal Hadad. 106-110 [doi]
- The Advantage of Truncated PermutationsShoni Gilboa, Shay Gueron. 111-120 [doi]
- Reconstructing C2 Servers for Remote Access Trojans with Symbolic ExecutionLuca Borzacchiello, Emilio Coppa, Daniele Cono D'Elia, Camil Demetrescu. 121-140 [doi]
- Generating a Random String with a Fixed WeightNir Drucker, Shay Gueron. 141-155 [doi]
- An Access Control Model for Data Security in Online Social Networks Based on Role and User CredibilityNadav Voloch, Priel Levy, Mor Elmakies, Ehud Gudes. 156-168 [doi]
- Enhancing Image Steganalysis with Adversarially Generated ExamplesKevin Alex Zhang, Kalyan Veeramachaneni. 169-177 [doi]
- Controllable Privacy Preserving Blockchain - FiatChain: Distributed Privacy Preserving Cryptocurrency with Law Enforcement CapabilitiesRami Puzis, Guy Barshap, Polina Zilberman, Oded Leiba. 178-197 [doi]
- A Relay Attack on a Tamper Detection System (Brief Announcement)Itai Dinur, Natan Elul. 198-201 [doi]
- Amended Cross-Entropy Cost: An Approach for Encouraging Diversity in Classification Ensemble (Brief Announcement)Ron Shoham, Haim H. Permuter. 202-207 [doi]
- Governance and Regulations Implications on Machine Learning (Brief Announcement)Sima Nadler, Orna Raz, Marcel Zalmanovici. 208-211 [doi]
- Simulating Homomorphic Evaluation of Deep Learning PredictionsChristina Boura, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev. 212-230 [doi]
- Everything Is in the Name - A URL Based Approach for Phishing DetectionHarshal Tupsamudre, Ajeet Kumar Singh, Sachin Lodha. 231-248 [doi]
- Network Cloudification - (Extended Abstract)Yefim Dinitz, Shlomi Dolev, Sergey Frenkel, Alex Binun, Daniel Khankin. 249-259 [doi]
- New Goal Recognition Algorithms Using Attack GraphsReuth Mirsky, Ya'ar Shalom, Ahmad Majadly, Kobi Gal, Rami Puzis, Ariel Felner. 260-278 [doi]
- PeerClear: Peer-to-Peer Bot-net DetectionAmit Kumar, Nitesh Kumar, Anand Handa, Sandeep Kumar Shukla. 279-295 [doi]
- Rethinking Identification Protocols from the Point of View of the GDPRMiroslaw Kutylowski, Lukasz Krzywiecki, Xiaofeng Chen 0001. 296-315 [doi]
- Temporal Pattern-Based Malicious Activity Detection in SCADA Systems (Brief Announcement)Meir Kalech, Amit Shlomo, Robert Moskovich. 316-319 [doi]
- Anonymous Deniable Identification in Ephemeral Setup and Leakage Scenarios (Brief Announcement)Lukasz Krzywiecki, Miroslaw Kutylowski, Jakub Pezda, Marcin Slowik. 320-323 [doi]
- Randomized and Set-System Based Collusion Resistant Key Predistribution Schemes (Brief Announcement)Vasiliki Liagkou, Paul G. Spirakis, Yannis C. Stamatiou. 324-327 [doi]