Abstract is missing.
- Detecting Adversarial Attacks in the Context of Bayesian NetworksEmad Alsuwat, Hatim Alsuwat, John Rose, Marco Valtorta, Csilla Farkas. 3-22 [doi]
- AGBuilder: An AI Tool for Automated Attack Graph Building, Analysis, and RefinementBruhadeshwar Bezawada, Indrajit Ray, Kushagra Tiwary. 23-42 [doi]
- On Practical Aspects of PCFG Password CrackingRadek Hranický, Filip Listiak, Dávid Mikus, Ondrej Rysavý. 43-60 [doi]
- That's My DNA: Detecting Malicious Tampering of Synthesized DNADiptendu Mohan Kar, Indrajit Ray. 61-80 [doi]
- Adversarial Sampling Attacks Against Phishing DetectionHossein Shirazi, Bruhadeshwar Bezawada, Indrakshi Ray, Charles Anderson. 83-101 [doi]
- Is My Phone Listening in? On the Feasibility and Detectability of Mobile EavesdroppingJacob Leon Kröger, Philip Raschke. 102-120 [doi]
- Droids in Disarray: Detecting Frame Confusion in Hybrid Android AppsDavide Caputo, Luca Verderame, Simone Aonzo, Alessio Merlo. 121-139 [doi]
- Geo-Graph-Indistinguishability: Protecting Location Privacy for LBS over Road NetworksShun Takagi, Yang Cao 0011, Yasuhito Asano, Masatoshi Yoshikawa. 143-163 [doi]
- "When and Where Do You Want to Hide?" - Recommendation of Location Privacy Preferences with Local Differential PrivacyMaho Asada, Masatoshi Yoshikawa, Yang Cao 0011. 164-176 [doi]
- Analysis of Privacy Policies to Enhance Informed ConsentRaúl Pardo, Daniel Le Métayer. 177-198 [doi]
- Lost in TLS? No More! Assisted Deployment of Secure TLS ConfigurationsSalvatore Manfredi, Silvio Ranise, Giada Sciarretta. 201-220 [doi]
- Contributing to Current Challenges in Identity and Access Management with Visual AnalyticsAlexander Puchta, Fabian Böhm, Günther Pernul. 221-239 [doi]
- Analysis of Multi-path Onion Routing-Based Anonymization NetworksWladimir De la Cadena, Daniel Kaiser, Asya Mitseva, Andriy Panchenko 0001, Thomas Engel 0001. 240-258 [doi]
- Shoal: Query Optimization and Operator Placement for Access Controlled Stream Processing SystemsCory Thoma, Alexandros Labrinidis, Adam J. Lee. 261-280 [doi]
- A Distributed Ledger Approach to Digital Twin Secure Data SharingMarietheres Dietz, Benedikt Putz, Günther Pernul. 281-300 [doi]
- Refresh Instead of Revoke Enhances Safety and Availability: A Formal AnalysisMehrnoosh Shakarami, Ravi Sandhu. 301-313 [doi]
- Wrangling in the Power of Code Pointers with ProxyCFIMisiker Tadesse Aga, Colton Holoday, Todd M. Austin. 317-337 [doi]
- CASFinder: Detecting Common Attack SurfaceMengyuan Zhang, Yue Xin, Lingyu Wang 0001, Sushil Jajodia, Anoop Singhal. 338-358 [doi]
- Algorithm Diversity for Resilient SystemsScott D. Stoller, Yanhong A. Liu. 359-378 [doi]
- Online Malware Detection in Cloud Auto-scaling Systems Using Shallow Convolutional Neural NetworksMahmoud Abdelsalam, Ram Krishnan, Ravi Sandhu. 381-397 [doi]
- Redirecting Malware's Target Selection with Decoy ProcessesSara Sutton, Garret Michilli, Julian L. Rrushi. 398-417 [doi]