Abstract is missing.
- Moving-Target Defense Against Botnet Reconnaissance and an Adversarial Coupon-Collection ModelDaniel Fleck, Angelos Stavrou, George Kesidis, Neda Nasiriani, Yuquan Shan, Takis Konstantopoulos. 1-8 [doi]
- The Method of Capturing the Encrypted Password Packets of WPA & WPA2, Automatic, Semi-Automatic or Manual?Tien-Ho Chang, Jiunn-Wu Lin, Chia-Mei Chen, Gu Hsin Lai. 1-4 [doi]
- On the Authentication of Certificateless RSA Public KeyWu-Chuan Yang, Lien-Yuan Ting, Tzu-Chun Kuo. 1-2 [doi]
- Stochastic Processors on FPGAs to Compute Sensor Data Towards Fault-Tolerant IoT SystemsRui Policarpo Duarte, Horácio C. Neto. 1-8 [doi]
- AnchorCAN: Anchor-Based Secure CAN Communications SystemHsiao-Ying Lin, Zhuo Wei, Yanjiang Yang, YaDong Wei, Kang Tang, Qingdi Sha. 1-7 [doi]
- Mitigating Over-Permissible Transfer for Control Flow IntegrityChung-Kuan Chen, Shang-Kuei Chen, Shiuhpyng Winston Shieh. 1-8 [doi]
- Bipolar Dual-LFSR Reseeding for Low-Power TestingJen-Cheng Ying, Wang-Dauh Tseng, Wen-Jiin Tsai. 1-7 [doi]
- Dynamic Path Pruning in Symbolic ExecutionYing-Shen Chen, Wei-Ning Chen, Che-Yu Wu, Hsu-Chun Hsiao, Shih-Kun Huang. 1-8 [doi]
- Efficient Key-Aggregate Proxy Re-Encryption for Secure Data Sharing in CloudsWei-Hao Chen, Chun-I Fan, Yi-Fan Tseng. 1-4 [doi]
- CC-Tracker: Interaction Profiling Bipartite Graph Mining for Malicious Network Activity DetectionTzung-Han Jeng, Yi-Ming Chen, Chien-Chih Chen, Chuan-Chiang Huang, Kuo-Sen Chou. 1-8 [doi]
- Secure Hierarchical Bitcoin Wallet Scheme Against Privilege Escalation AttacksChun-I Fan, Yi-Fan Tseng, Hui-Po Su, Ruei-Hau Hsu, Hiroaki Kikuchi. 1-8 [doi]
- An Over-the-Blockchain Firmware Update Framework for IoT DevicesAlexander Yohan, Nai-Wei Lo. 1-8 [doi]
- Offline Transferable E-Cash MechanismJia-Ning Luo, Ming-Hour Yang. 1-2 [doi]
- Segment Routing Green Spine Switch Management Systems for Data Center NetworksOse Osamudiamen, Chung-Horng Lung. 1-8 [doi]
- OTMEN: Offloading Traffic Monitoring to Edge Nodes in Software-Defined Datacenter NetworksAmer Aljaedi, C. Edward Chow, Ehab Ashary, Francisco Torres-Reyes. 1-8 [doi]
- MOSQUITO: Covert Ultrasonic Transmissions Between Two Air-Gapped Computers Using Speaker-to-Speaker CommunicationMordechai Guri, Yosef A. Solewicz, Yuval Elovici. 1-8 [doi]
- A Privacy-Preserving Metro Passenger Flow Acquisition and Query System Based on Crowd-SensingCaiqin Nong, Shaohua Tang, Yuanyuan Zhang. 1-8 [doi]
- Low-Power Command Protection Using SHA-CRC Inversion-Based Scrambling Technique for CAN-Integrated Automotive ControllersJihun Kim, Jeonghun Cho, Daejin Park. 1-2 [doi]
- Resilient and Scalable Cloned App Detection Using Forced Execution and Compression TreesMohamed Elsabagh, Ryan Johnson 0002, Angelos Stavrou. 1-8 [doi]
- Additional Kernel Observer to Prevent Privilege Escalation Attacks by Focusing on System Call Privilege ChangesToshihiro Yamauchi, Yohei Akao, Ryota Yoshitani, Yuichi Nakamura, Masaki Hashimoto. 1-8 [doi]
- Skipping Sleeps in Dynamic Analysis of Multithreaded MalwareYoshihiro Oyama. 1-8 [doi]
- Vague Set Based FMEA Method for Risk Evaluation of Safety-Related SystemsKuo-Sui Lin, Chih-Chung Chiu. 1-8 [doi]
- Detection of DNS Tunneling by Feature-Free MechanismChia-Min Lai, Bo-Ching Huang, Shin-Ying Huang, Ching-Hao Mao, Hahn-Ming Lee. 1-2 [doi]
- A Lightweight Compound Defense Framework Against Injection Attacks in IIoTPo-Wen Chi, Ming-Hung Wang. 1-8 [doi]
- Risk of Bitcoin Addresses to be Identified from Features of Output AddressesKodai Nagata, Hiroaki Kikuchi, Chun-I Fan. 1-6 [doi]
- OWASP Risk Analysis Driven Security Requirements Specification for Secure Android Mobile Software DevelopmentKai Qian, Reza M. Parizi, Dan Chia-Tien Lo. 1-2 [doi]
- Counterfeit Fingerprint Detection of Outbound HTTP Traffic with Graph Edit DistanceChi-Kuan Chiu, Hsiao-Hsien Chang, Ching-Hao Mao, Te-En Wei. 1-2 [doi]
- Finder: Automatic ICC Data Reconstruction for Long-Term Runtime SemanticsChia-Wei Hsu, Sheng-Ru Wei, Shiuhpyng Shieh. 1-9 [doi]
- Closed-Loop DDoS Mitigation System in Software Defined NetworksHenan Kottayil Hyder, Chung-Horng Lung. 1-6 [doi]
- Design and Implement Binary Fuzzing Based on LibfuzzerWei-Chieh Chao, Si-Chen Lin, Yi-Hsien Chen, Chin-Wei Tien, Chun-Ying Huang. 1-2 [doi]
- PriBioAuth: Privacy-Preserving Biometric-Based Remote User AuthenticationYangguang Tian, Yingjiu Li, Ximeng Liu, Robert H. Deng, Binanda Sengupta. 1-8 [doi]
- Load Balancing Using ECMP in Multi-Stage Clos Topology in a DatacenterHarpreet Kaur Dhaliwal, Chung-Horng Lung. 1-7 [doi]
- CORE: Cooperative Encryption with its Applications to Controllable Security ServicesRuei-Hau Hsu, Chun-I Fan, Tony Q. S. Quek, Jemin Lee. 1-8 [doi]
- Blockchain-Based Authentication in IoT NetworksChi Ho Lau, Alan Kai-Hau Yeung, Fan Yan. 1-8 [doi]
- An Identity-Based Fair Contract Signing Protocol Constructed by the Confirmation SignatureChih-Hung Wang. 1-6 [doi]
- Forged Seal Imprint Identification Based on Regression Analysis on Imprint Borders and Metrics ComparisonsWei-Ho Chung, Mu-En Wu, Yeong-Luh Ueng, Yi-Hsuan Su. 1-5 [doi]
- ANN Mechanism for Network Traffic Anomaly Detection in the Concept Drifting EnvironmentRua-Huan Tsaih, Shin-Ying Huang, Mao-Ci Lian, Yennun Huang. 1-6 [doi]
- Impact Assessment of Password Reset PRMitM Attack with Two-Factor AuthenticationKota Sasa, Hiroaki Kikuchi. 1-8 [doi]
- Efficient Key Agreement Protocol for Smart SensorsAlbert Guan, Chin-Laung Lei. 1-7 [doi]
- SlimIoT: Scalable Lightweight Attestation Protocol for the Internet of ThingsMahmoud Ammar, Mahdi Washha, Gowri Sankar Ramachandran, Bruno Crispo. 1-8 [doi]
- Differentiating and Predicting Cyberattack Behaviors Using LSTMIan Perry, Lutzu Li, Christopher Sweet, Shao-Hsuan Su, Fu-Yuan Cheng, Shanchieh Jay Yang, Ahmet Okutan. 1-8 [doi]
- Setting Malicious Flow Entries Against SDN Operations: Attacks and CountermeasuresCheng-Hsu Lin, Chi-Yu Li, Kuochen Wang. 1-8 [doi]
- Improving Tor Hidden Service Crawler PerformanceJonghyeon Park, Hyunsu Mun, Youngseok Lee. 1-8 [doi]
- A Bandwidth-Efficient Middleware for Encrypted DeduplicationHelei Cui, Cong Wang, Yu Hua 0001, Yuefeng Du, Xingliang Yuan. 1-8 [doi]
- Network Security for IoT Using SDN: Timely DDoS DetectionNarmadha Sambandam, Mourad Hussein, Noor Siddiqi, Chung-Horng Lung. 1-2 [doi]
- PAST: Protocol-Adaptable Security Tool for Heterogeneous IoT EcosystemsAntonino Rullo, Elisa Bertino, Domenico Saccà. 1-8 [doi]
- DeepMemIntrospect: Recognizing Data Structures in Memory with Neural NetworksChung-Kuan Chen, E.-Lin Ho, Shiuhpyng Winston Shieh. 1-2 [doi]
- Secret Sharing Schemes Using Modulo-$2^{m}$ Arithmetic OperationsHidenori Kuwakado. 1-7 [doi]
- Enforcing Policy-Based Security Models for Embedded SoCs within the Internet of ThingsMatthew Hagan, Fahad Siddiqui, Sakir Sezer, Boojoong Kang, Kieran McLaughlin. 1-8 [doi]
- Differentially Private Principal Component Analysis Over Horizontally Partitioned DataSen Wang, J. Morris Chang. 1-8 [doi]
- Optimizing the Sequence of Vulnerability Scanning InjectionsKoichi Funaya, Samir Bajaj, Kumar Sharad, Alok Srivastava. 1-2 [doi]
- Use-After-Free Mitigation via Protected Heap AllocationMingbo Zhang, Saman A. Zonouz. 1-8 [doi]
- A Homomorphic LWE-Based Verifiable Electronic Voting SystemChen Wu, Shaohua Tang, Xingfu Yan. 1-8 [doi]
- Keynote Talk #1Jeffrey M. Voas. 13 [doi]
- Keynote Talk #2Koji Nakao. 14 [doi]
- DSC#7Koichiro Amemiya. 204 [doi]