Abstract is missing.
- Stealthy Data Corruption Attack Against Road Traffic Congestion Avoidance ApplicationsAawista Chaudhry, Talal Halabi, Mohammad Zulkernine. 1-7 [doi]
- Certify the Uncertified: Towards Assessment of Virtualization for Mixed-criticality in the Automotive DomainMarcello Cinque, Luigi De Simone, Andrea Marchetta. 8-11 [doi]
- Tiny Black Boxes: A nano-Drone Safety ArchitectureConnor Sexton, Joseph Callenes. 12-19 [doi]
- Alternative Route-Based Attacks in Metropolitan Traffic SystemsSidney La Fontaine, Naveen Muralidhar, Michael Clifford, Tina Eliassi-Rad, Cristina Nita-Rotaru. 20-27 [doi]
- Autonomous Attack Mitigation for Industrial Control SystemsJohn Mern, Kyle Hatch, Ryan Silva, Cameron Hickert, Tamim Sookoor, Mykel J. Kochenderfer. 28-36 [doi]
- Federated Learning with Anomaly Client Detection and Decentralized Parameter AggregationShu Liu, Yanlei Shang. 37-43 [doi]
- Robustness Testing of Data and Knowledge Driven Anomaly Detection in Cyber-Physical SystemsXugui Zhou, Maxfield Kouzel, Homa Alemzadeh. 44-51 [doi]
- On the impact of non-IID data on the performance and fairness of differentially private federated learningSaba Amiri, Adam Belloum, Eric Nalisnick, Sander Klous, Leon Gommans. 52-58 [doi]
- A Robust Framework for Adaptive Selection of Filter Ensembles to Detect Adversarial InputsArunava Roy, Dipankar Dasgupta. 59-67 [doi]
- Towards Building Resilient Ensembles against Training Data FaultsAbraham Chan, Arpan Gujarati, Karthik Pattabiraman, Sathish Gopalakrishnan. 68-69 [doi]
- General Probability in CoqAvraham Shinnar, Barry M. Trager. 70-71 [doi]
- Data-Centric Analysis of Compound Threats to Critical Infrastructure Control SystemsSahiti Bommareddy, Benjamin Gilby, Maher Khan, Imes Chiu, Mathaios Panteli, John W. van de Lindt, Linton Wells, Yair Amir, Amy Babay. 72-79 [doi]
- Network Message Field Type Clustering for Reverse Engineering of Unknown Binary ProtocolsStephan Kleber, Frank Kargl, Milan State, Matthias Hollick. 80-87 [doi]
- A Dataset of Linux Failure Data for Dependability Evaluation and ImprovementJoão R. Campos, Ernesto Costa, Marco Vieira. 88-95 [doi]
- Privacy Leakage Analysis for Colluding Smart AppsJunzhe Wang, Lannan Luo. 96-102 [doi]
- A Practical Security Evaluation of a Moving Target Defence against Multi-Phase CyberattacksTina Moghaddam, Minjune Kim, Jin-Hee Cho, Hyuk Lim, Terrence J. Moore, Frederica Free-Nelson, Dan Dongseong Kim. 103-110 [doi]
- Repairing Security Vulnerabilities Using Pre-trained Programming Language ModelsKai Huang, Su Yang, Hongyu Sun, Chengyi Sun, Xuejun Li, Yuqing Zhang. 111-116 [doi]
- An Overview of Sybil Attack Detection Mechanisms in VFCHaonan Yang, Yongchao Zhong, Bo Yang, Yiyu Yang, Zifeng Xu, Longjuan Wang, Yuqing Zhang. 117-122 [doi]
- A Chinese Multi-modal Relation Extraction Model for Internet Security of FinanceQinghan Lai, Shuai Ding 0004, Jinghao Gong, Jin'an Cui, Song Liu. 123-128 [doi]
- SbrPBert: A BERT-Based Model for Accurate Security Bug Report PredictionXudong Cao, Tianwei Liu, Jiayuan Zhang, Mengyue Feng, Xin Zhang, Wanying Cao, Hongyu Sun, Yuqing Zhang. 129-134 [doi]
- SCUC-DSAC: A Data Sharing Access Control Model Based on Smart Contract and User CreditGuangxia Xu, Li Wang. 135-140 [doi]
- Vulnerability Dataset Construction Methods Applied To Vulnerability Detection: A SurveyYuhao Lin, Ying Li, Mianxue Gu, Hongyu Sun, Qiuling Yue, Jinglu Hu, Chunjie Cao, Yuqing Zhang. 141-146 [doi]
- Multi-authoritative Users Assured Data Deletion Scheme in Cloud ComputingJunfeng Tian, Ruxin Bai, Tianfeng Zhang. 147-154 [doi]
- A Two-Layer Soft-Voting Ensemble Learning Model For Network Intrusion DetectionWenbin Yao, Longcan Hu, Yingying Hou, Xiaoyong Li 0003. 155-161 [doi]
- Machine Learning Analysis of Memory Images for Process Characterization and Malware DetectionSeth Lyles, Mark Desantis, John Donaldson, Micaela Gallegos, Hannah Nyholm, Claire Taylor, Kristine Monteith. 162-169 [doi]
- Blockchain-Based Incentive and Arbitrable Data Auditing SchemeJunfeng Tian, Qianqian Song, Haoning Wang. 170-177 [doi]
- A Comprehensive Dynamic Quality Assessment Method for Cyber Threat IntelligenceMenghan Wang, Libin Yang, Wei Lou. 178-181 [doi]
- DTC: A Dynamic Trusted Collaboration Architecture for Mobile Edge ComputingRuizhong Du, Yan Gao. 182-185 [doi]
- VDBWGDL: Vulnerability Detection Based On Weight Graph And Deep LearningXin Zhang, Hongyu Sun, Zhipeng He 0003, Mianxue Gu, Jingyu Feng, Yuqing Zhang. 186-190 [doi]
- Dynamic Multipath Routing Mechanism for Multimedia Data Flow Scheduling Over Software Defined NetworksJiawei Wu, Xiuquan Qiao, Huijuan Lu. 191-198 [doi]