Abstract is missing.
- PAC: Privacy-Preserving Arrhythmia Classification with Neural NetworksMohamad Mansouri, Beyza Bozdemir, Melek Önen, Orhan Ermis. 3-19 [doi]
- Ransomware Network Traffic Analysis for Pre-encryption AlertRouta Moussaileb, Nora Cuppens, Jean-Louis Lanet, Hélène Le Bouder. 20-38 [doi]
- Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy VehiclesHossein Shirazi, Indrakshi Ray, Charles Anderson. 39-55 [doi]
- Selection and Performance Analysis of CICIDS2017 Features ImportanceBruno Reis, Eva Maia, Isabel Praça. 56-71 [doi]
- Semantic Representation Based on Deep Learning for Spam DetectionNadjate Saidani, Kamel Adi, Mohand Saïd Allili. 72-81 [doi]
- Interpreting Machine Learning Malware Detectors Which Leverage N-gram AnalysisWilliam Briguglio, Sherif Saad. 82-97 [doi]
- Labelled Network Capture Generation for Anomaly DetectionMaël Nogues, David Brosset, Hanan Hindy, Xavier J. A. Bellekens, Yvon Kermarrec. 98-113 [doi]
- Lempel-Ziv Compression with Randomized Input-Output for Anti-compression Side-Channel Attacks Under HTTPS/TLSMeng Yang, Guang Gong. 117-136 [doi]
- Secure Logging with Security Against Adaptive Crash AttackSepideh Avizheh, Reihaneh Safavi-Naini, Shuai Li. 137-155 [doi]
- Enroll, and Authentication Will Follow - eID-Based Enrollment for a Customized, Secure, and Frictionless Authentication ExperienceSilvio Ranise, Giada Sciarretta, Alessandro Tomasi. 156-171 [doi]
- TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABEDavy Preuveneers, Wouter Joosen. 172-188 [doi]
- Protecting Android Apps from Repackaging Using Native CodeSimon Tanner, Ilian Vogels, Roger Wattenhofer. 189-204 [doi]
- Command Dependencies in Heuristic Safety Analysis of Access Control ModelsPeter Amthor 0001, Martin Rabe. 207-224 [doi]
- On Attribute Retrieval in ABACCharles Morisset, Sowmya Ravidas, Nicola Zannone. 225-241 [doi]
- Incorporating Off-Line Attribute Delegation into Hierarchical Group and Attribute-Based Access ControlDaniel Servos, Michael Bauer. 242-260 [doi]
- U-EPS: An Ultra-small and Efficient Post-quantum Signature SchemeGuang Gong, Morgan He, Raghvendra Rohit, Yunjie Yi. 261-272 [doi]
- An Efficient Identification Scheme Based on Rank MetricEdoukou Berenger Ayebie, Hafsa Assidi, El Mamoun Souidi. 273-289 [doi]
- Security Analysis of Auctionity: A Blockchain Based E-AuctionPascal Lafourcade 0001, Mike Nopere, Jérémy Picot, Daniela Pizzuti, Etienne Roudeix. 290-307 [doi]
- Dynamic Searchable Encryption with Access ControlJohannes Blömer, Nils Löken. 308-324 [doi]
- Get-your-ID: Decentralized Proof of IdentityPascal Lafourcade 0001, Marius Lombard-Platet. 327-336 [doi]
- Towards Secure TMIS ProtocolsDavid Gerault, Pascal Lafourcade 0001. 337-344 [doi]
- Detecting Ransomware in Encrypted Web TrafficJaimin Modi, Issa Traoré, Asem Ghaleb, Karim Ganame, Sherif Ahmed. 345-353 [doi]
- Digital Forensics in Vessel Transportation SystemsAlessandro Cantelli Forti, Michele Colajanni. 354-362 [doi]
- A Privacy Protection Layer for Wearable DevicesMuhammad Mohzary, Srikanth Tadisetty, Kambiz Ghazinour. 363-370 [doi]
- Validating the DFA Attack Resistance of AES (Short Paper)Hakuei Sugimoto, Ryota Hatano, Natsu Shoji, Kazuo Sakiyama. 371-378 [doi]
- A Rejection-Based Approach for Detecting SQL Injection Vulnerabilities in Web ApplicationsLalia Saoudi, Kamel Adi, Younes Boudraa. 379-386 [doi]
- Lightweight IoT Mutual Authentication Scheme Based on Transient Identities and Transactions HistoryMohammed Alshahrani, Issa Traoré, Sherif Saad. 387-397 [doi]
- Towards Privacy-Aware Smart SurveillanceEmil Shirima, Kambiz Ghazinour. 398-406 [doi]