Abstract is missing.
- DIDarknet: A Contemporary Approach to Detect and Characterize the Darknet Traffic using Deep Image LearningArash Habibi Lashkari, Gurdip Kaur, Abir Rahali. 1-13 [doi]
- Slow Scan Attack Detection Based on Communication BehaviorTomoya Yamashita, Daisuke Miyamoto, Yuji Sekiya, Hiroshi Nakamura. 14-20 [doi]
- Analysis on Entropy Sources based on Smartphone SensorsNa Lv, Tianyu Chen, Yuan Ma. 21-31 [doi]
- TLS Encrypted Application Classification Using Machine Learning with Flow Feature EngineeringOnur Barut, Rebecca Zhu, Yan Luo, Tong Zhang. 32-41 [doi]
- Towards Unsupervised Introspection of Containerized ApplicationPinchen Cui, David A. Umphress. 42-51 [doi]
- Proof of Network Security Services: Enforcement of Security SLA through Outsourced Network TestingSultan Alasmari, Weichao Wang, Yu Wang 0003. 52-59 [doi]
- Outsourced Secure ID3 Decision Tree Algorithm over Horizontally Partitioned Datasets with Consortium BlockchainMing Yang, Xuexian Hu, Jianghong Wei, Qihui Zhang, Wenfen Liu. 60-69 [doi]
- DIDroid: Android Malware Classification and Characterization Using Deep Image LearningAbir Rahali, Arash Habibi Lashkari, Gurdip Kaur, Laya Taheri, François Gagnon, Frédéric Massicotte. 70-82 [doi]
- Vulnerability Analysis of the Exposed Public IPs in a Higher Education InstitutionAgustín Chancusi, Paúl Diestra, Damián Nicolalde. 83-90 [doi]
- A Privacy-Preserving Framework for Surveillance SystemsKok Seng Wong, Nguyen Anh Tu, Anuar Maratkhan, M. Fatih Demirci. 91-98 [doi]
- VCPEC: Vulnerability Correlation Analysis Based on Privilege Escalation and Coritivity TheoryXuefei Wang, Rui Ma 0004, Donghai Tian, Xiajing Wang. 99-108 [doi]
- Identification of Spoofed Emails by applying Email Forensics and Memory ForensicsSanjeev Shukla, Manoj Misra, Gaurav Varshney. 109-114 [doi]
- Locust: Highly Concurrent DHT Experimentation Framework for Security EvaluationsFlorian Adamsky, Daniel Kaiser 0001, Michael Steglich, Thomas Engel 0001. 115-122 [doi]
- On the predictability of biometric honey templates, based on Bayesian inferenceEdlira Martiri, Bian Yang. 123-134 [doi]
- The analysis method of security vulnerability based on the knowledge graphYongfu Wang, Ying Zhou, Xiaohai Zou, Quanqiang Miao, Wei Wang. 135-145 [doi]