Abstract is missing.
- CAN Authorization Using Message Priority Bit-Level Access ControlAdam J. Brown, Todd R. Andel, Mark Yampolskiy, Jeffrey Todd McDonald. 1-8 [doi]
- Finding Novel Event Relationships in Temporal DataAshkan Aleali, Mahila Dadfarnia, Paulo Shakarian. 9-16 [doi]
- Rapid Homoglyph Prediction and DetectionAvi Ginsberg, Cui Yu. 17-23 [doi]
- A Multiple Radar Approach for Automatic Target Recognition of Aircraft Using Inverse Synthetic Aperture RadarCarlos Pena-Caballero, Elifaleth Cantu, Jesus Rodriguez, Adolfo Gonzales, Osvaldo Castellanos, Angel Cantu, Megan Strait, Jae Son, Dongchul Kim. 24-31 [doi]
- Machine Learning Applied to Rotating Check Fraud DetectionChristine Hines, Abdou Youssef. 32-35 [doi]
- Proof of Concept for IoT Device Authentication Based on SRAM PUFs Using ATMEGA 2560-MCUChristoph Lipps, Andreas Weinand, Dennis Krummacker, Christoph Fischer, Hans D. Schotten. 36-42 [doi]
- Reducing Data Complexity in Feature Extraction and Feature Selection for Big Data Security AnalyticsDimitrios Sisiaridis, Olivier Markowitch. 43-48 [doi]
- Detection of Malicious and Abusive Domain NamesEgon Kidmose, Erwin Lansing, Søren Brandbyge, Jens Myrup Pedersen. 49-56 [doi]
- Detecting Pathogenic Social Media Accounts without Content or Network StructureElham Shaabani, Ruocheng Guo, Paulo Shakarian. 57-64 [doi]
- Using Software Engineering Metrics to Evaluate the Quality of Static Code Analysis ToolsEnas A. Alikhashashneh, Rajeev R. Raje, James H. Hill. 65-72 [doi]
- Mining Key-Hackers on Darkweb ForumsEricsson Marin, Jana Shakarian, Paulo Shakarian. 73-80 [doi]
- Community Finding of Malware and Exploit Vendors on Darkweb MarketplacesEricsson Marin, Mohammed Almukaynizi, Eric Nunes, Paulo Shakarian. 81-84 [doi]
- Image Captioning for Ambient Awareness on a SidewalkFaruk Ahmed, Md. Sultan Mahmud, Rakib Al-Fahad, Shahinur Alam, Mohammed Yeasin. 85-91 [doi]
- Block Level Streaming Based Alternative Approach for Serving a Large Number of Workstations Securely and UniformlyFitratullah Khan, Mahmoud Quweider, Max Torres, Clair Goldsmith, Hansheng Lei, Liyu Zhang. 92-98 [doi]
- Predicting the Effect of Parental Education and Income on Infant Mortality Through Statistical LearningGeorge Toscano, Gahangir Hossain. 99-102 [doi]
- Mining Dependent ItemsHansheng Lei, Yamin Hu, Wenjian Luo, Cheng Chang Pan. 103-109 [doi]
- Prevention of Ransomware Execution in Enterprise Environment on Windows OS: Assessment of Application Whitelisting SolutionsHasan Turaev, Pavol Zavarsky, Bobby Swar. 110-118 [doi]
- Windows Virtualization Architecture For Cyber Threats DetectionHimanshu Upadhyay, Hardik A. Gohel, Alexander Pons, Leonel E. Lagos. 119-122 [doi]
- Evaluation of Internet Connectivity Under Distributed Denial of Service Attacks from Botnets of Varying MagnitudesHugo Armando Herrera, William Robert Rivas, Sanjeev Kumar. 123-126 [doi]
- Reliability Enhancement in Cloud Computing Via Optimized Job Scheduling Implementing Reinforcement Learning Algorithm and Queuing TheoryHusamelddin A. M. Balla, Chen Guang Sheng, Weipeng Jing. 127-130 [doi]
- Attack Detection and Mitigation Techniques in Industrial Control System -Smart Grid DNP3Ihab Darwish, Tarek N. Saadawi. 131-134 [doi]
- Detection of Electricity Theft in Customer Consumption Using Outlier Detection AlgorithmsJaime Yeckle, Bo Tang. 135-140 [doi]
- Impact of Paranoia Levels on the Effectiveness of the ModSecurity Web Application FirewallJatesh Jagraj Singh, Hamman Samuel, Pavol Zavarsky. 141-144 [doi]
- Improve Security Over Multiple Cloud Service Providers for Resource AllocationJayachander Surbiryala, Bikash Agrawal, Chunming Rong. 145-148 [doi]
- Hybrid Security RSA Algorithm in Application of Web ServiceJayraj Gondaliya, Savani Savani, Vivek Sheetal Dhaduvai, Gahangir Hossain. 149-152 [doi]
- Designing Mutual Authentication Protocols in Industrial Wireless NetworkJiaping Men, Wei Wang 0012, Jiqiang Liu, Zhen Han. 153-158 [doi]
- Phase Space Detection of Virtual Machine Cyber Events Through Hypervisor-Level System Call AnalysisJoel A. Dawson, Jeffrey Todd McDonald, Lee M. Hively, Todd R. Andel, Mark Yampolskiy, Charles Hubbard. 159-167 [doi]
- Hand Gesture Controlled Drones: An Open Source LibraryKathiravan Natarajan, Truong-Huy D. Nguyen, Mutlu Mete. 168-175 [doi]
- A Feedback-Based Evaluation Approach for the Continuous Adjustment of Incident PrioritizationLeonard Renners, Felix Heine, Carsten Kleiner, Gabi Dreo Rodosek. 176-183 [doi]
- Security Analysis of Intelligent Transportation Systems Based on Simulation DataLiang Ming, Gang Zhao, Minhuan Huang, Xiaohui Kuang, Hu Li, Ming Zhang. 184-187 [doi]
- Managing Big Data in Visual Retrieval Systems for DHS Applications: Combining Fourier Descriptors and Metric Space IndexingMahmoud Quweider, Hansheng Lei, Liyu Zhang, Fitra Khan. 188-193 [doi]
- Combating Insider Threats by User Profiling from Activity Logging DataMohamed Dahmane, Samuel Foucher. 194-199 [doi]
- Extending CDFR for Overlapping Community DetectionNannan Lu, Wenjian Luo, Li Ni, Hao Jiang, Weiping Ding. 200-206 [doi]
- Integration of Convolutional Neural Network and Thermal Images into Soil Moisture EstimationRemilekun Sobayo, Hsiang-Huang Wu, Ram Ray, Lijun Qian. 207-210 [doi]
- Competitive Learning Environment for Cyber-Physical System Security ExperimentationRujit Raval, Alison Maskus, Benjamin Saltmiras, Morgan Dunn, Peter J. Hawrylak, John Hale. 211-218 [doi]
- Intrusion Detection in Network Systems Through Hybrid Supervised and Unsupervised Machine Learning Process: A Case Study on the ISCX DatasetSaeid Soheily-Khah, Pierre-Francois Marteau, Nicolas Béchet. 219-226 [doi]
- A Network-Based Framework for Mobile Threat DetectionSanjay Kumar, Ari Viinikainen, Timo Hämäläinen 0002. 227-233 [doi]
- Snowball: Extracting Causal Chains from Climate Change Text CorporaSaud Alashri, Jiun-Yi Tsai, Anvesh Reddy Koppela, Hasan Davulcu. 234-241 [doi]
- A Platform for Experimentation with and Measurement of Reflective DeceptionShay Taylor, Tabor Kvasnicka, Thomas Shaw, Kyle Cook, Jim Arrowood, John Hale. 242-245 [doi]
- Hybrid Encryption for Securing SharedPreferences of Android ApplicationsSourabh Shivaji Kumbhar, Young Lee, Jeong Yang. 246-249 [doi]
- Adding Channel Binding for an Out-of-Band OTP Authentication Protocol in an Industrial Use-CaseSven Plaga, Melanie Niethammer, Norbert Wiedermann, Alexander Borisov. 250-257 [doi]
- Enhancing Security Against Software Attacks with Reprogrammable HardwareTodd R. Andel, Lindsey N. Whitehurst, Jeffrey Todd McDonald, Waleed Al-Assadi. 258-266 [doi]
- Automatic Generation of Attack Scripts from Attack GraphsWill Nichols, Zachary Hill, Peter J. Hawrylak, John Hale, Mauricio Papa. 267-274 [doi]
- Dynamic Privacy Leakage Analysis of Android Third-Party LibrariesYongzhong He, Binghui Hu, Zhen Han. 275-280 [doi]
- Differentially Private ANOVA TestingZachary Campbell, Andrew Bray, Anna M. Ritz, Adam Groce. 281-285 [doi]
- A Control Flow Anomaly Detection Algorithm for Industrial Control SystemsZhigang Zhang, Chaowen Chang, Zhuo Lv, PeiSheng Han, Yutong Wang. 286-293 [doi]