Abstract is missing.
- A Characterization of the Mass Surveillance Potential of Road Traffic MonitorsKirk Boyer, Hao Chen, Jingwei Chen, Jian Qiu, Rinku Dewri. 3-23 [doi]
- SecSmartLock: An Architecture and Protocol for Designing Secure Smart LocksBhagyesh Patil, Parjanya Vyas, R. K. Shyamasundar. 24-43 [doi]
- A Novel Multi-factor Authentication Protocol for Smart Home EnvironmentsK. Nimmy, Sriram Sankaran, Krishnashree Achuthan. 44-63 [doi]
- Modeling and Analyzing Multistage Attacks Using Recursive Composition AlgebraGhanshyam S. Bopche, Gopal N. Rai, Babu M. Mehtre, G. R. Gangadharan. 67-87 [doi]
- RiskWriter: Predicting Cyber Risk of an EnterpriseK. Aditya, Slawomir Grzonkowski, Nhien-An Le-Khac. 88-106 [doi]
- ProPatrol: Attack Investigation via Extracted High-Level TasksSadegh M. Milajerdi, Birhanu Eshete, Rigel Gjomemo, Venkat N. Venkatakrishnan. 107-126 [doi]
- SGP: A Safe Graphical Password System Resisting Shoulder-Surfing Attack on SmartphonesSuryakanta Panda, Madhu Kumari, Samrat Mondal. 129-145 [doi]
- Towards Accuracy in Similarity Analysis of Android ApplicationsSreesh Kishore, Renuka Kumar, Sreeranga Rajan. 146-167 [doi]
- Secret Sharing Schemes on Compartmental Access Structure in Presence of CheatersJyotirmoy Pramanik, Partha Sarathi Roy, Sabyasachi Dutta, Avishek Adhikari, Kouichi Sakurai. 171-188 [doi]
- Privacy Preserving Multi-server k-means Computation over Horizontally Partitioned DataRiddhi Ghosal, Sanjit Chatterjee. 189-208 [doi]
- Secure Moderated Bargaining GameSumanta Chatterjee. 209-227 [doi]
- SONICS: A Segmentation Method for Integrated ICS and Corporate SystemKhaoula Es-Salhi, David Espes, Nora Cuppens. 231-250 [doi]
- Proxy Re-Encryption Scheme for Access Control Enforcement Delegation on Outsourced Data in Public CloudGaurav Pareek, B. R. Purushothama. 251-271 [doi]
- From Cyber Security Activities to Collaborative Virtual Environments Practices Through the 3D CyberCOP PlatformAlexandre Kabil, Thierry Duval, Nora Cuppens, Gérard Le Comte, Yoran Halgand, Christophe Ponchel. 272-287 [doi]
- A Deep Learning Based Digital Forensic Solution to Blind Source Identification of Facebook ImagesVenkata Udaya Sameer, Ishaan Dali, Ruchira Naskar. 291-303 [doi]
- A Digital Forensic Technique for Inter-Frame Video Forgery Detection Based on 3D CNNJamimamul Bakas, Ruchira Naskar. 304-317 [doi]
- Re-compression Based JPEG Tamper Detection and Localization Using Deep Neural Network, Eliminating Compression Factor DependencyJamimamul Bakas, Praneta Rawat, Kalyan Kokkalla, Ruchira Naskar. 318-341 [doi]
- SeDiCom: A Secure Distributed Privacy-Preserving Communication PlatformAlexander Marsalek, Bernd Prünster, Bojan Suzic, Thomas Zefferer. 345-363 [doi]
- Efficacy of GDPR's Right-to-be-Forgotten on FacebookVishwas T. Patil, R. K. Shyamasundar. 364-385 [doi]
- Analysis of Newer Aadhaar Privacy ModelsAjinkya Rajput, K. Gopinath. 386-404 [doi]
- drPass: A Dynamic and Reusable Password Generator ProtocolSuryakanta Panda, Samrat Mondal. 407-426 [doi]
- MySecPol: A Client-Side Policy Language for Safe and Secure BrowsingAmit Pathania, B. S. Radhika, Rudrapatna K. Shyamasundar. 427-447 [doi]
- Gaze-Based Graphical Password Using WebcamAbhishek Tiwari, Rajarshi Pal. 448-461 [doi]
- (Invited Paper) on the Security of Blockchain Consensus ProtocolsSourav Das, Aashish Kolluri, Prateek Saxena, Haifeng Yu. 465-480 [doi]