Abstract is missing.
- Securing PKES: Integrating Artificial Intelligence Into PKES Forcefield For Anomaly DetectionSyed Rizvi, Jarrett Imler, Luke Ritchey, Michael Tokar. 10-15 [doi]
- Fingerprinting using database steganographyPeter Kieseberg, Sebastian Schrittwieser, Edgar R. Weippl. 16-20 [doi]
- Change Point Problem in Security Vulnerability Discovery ModelAnkur Shukla, Basel Katt. 21-26 [doi]
- Anomaly Detection Support Using Process ClassificationSebastian Eresheim, Lukas Daniel Klausner, Patrick Kochberger. 27-40 [doi]
- Revisiting the Challenges of Input Parsing for Robust and Secure SoftwareThomas Pipek, Martin Pirker. 41-45 [doi]
- Analysis of the Internals of MySQL/InnoDB B+ Tree Index Navigation from a Forensic PerspectivePeter Kieseberg, Sebastian Schrittwieser, Peter Frühwirt, Edgar R. Weippl. 46-51 [doi]
- Computing Security Scores for IoT Device VulnerabilitiesSyed Rizvi, Nicholas McIntyre, Jungwoo Ryoo. 52-59 [doi]
- Assessment of the Transparency of the Windows Subsystem for Linux (WSL)Patrick Kochberger, Alexander Tauber, Sebastian Schrittwieser. 60-69 [doi]
- Acceptance of Virtual Health AvatarsHeimo Müller, Martina Lang, Bernhard Wieser, Robert Reihs, Birgit Pohn, Andreas Holzinger, Kurt Zatloukal. 70-75 [doi]
- A Hybrid Framework for Detecting Repackaged Applications on the Android MarketSyed Rizvi, Kieran Alden, Shakir Campbell. 76-82 [doi]