Abstract is missing.
- Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-VirusWilliam Fleshman, Edward Raff, Richard Zak, Mark McLean, Charles Nicholas. 3-12 [doi]
- Is eval () Evil : A study of JavaScript in PDF malwareAntoine Lemay, Sylvain P. Leblanc. 13-22 [doi]
- An In-Depth Study of Open-Source Command and Control FrameworksJulien Piet, Blake Anderson, David A. McGrew. 23-30 [doi]
- SpyDroid: A Framework for Employing Multiple Real-Time Malware Detectors on AndroidShahrear Iqbal, Mohammad Zulkernine. 33-40 [doi]
- PRAST: Using Logic Bombs to Exploit the Android Permission Model and a Module Based SolutionRamon P. Medina, Elijah B. Neundorfer, Radhouane Chouchane, Alfredo Perez. 41-48 [doi]
- Android Malware Detection Using Step-Size Based Multi-layered Vector Space ModelsColby Parker, Jeffrey Todd McDonald, Tom Johnsten, Ryan G. Benton. 49-58 [doi]
- *George Kesidis, Yuquan Shan, Daniel Fleck, Angelos Stavrou, Takis Konstantopoulos. 61-67 [doi]
- Attacking OMG Data Distribution Service (DDS) Based Real-Time Mission Critical Distributed SystemsMichael James Michaud, Thomas R. Dean, Sylvain P. Leblanc. 68-77 [doi]
- Resilience of Pruned Neural Network Against Poisoning AttackBingyin Zhao, Yingjie Lao. 78-83 [doi]
- PIDS: A Behavioral Framework for Analysis and Detection of Network Printer AttacksAsaf Hecht, Adi Sagi, Yuval Elovici. 87-94 [doi]
- METICS: A Holistic Cyber Physical System Model for IEEE 14-bus Power System SecurityAnanth A. Jillepalli, Daniel Conte de Leon, Brian K. Johnson, Yacine Chakhchoukh, Ibukun A. Oyewumi, Mohammad Ashrafuzzaman, Frederick T. Sheldon, Jim Alves-Foss, Michael A. Haney. 95-102 [doi]
- Behavioral Malware Classification using Convolutional Recurrent Neural NetworksBander Alsulami, Spiros Mancoridis. 103-111 [doi]
- A Hybrid Static Tool to Increase the Usability and Scalability of Dynamic Detection of MalwareDanny Kim, Daniel Mirsky, Amir Majlesi-Kupaei, Rajeev Barua. 115-123 [doi]
- Malware Anomaly Detection on Virtual AssistantsNi An, Alexander M. Duff, Mahshid Noorani, Steven Weber, Spiros Mancoridis. 124-131 [doi]
- Model-driven Timing Consistency for Active Malware RedirectionRory Klein, Tyler Barkley, Weston Clizbe, Jennifer Bateman, Julian L. Rrushi. 132-141 [doi]
- SCRaaPS: X.509 Certificate Revocation Using the Blockchain-based Scrybe Secure Provenance SystemSai Medury, Anthony Skjellum, Richard R. Brooks, Lu Yu 0001. 145-152 [doi]
- Binary Obfuscation Based ReassembleChang Wang, Zhaolong Zhang, Xiaoqi Jia, Donghai Tian. 153-160 [doi]
- Unmasking Criminal Enterprises: An Analysis of Bitcoin TransactionsJonathan Oakley 0001, Carl R. Worley, Lu Yu 0001, Richard R. Brooks, Anthony Skjellum. 161-166 [doi]