Abstract is missing.
- Victim or Attacker? A Multi-dataset Domain Classification of Phishing AttacksSophie Le Page, Guy-Vincent Jourdan. 1-10 [doi]
- EVChain: A Blockchain-based Credit Sharing in Electric Vehicles ChargingMahdi Daghmehchi Firoozjaei, Ali Ghorbani, Hyoungshick Kim, JaeSeung Song. 1-5 [doi]
- "it's a generally exhausting field" A Large-Scale Study of Security Incident Management Workflows and Pain PointsJessica Staddon, Noelle Easterday. 1-12 [doi]
- Privacy in the Internet of Things: A Study to Protect User's Data in LPR Systems Using BlockchainIago Sestrem Ochôa, Leonardo Calbusch, Karize Viecelli, Juan F. De Paz, Valderi R. Q. Leithardt, Cesar Albenes Zeferino. 1-5 [doi]
- Automated Threat-Alert Screening for Battling Alert Fatigue with Temporal Isolation ForestMuhamad Erza Aminanto, Lei Zhu, Tao Ban, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue. 1-3 [doi]
- Contemporary Sequential Network Attacks Prediction using Hidden Markov ModelTimothy A. Chadza, Konstantinos G. Kyriakopoulos, Sangarapillai Lambotharan. 1-3 [doi]
- Extensive Examination of XOR Arbiter PUFs as Security Primitives for Resource-Constrained IoT DevicesKhalid T. Mursi, Yu Zhuang, Mohammed Saeed Alkatheiri, Ahmad O. Aseeri. 1-9 [doi]
- Model Checking the IKEv2 Protocol Using SpinTristan Ninet, Axel Legay, Romaric Maillard, Louis-Marie Traonouez, Olivier Zendra. 1-7 [doi]
- A blockchain-based loan over-prevention mechanismXiaoya Hu, Licheng Wang, Lijing Zhou, Lixiang Li, Sijia Yang. 1-9 [doi]
- Privacy - Preserving Multi-Party Conditional Random SelectionStefan Wüller, Benjamin Assadsolimani, Ulrike Meyer, Fabian Förg, Susanne Wetzel. 1-7 [doi]
- Ari: a P2P optimization for blockchain systemsXin Yang, Lei Shi. 1-6 [doi]
- Blockchain-based Marketplace for Software TestingYu Wang, Reza Samavi, Nitin Sood. 1-3 [doi]
- User Authentication Using Keystroke Dynamics via CrowdsourcingAndrew Foresi, Reza Samavi. 1-3 [doi]
- Geographic Hints for Passphrase AuthenticationAlaadin Addas, Julie Thorpe, Amirali Salehi-Abari. 1-9 [doi]
- Brain Hemorrhage: When Brainwaves Leak Sensitive Medical Conditions and Personal InformationAjaya Neupane, Kiavash Satvat, Mahshid Hosseini, Nitesh Saxena. 1-10 [doi]
- Compromising Speech Privacy under Continuous Masking in Personal SpacesS. Abhishek Anand, Payton Walker, Nitesh Saxena. 1-10 [doi]
- A Fair Anonymous Auction Scheme Utilizing Trusted Hardware and BlockchainBatnyam Enkhtaivan, Takao Takenouchi, Kazue Sako. 1-5 [doi]
- Achieving Privacy-Preserving Edit Distance Query in Cloud and Its Application to Genomic DataJason Chang, Rongxing Lu. 1-9 [doi]
- A Framework for Evaluating Image Obfuscation under Deep Learning-Assisted Privacy AttacksJimmy Tekli, Bechara al Bouna, Raphaël Couturier, Gilbert Tekli, Zeinab al Zein, Marc Kamradt. 1-10 [doi]
- Prying into Private Spaces Using Mobile Device Motion SensorsZakery Fyke, Isaac Griswold-Steiner, Abdul Serwadda. 1-10 [doi]
- Exploring Automation in Proofs of Attribute-based Encryption in the Standard ModelGuruprasad Eswaraiah, Lalitha Muthu Subramanian, Roopa Vishwanathan. 1-5 [doi]
- ZEMFA: Zero-Effort Multi-Factor Authentication based on Multi-Modal Gait BiometricsBabins Shrestha, Manar Mohamed, Nitesh Saxena. 1-10 [doi]
- Geographical Security Questions for Fallback AuthenticationAlaadin Addas, Amirali Salehi-Abari, Julie Thorpe. 1-6 [doi]
- Forward Secure and Fine-grained Data Sharing for Mobile CrowdsensingLiang Xue, Jianbing Ni, Cheng Huang, Xiaodong Lin, Xuemin Sherman Shen. 1-9 [doi]
- Security and Privacy Functionalities in IoTElahe Fazeldehkordi, Olaf Owe, Josef Noll. 1-12 [doi]
- Analysis, Implications, and Challenges of an Evolving Consumer IoT Security LandscapeChristopher Bellman, Paul C. van Oorschot. 1-7 [doi]
- Machine Learning Model for Smart Contracts Security AnalysisPouyan Momeni, Yu Wang, Reza Samavi. 1-6 [doi]
- Privacy-preserving tax-case processingEspen Kjellstadli Lund, Mariusz Nowostawski, Abylay Satybaldy, Nader Aeinehchi. 1-10 [doi]
- Competitive Selfish MiningHamid Azimy, Ali Ghorbani. 1-8 [doi]
- On Embedding Backdoor in Malware Detectors Using Machine LearningShoichiro Sasaki, Seira Hidano, Toshihiro Uchibayashi, Takuo Suganuma, Masahiro Hiji, Shinsaku Kiyomoto. 1-5 [doi]
- RZcash: A Privacy Protection Scheme for the Account-based BlockchainXue Bai, Licheng Wang, Lijing Zhou, Sijia Yang, Lixiang Li. 1-9 [doi]
- Hardware-assisted Remote Runtime Attestation for Critical Embedded SystemsMunir Geden, Kasper Rasmussen. 1-10 [doi]
- Enhancing Security and Privacy of Next-Generation Edge Computing TechnologiesMatthew Hagan, Fahad Siddiqui, Sakir Sezer. 1-5 [doi]
- Detecting Exploit Websites Using Browser-based Predictive AnalyticsMay Almousa, Mohd Anwar. 1-3 [doi]
- Onboarding and Software Update Architecture for IoT DevicesHemant Gupta, Paul C. van Oorschot. 1-11 [doi]
- Mixed Pictures: Mental Models of MalwareEric Spero, Milica Stojmenovic, Zahra Hassanzadeh, Sonia Chiasson, Robert Biddle. 1-3 [doi]
- Evaluation Framework for Future Privacy Protection Systems: A Dynamic Identity Ecosystem ApproachDavid Liau, Razieh Nokhbeh Zaeem, K. Suzanne Barber. 1-3 [doi]
- SplitSecond: Flexible Privilege Separation of Android AppsJehyun Lee, Akshaya Venkateswara Raja, Debin Gao. 1-10 [doi]
- Time Synchronization Attack Scenarios and Analysis of Effective Self-Detection Parameters in a Distributed Industrial Wireless Sensor NetworkMeriem Smache, Alexis Olivereau, Thibault Franco-Rondisson, Assia Tria. 1-5 [doi]
- PrefaceAli Ghorbani. 1 [doi]
- On the null relationship between personality types and passwordsAmit Maraj, Miguel Vargas Martin, Matthew Shane, Mohammad Mannan. 1-7 [doi]
- End-Users and Service Providers: Trust and Distributed Responsibility for Account SecurityYomna Abdelaziz, Daniela Napoli, Sonia Chiasson. 1-6 [doi]
- GlassMasq: Adversarial Examples Masquerading in Face Identification Systems with Feature ExtractorKazuya Kakizaki, Kosuke Yoshida, Tsubasa Takahashi 0001. 1-7 [doi]
- A New Multisignature Scheme with Public Key Aggregation for BlockchainDuc-Phong Le, Guomin Yang, Ali Ghorbani. 1-7 [doi]
- Semantic Modeling Approach for Software Vulnerabilities Data SourcesSultan S. Al-Qahtani, Juergen Rilling. 1-7 [doi]
- Rebalancing in Acyclic Payment NetworksLalitha Muthu Subramanian, Guruprasad Eswaraiah, Roopa Vishwanathan. 1-5 [doi]
- Website Identity Notification: Testing the Simplest Thing That Could Possibly WorkMilica Stojmenovic, Eric Spero, Temitayo Oyelowo, Robert Biddle. 1-7 [doi]
- Automated Extraction of Security Concerns from Bug ReportsSultan S. Al-Qahtani. 1-3 [doi]
- A Novel Permutational Sampling Technique for Cooperative Network ScanningJafar Haadi Jafarian, Kuntal Das. 1-6 [doi]
- Stethoscope: Crypto Phones with Transparent & Robust Fingerprint Comparisons using Inter Text-Speech TransformationsMaliheh Shirvanian, Nitesh Saxena. 1-10 [doi]