Abstract is missing.
- A Cipher Class Based on Golden S-Boxes for Creating Clone-Resistant IdentitiesSaleh Mulhem, Ayoub Mars, Wael Adi. 3-14 [doi]
- A Secure and Efficient File System Access Control Mechanism (FlexFS)Jihane Najar, Vassilis Prevelakis. 15-26 [doi]
- Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource LevelTsvetoslava Vateva-Gurova, Salman Manzoor, Rubén Trapero, Neeraj Suri. 27-38 [doi]
- Detecting In-vehicle CAN Message Attacks Using Heuristics and RNNsShahroz Tariq, Sangyup Lee, Huy Kang Kim, Simon S. Woo. 39-45 [doi]
- A Questionnaire Model for Cybersecurity Maturity Assessment of Critical InfrastructuresBilge Yigit Ozkan, Marco Spruit. 49-60 [doi]
- Threat Modeling the Cloud: An Ontology Based ApproachSalman Manzoor, Tsvetoslava Vateva-Gurova, Rubén Trapero, Neeraj Suri. 61-72 [doi]
- Automated Measurements of Cross-Device TrackingKonstantinos Solomos, Panagiotis Ilia, Sotiris Ioannidis, Nicolas Kourtellis. 73-80 [doi]
- Incognitus: Privacy-Preserving User Interests in Online Social NetworksAlexandros Kornilakis, Panagiotis Papadopoulos, Evangelos P. Markatos. 81-95 [doi]
- Deep Ahead-of-Threat Virtual PatchingFady Copty, Andre Kassis, Sharon Keidar-Barner, Dov Murik. 99-109 [doi]
- Malware Clustering Based on Called API During RuntimeGergo János Széles, Adrian Colesa. 110-121 [doi]
- CloudNet Anti-malware Engine: GPU-Accelerated Network Monitoring for Cloud ServicesGeorge Hatzivasilis, Konstantinos Fysarakis, Ioannis G. Askoxylakis, Alexander Bilanakos. 122-133 [doi]
- Full Content Search in Malware CollectionsAndrei Mihalca, Ciprian Oprisa. 134-145 [doi]