Abstract is missing.
- KRAKEN: A Knowledge-Based Recommender System for Analysts, to Kick Exploration up a NotchRomain Brisse, Simon Boche, Frédéric Majorczyk, Jean-François Lalande. 1-17 [doi]
- ADAM: Automatic Detection of Android MalwareSomanath Tripathy, Narendra Singh, Divyanshu N. Singh. 18-31 [doi]
- Attack on the Common Prime Version of Murru and Saettone's RSA CryptosystemXiaona Zhang, Yang Liu, Yu Chen. 32-45 [doi]
- Identification of Data Breaches from Public ForumsMd. Akhtaruzzaman Adnan, Atika Younus, Md. Harun Al Kawser, Natasha Adhikary, Ahsan Habib, Rakib Ul Haque. 46-56 [doi]
- A Forensic Framework for Webmail Threat Detection Using Log AnalysisAbdul Saboor Malik, Muhammad Khuram Shahzad, Mehdi Hussain. 57-69 [doi]
- An Evaluation of the Multi-platform Efficiency of Lightweight Cryptographic PermutationsLuan Cardoso dos Santos, Johann Großschädl. 70-85 [doi]
- Optimized Implementation of SHA-512 for 16-Bit MSP430 MicrocontrollersChristian Franck, Johann Großschädl. 86-99 [doi]
- Limitations of the Use of Neural Networks in Black Box CryptanalysisEmanuele Bellini 0002, Anna Hambitzer, Matteo Protopapa, Matteo Rossi. 100-124 [doi]
- Improved Polynomial Multiplication Algorithms over Characteristic Three Fields and Applications to NTRU PrimeEsra Yeniaras, Murat Cenk. 125-144 [doi]
- An Optimization of Bleichenbacher's Oracle Padding AttackEvgnosia-Alexandra Kelesidis. 145-155 [doi]
- UC Analysis of the Randomized McEliece CryptosystemDániel Zentai. 156-164 [doi]
- Using Five Cards to Encode Each Integer in $\mathbb {Z}/6\mathbb {Z}$Suthee Ruangwises. 165-177 [doi]
- Conditional Differential Cryptanalysis on BaguaXiaojuan Lu, Bohan Li 0004, Shichang Wang, Dongdai Lin. 178-189 [doi]
- Perfect Anonymous Authentication and Secure Communication in Internet-of-ThingsLi Duan, Yong Li 0021, Lijun Liao. 190-209 [doi]
- Flexible Group Non-interactive Key Exchange in the Standard ModelLi Duan, Yong Li 0021, Lijun Liao. 210-227 [doi]
- A Multifunctional Modular Implementation of Grover's AlgorithmMihai-Zicu Mina, Emil Simion. 228-247 [doi]
- Lightweight Swarm AuthenticationGeorge Teseleanu. 248-259 [doi]
- New Configurations of Grain Ciphers: Security Against Slide AttacksDiana Maimut, George Teseleanu. 260-285 [doi]
- Improved Security Solutions for DDoS Mitigation in 5G Multi-access Edge ComputingMarian Gusatu, Ruxandra F. Olimid. 286-295 [doi]
- Long-Term Secure Asymmetric Group Key AgreementKashi Neupane. 296-307 [doi]
- Building Deobfuscated Applications from Polymorphic BinariesVlad Constantin Craciun, Andrei-Catalin Mogage. 308-323 [doi]
- Viruses, Exploits, Malware and Security Issues on IoT DevicesCristian Toma, Catalin Boja, Marius Popa, Mihai Doinea, Cristian Ciurea. 324-334 [doi]