Abstract is missing.
- Email Address Mutation for Proactive Deterrence Against Lateral Spear-Phishing AttacksMd Mazharul Islam, Ehab Al-Shaer, Muhammad Abdul Basit Ur Rahim. 1-22 [doi]
- ThreatZoom: Hierarchical Neural Network for CVEs to CWEs ClassificationEhsan Aghaei, Waseem Shadid, Ehab Al-Shaer. 23-41 [doi]
- Detecting Dictionary Based AGDs Based on Community DetectionQianying Shen, Futai Zou. 42-48 [doi]
- On the Accuracy of Measured Proximity of Bluetooth-Based Contact Tracing AppsQingchuan Zhao, Haohuang Wen, Zhiqiang Lin, Dong Xuan, Ness B. Shroff. 49-60 [doi]
- A Formal Verification of Configuration-Based Mutation Techniques for Moving Target DefenseMuhammad Abdul Basit Ur Rahim, Ehab Al-Shaer, Qi Duan. 61-79 [doi]
- Coronavirus Contact Tracing App Privacy: What Data Is Shared by the Singapore OpenTrace App?Douglas J. Leith, Stephen Farrell. 80-96 [doi]
- The Maestro Attack: Orchestrating Malicious Flows with BGPTyler McDaniel, Jared M. Smith, Max Schuchard. 97-117 [doi]
- pyDNetTopic: A Framework for Uncovering What Darknet Market Users Talking AboutJingcheng Yang, Haowei Ye, Futai Zou. 118-139 [doi]
- MisMesh: Security Issues and Challenges in Service MeshesDalton A. Hahn, Drew Davidson, Alexandru G. Bardas. 140-151 [doi]
- The Bitcoin Hunter: Detecting Bitcoin Traffic over Encrypted ChannelsFatemeh Rezaei, Shahrzad Naseri, Ittay Eyal, Amir Houmansadr. 152-171 [doi]
- MAAN: A Multiple Attribute Association Network for Mobile Encrypted Traffic ClassificationFengzhao Shi, Chao Zheng, Yiming Cui, Qingyun Liu. 172-189 [doi]
- Assessing Adaptive Attacks Against Trained JavaScript ClassifiersNiels Hansen, Lorenzo De Carli, Drew Davidson. 190-210 [doi]
- An Encryption System for Securing Physical SignalsYisroel Mirsky, Benjamin Fedidat, Yoram Haddad 0001. 211-232 [doi]
- A Cooperative Jamming Game in Wireless Networks Under UncertaintyZhifan Xu, Melike Baykal-Gürsoy. 233-254 [doi]
- SmartSwitch: Efficient Traffic Obfuscation Against Stream FingerprintingHaiPeng Li, Ben Niu 0001, Boyang Wang. 255-275 [doi]
- Misreporting Attacks in Software-Defined NetworkingQuinn K. Burke, Patrick D. McDaniel, Thomas F. La Porta, Mingli Yu, Ting He. 276-296 [doi]
- A Study of the Privacy of COVID-19 Contact Tracing AppsHaohuang Wen, Qingchuan Zhao, Zhiqiang Lin, Dong Xuan, Ness B. Shroff. 297-317 [doi]
- Best-Effort Adversarial Approximation of Black-Box Malware ClassifiersAbdullah Ali, Birhanu Eshete. 318-338 [doi]
- Review Trade: Everything Is Free in Incentivized Review GroupsYubao Zhang, Shuai Hao, Haining Wang. 339-359 [doi]
- Integrity: Finding Integer Errors by Targeted FuzzingYuyang Rong, Peng Chen, Hao Chen. 360-380 [doi]
- Improving Robustness of a Popular Probabilistic Clustering Algorithm Against Insider AttacksSayed M. Saghaian N. E., Tom La Porta, Simone Silvestri, Patrick D. McDaniel. 381-401 [doi]
- Automated Bystander Detection and Anonymization in Mobile PhotographyDavid Darling, Ang Li, Qinghua Li. 402-424 [doi]
- SmartWiFi: Universal and Secure Smart Contract-Enabled WiFi HotspotNikolay Ivanov, Jianzhi Lou, Qiben Yan. 425-445 [doi]
- ByPass: Reconsidering the Usability of Password ManagersElizabeth Stobert, Tina Safaie, Heather Molyneaux, Mohammad Mannan, Amr M. Youssef. 446-466 [doi]
- Anomaly Detection on Web-User Behaviors Through Deep LearningJiaping Gui, Zhengzhang Chen, Xiao Yu 0007, Cristian Lumezanu, Haifeng Chen. 467-473 [doi]
- Identity Armour: User Controlled Browser SecurityRoss Copeland, Drew Davidson. 474-480 [doi]
- Connecting Web Event Forecasting with Anomaly Detection: A Case Study on Enterprise Web Applications Using Self-supervised Neural NetworksXiaoyong Yuan, Lei Ding 0003, Malek Ben Salem, Xiaolin Li 0001, Dapeng Wu 0001. 481-502 [doi]
- Performance Analysis of Elliptic Curves for VoIP Audio Encryption Using a SoftphoneNilanjan Sen, Ram Dantu, Mark A. Thompson. 503-508 [doi]
- TCNN: Two-Way Convolutional Neural Network for Image SteganalysisZhili Chen, Baohua Yang, Fuhu Wu, Shuai Ren, Hong Zhong 0001. 509-514 [doi]
- PrivyTRAC - Privacy and Security Preserving Contact Tracing SystemSsu-Hsin Yu. 515-525 [doi]