Abstract is missing.
- A Practical Machine Learning-Based Framework to Detect DNS Covert Communication in EnterprisesRuming Tang, Cheng Huang, Yanti Zhou, Haoxian Wu, Xianglin Lu, Yongqian Sun, Qi Li, Jinjin Li, Weiyao Huang, Siyuan Sun, Dan Pei. 1-21 [doi]
- CacheLoc: Leveraging CDN Edge Servers for User GeolocationMingkui Wei, Khaled Rabieh, Faisal Kaleem. 22-40 [doi]
- Modeling Mission Impact of Cyber Attacks on Energy Delivery SystemsMd Ariful Haque, Sachin Shetty, Charles A. Kamhoua, Kimberly Gold. 41-61 [doi]
- Identifying DApps and User Behaviors on Ethereum via Encrypted TrafficYu Wang, Zhenzhen Li, Gaopeng Gou, Gang Xiong, Chencheng Wang, Zhen Li. 62-83 [doi]
- TransNet: Unseen Malware Variants Detection Using Deep Transfer LearningCandong Rong, Gaopeng Gou, Mingxin Cui, Gang Xiong, Zhen Li, Li Guo. 84-101 [doi]
- A Brokerage Approach for Secure Multi-Cloud Storage Resource ManagementMuhammad Ihsan Haikal Sukmana, Kennedy Aondona Torkura, Sezi Dwi Sagarianti Prasetyo, Feng Cheng 0002, Christoph Meinel. 102-119 [doi]
- On the Effectiveness of Behavior-Based Ransomware DetectionJaehyun Han, Zhiqiang Lin, Donald E. Porter. 120-140 [doi]
- PoQ: A Consensus Protocol for Private Blockchains Using Intel SGXGolam Dastoger Bashar, Alejandro Anzola Avila, Gaby G. Dagher. 141-160 [doi]
- Share Withholding in Blockchain MiningSang-Yoon Chang. 161-187 [doi]
- PEDR: A Novel Evil Twin Attack Detection Scheme Based on Phase Error Drift RangeJiahui Zhang, Qian Lu, Ruobing Jiang, Haipeng Qu. 188-207 [doi]
- Differentially Private Social Graph Publishing for Community DetectionXuebin Ma, Jingyu Yang, Shengyi Guan. 208-214 [doi]
- LaaCan: A Lightweight Authentication Architecture for Vehicle Controller Area NetworkSyed Akib Anwar Hridoy, Mohammad Zulkernine. 215-234 [doi]
- A Machine Learning Based Smartphone App for GPS Spoofing DetectionJavier Campos, Kristen Johnson, Jonathan Neeley, Staci Roesch, Farha Jahan, Quamar Niyaz, Khair Al Shamaileh. 235-241 [doi]
- AOMDroid: Detecting Obfuscation Variants of Android Malware Using Transfer LearningYu Jiang, Ruixuan Li, Junwei Tang, Ali Davanian, Heng Yin. 242-253 [doi]
- ML-Based Early Detection of IoT BotnetsAyush Kumar 0001, Mrinalini Shridhar, Sahithya Swaminathan, Teng Joon Lim. 254-260 [doi]
- Post-Quantum Cryptography in WireGuard VPNQuentin M. Kniep, Wolf Müller 0001, Jens-Peter Redlich. 261-267 [doi]
- Evaluating the Cost of Personnel Activities in Cybersecurity Management: A Case StudyRafal Leszczyna. 268-274 [doi]
- SGX-Cube: An SGX-Enhanced Single Sign-On System Against Server-Side Credential LeakageSongsong Liu, QiYang Song, Kun Sun 0001, Qi Li. 275-290 [doi]
- 256357: A New Secure NIST P-256 Compatible Elliptic Curve for VoIP Applications' SecurityNilanjan Sen, Ram Dantu, Kirill Morozov. 291-310 [doi]
- Ucam: A User-Centric, Blockchain-Based and End-to-End Secure Home IP Camera SystemXinxin Fan, Zhi Zhong, Qi Chai, Dong Guo. 311-323 [doi]
- Private Global Generator Aggregation from Different Types of Local ModelsChunling Han, Rui Xue 0001. 324-335 [doi]
- Perturbing Smart Contract Execution Through the Underlying RuntimePinchen Cui, David A. Umphress. 336-349 [doi]
- Blockchain Based Multi-keyword Similarity Search Scheme over Encrypted DataMingyue Li, Chunfu Jia, Wei Shao. 350-371 [doi]
- Using the Physical Layer to Detect Attacks on Building Automation NetworksAndreas Zdziarstek, Willi Brekenfelder, Felix Eibisch. 372-390 [doi]
- Formalizing Dynamic Behaviors of Smart Contract Workflow in Smart Healthcare Supply ChainMohammad Saidur Rahman, Ibrahim Khalil, Abdelaziz Bouras. 391-402 [doi]
- Malware Classification Using Attention-Based Transductive Learning NetworkLiting Deng, Hui-Wen, Mingfeng Xin, Yue Sun, Limin Sun, Hongsong Zhu. 403-418 [doi]
- COOB: Hybrid Secure Device Pairing Scheme in a Hostile EnvironmentSameh Khalfaoui, Jean Leneutre, Arthur Villard, Jingxuan Ma, Pascal Urien. 419-438 [doi]
- A Robust Watermarking Scheme with High Security and Low Computational ComplexityLiangjia Li, Yuling Luo, Junxiu Liu, Senhui Qiu, Lanhang Li. 439-454 [doi]
- Selecting Privacy Enhancing Technologies for IoT-Based ServicesImmanuel Kunz, Christian Banse, Philipp Stephanow. 455-474 [doi]
- Khopesh - Contact Tracing Without Sacrificing PrivacyFriedrich Doku, Ethan Doku. 475-486 [doi]