Abstract is missing.
- DeepHunter: A Graph Neural Network Based Approach for Robust Cyber Threat HuntingRenzheng Wei, Lijun Cai, Lixin Zhao, Aimin Yu, Dan Meng. 3-24 [doi]
- SIEMA: Bringing Advanced Analytics to Legacy Security Information and Event ManagementPejman Najafi, Feng Cheng 0002, Christoph Meinel. 25-43 [doi]
- Automatic Generation of Malware Threat Intelligence from Unstructured Malware TracesYuheng Wei, Futai Zou. 44-61 [doi]
- Towards Automated Assessment of Vulnerability Exposures in Security OperationsPhilip Dale Huff, Qinghua Li. 62-81 [doi]
- Repeatable Experimentation for Cybersecurity Moving Target DefenseJaime C. Acosta, Luisana Clarke, Stephanie Medina, Monika Akbar, Mahmud Shahriar Hossain, Frederica Free-Nelson. 82-99 [doi]
- MPD: Moving Target Defense Through Communication Protocol DialectsYongsheng Mei, Kailash Gogineni, Tian Lan, Guru Venkataramani. 100-119 [doi]
- GuardedGossip: Secure and Anonymous Node Discovery in Untrustworthy NetworksAndriy Panchenko 0001, Asya Mitseva, Torsten Ziemann, Till Hering. 123-143 [doi]
- An Extensive Security Analysis on Ethereum Smart ContractsMohammadreza Ashouri. 144-163 [doi]
- A Distributed Ledger for Non-attributable Cyber Threat Intelligence ExchangePhilip Dale Huff, Qinghua Li. 164-184 [doi]
- Understanding ε for Differential Privacy in Differencing Attack ScenariosNarges Ashena, Daniele Dell'Aglio, Abraham Bernstein. 187-206 [doi]
- Explanation-Guided Diagnosis of Machine Learning Evasion AttacksAbderrahmen Amich, Birhanu Eshete. 207-228 [doi]
- ToFi: An Algorithm to Defend Against Byzantine Attacks in Federated LearningQi Xia, Zeyi Tao, Qun Li. 229-248 [doi]
- TESLAC: Accelerating Lattice-Based Cryptography with AI AcceleratorLipeng Wan, Fangyu Zheng, Jingqiang Lin. 249-269 [doi]
- Research of CPA Attack Methods Based on Ant Colony AlgorithmXiaoyi Duan, You Li, Jianmin Tong, Xiuying Li, Siman He, Peishu Zhang. 270-286 [doi]
- Local Model Privacy-Preserving Study for Federated LearningKaiyun Pan, Daojing He, Chuan Xu. 287-307 [doi]
- Cryptonite: A Framework for Flexible Time-Series Secure Aggregation with Non-interactive Fault RecoveryRyan Karl, Jonathan Takeshita, Taeho Jung. 311-331 [doi]
- Cryptonomial: A Framework for Private Time-Series Polynomial CalculationsRyan Karl, Jonathan Takeshita, Alamin Mohammed, Aaron Striegel, Taeho Jung. 332-351 [doi]
- Provably Secure Contact Tracing with Conditional Private Set IntersectionJonathan Takeshita, Ryan Karl, Alamin Mohammed, Aaron Striegel, Taeho Jung. 352-373 [doi]
- Origin Attribution of RSA Public KeysEnrico Branca, Farzaneh Abazari, Ronald Rivera Carranza, Natalia Stakhanova. 374-396 [doi]
- Fine-Grained Intra-domain Bandwidth Allocation Against DDoS AttackLijia Xie, Shuang Zhao, Xiao Zhang, Yiming Shi, Xin Xiao, Zhiming Zheng 0001. 399-417 [doi]
- TMT-RF: Tunnel Mixed Traffic Classification Based on Random ForestPanpan Zhao, Gaopeng Gou, Chang Liu, Yangyang Guan, Mingxin Cui, Gang Xiong. 418-437 [doi]
- CROCUS: An Objective Approach for SDN Controllers Security AssessmentCarlos Silva, Bruno Sousa, João P. Vilela. 438-455 [doi]
- Controlling Network Traffic Microstructures for Machine-Learning Model ProbingHenry Clausen, Robert Flood, David Aspinall 0001. 456-475 [doi]
- Using NetFlow to Measure the Impact of Deploying DNS-based BlacklistsMartin Fejrskov, Jens Myrup Pedersen, Emmanouil Vasilomanolakis. 476-496 [doi]
- A Forensic Tool to Acquire Radio Signals Using Software Defined RadioM. A. Hannan Bin Azhar, German Abadia. 499-512 [doi]
- SemFlow: Accurate Semantic Identification from Low-Level System DataMohammad Kavousi, Runqing Yang, ShiQing Ma, Yan Chen. 513-535 [doi]