Abstract is missing.
- UnderTracker: Binary Hardening Through Execution Flow VerificationRajesh Kumar Shrivastava, Chittaranjan Hota, Govind Mittal, Zahid Akhtar. 3-20 [doi]
- Toward Relationship Based Access Control for Secure Sharing of Structured Cyber Threat IntelligenceMd. Farhan Haque, Ram Krishnan. 21-37 [doi]
- Decepticon: A Hidden Markov Model Approach to Counter Advanced Persistent ThreatsRudra Prasad Baksi, Shambhu J. Upadhyaya. 38-54 [doi]
- A Survey on Ransomware Detection TechniquesC. V. Bijitha, Rohit Sukumaran, Hiran V. Nath. 55-68 [doi]
- Indian New Currency Denomination Identification System with Audio Feedback Using Convolution Neural Networks for Visually Challenged and Elderly PeoplePadma Vasavi Kalluru. 71-81 [doi]
- Secure and Energy-Efficient Key-Agreement Protocol for Multi-server ArchitectureTrupil Limbasiya, Sanjay K. Sahay. 82-97 [doi]
- A Formal Specification of Access Control in AndroidSamir Talegaon, Ram Krishnan. 101-125 [doi]
- Security Analysis of Unified Access Control PoliciesMahendra Pratap Singh, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya. 126-146 [doi]
- On the Feasibility of RBAC to ABAC Policy Mining: A Formal AnalysisShuvra Chakraborty, Ravi Sandhu, Ram Krishnan. 147-163 [doi]
- An Investigation of Misinformation Harms Related to Social Media During Humanitarian CrisesThi Tran, Rohit Valecha, Paul Rad, H. Raghav Rao. 167-181 [doi]
- The Effect of Threat and Proximity on Cyber-Rumor SharingRohit Valecha, Tejaswi Volety, Kyounghee Hazel Kwon, H. Raghav Rao. 182-193 [doi]
- Securing Trust in Online Social NetworksVishnu S. Pendyala. 194-201 [doi]