Abstract is missing.
- Adversarial Robustness of Image Based Android Malware Detection ModelsHemant Rathore, Taeeb Bandwala, Sanjay K. Sahay, Mohit Sewak. 3-22 [doi]
- DyPolDroid: Protecting Users and Organizations from Permission-Abuse Attacks in AndroidCarlos E. Rubio-Medrano, Matthew Hill, Luis M. Claramunt, JaeJong Baek, Gail-Joon Ahn. 23-36 [doi]
- Metacognitive Skills in Phishing Email Detection: A Study of Calibration and ResolutionYuan Li 0002, Jingguo Wang, H. Raghav Rao. 37-47 [doi]
- Deep Reinforcement Learning for Cybersecurity Threat Detection and Protection: A ReviewMohit Sewak, Sanjay K. Sahay, Hemant Rathore. 51-72 [doi]
- A Framework for Syntactic and Semantic Quality Evaluation of OntologiesVivek Iyer, Lalit Mohan Sanagavarapu, Y. Raghu Reddy. 73-93 [doi]
- Attribute-Based Access Control Policy Review in Permissioned BlockchainSherifdeen Lawal, Ram Krishnan. 97-109 [doi]
- Learning Password Modification Patterns with Recurrent Neural NetworksAlex Nosenko, Yuan Cheng, Haiquan Chen. 110-129 [doi]
- Analyzing CNN Models' Sensitivity to the Ordering of Non-natural DataRandy Klepetko, Ram Krishnan. 130-148 [doi]
- Dealing with Complexity for Immune-Inspired Anomaly Detection in Cyber Physical SystemsLenhard Reuter, Maria Leitner, Paul Smith 0001, Manuel Koschuch. 151-170 [doi]
- RQ Labs: A Cybersecurity Workforce Talent Program DesignClinton Daniel, Matthew Mullarkey, Manish Agrawal. 171-185 [doi]
- Do Fake News Between Different Languages Talk Alike? A Case Study of COVID-19 Related Fake NewsLina Zhou, Jie Tao, Evan Lai, Dongsong Zhang. 186-199 [doi]