Abstract is missing.
- On the Personalization of Trust ManagementHisham Salah, Mohamed Eltoweissy. 1-10 [doi]
- Guiding a Colony of Black-Box Fuzzers with ChemotaxisKonstantin Böttinger. 11-16 [doi]
- Ant Colony-Inspired Parallel Algorithm to Improve Cryptographic Pseudo Random Number GeneratorsJörg Keller 0001, Gabriele Spenger, Steffen Wendzel. 17-22 [doi]
- Evolutionary Approaches for Resilient Surveillance ManagementRuidan Li, Errin W. Fulp. 23-28 [doi]
- Don't You Touch My Nuts: Information Hiding in Cyber Physical SystemsSteffen Wendzel, Wojciech Mazurczyk, Georg Haas. 29-34 [doi]
- Using Evolutionary Diversity to Identify Problematic Software ParametersErrin W. Fulp, H. Donald Gage, Matthew R. McNiece. 35-40 [doi]
- Attack-Resistant aiCAPTCHA Using a Negative Selection Artificial Immune SystemBrian M. Powell, Ekampreet Kalsy, Gaurav Goswami, Mayank Vatsa, Richa Singh, Afzel Noore. 41-46 [doi]
- Biometric Authentication Using Mouse and Eye Movement DataJamison Rose, Yudong Liu, Ahmed Awad. 47-55 [doi]
- Towards a Biometric Authentication-Based Hybrid Trust-Computing Approach for Verification of Provider Profiles in Online Healthcare InformationAnkur Chattopadhyay, Michael J. Schulz, Clinton Rettler, Katie Turkiewicz, Laleah Fernandez, Askar Ziganshin. 56-65 [doi]
- Taming the Length Field in Binary Data: Calc-Regular LanguagesStefan Lucks, Norina Marie Grosch, Joshua Konig. 66-79 [doi]
- Writing Parsers Like it is 2017Pierre Chifflier, Geoffroy Couprie. 80-92 [doi]
- Eliminating Input-Based Attacks by Deriving Automated Encoders and Decoders from Context-Free GrammarsTobias Bieschke, Lars Hermerschmidt, Bernhard Rumpe, Peter Stanchev. 93-101 [doi]
- Inference of Security-Sensitive Entities in LibrariesYi Lu, Sora Bae, Padmanabhan Krishnan, K. R. Raghavendra. 102-109 [doi]
- A Framework for Validating Session ProtocolsKit Sum Tse, Peter C. Johnson. 110-119 [doi]
- Building Hardened Internet-of-Things Clients with Language-Theoretic SecurityPrashant Anantharaman, Michael E. Locasto, Gabriela F. Ciocarlie, Ulf Lindqvist. 120-126 [doi]
- Research Report: Hardware-Enforcement of Walther-Recursive Program FunctionsJacob I. Torrey, Mark P. Bridgman, Tomasz Tuzel. 127-131 [doi]
- Lua Code: Security Overview and Practical Approaches to Static AnalysisAndrei Costin. 132-142 [doi]
- IDE Plugins for Detecting Input-Validation VulnerabilitiesAniqua Z. Baset, Tamara Denning. 143-146 [doi]
- HybridGuard: A Principal-Based Permission and Fine-Grained Policy Enforcement Framework for Web-Based Mobile ApplicationsPhu H. Phung, Abhinav Mohanty, Rahul Rachapalli, Meera Sridhar. 147-156 [doi]
- Spartan Jester: End-to-End Information Flow Control for Hybrid Android ApplicationsJulian Sexton, Andrey Chudnov, David A. Naumann. 157-162 [doi]
- Seamless In-App Ad Blocking on Stock AndroidMichael Backes 0001, Sven Bugiel, Philipp von Styp-Rekowsky, Marvin WiBfeld. 163-168 [doi]
- Mobile Subscriber WiFi PrivacyPiers O'Hanlon, Ravishankar Borgaonkar, Lucca Hirschi. 169-178 [doi]
- The Applicability of Ambient Sensors as Proximity Evidence for NFC TransactionsCarlton Shepherd, Iakovos Gurulian, Eibe Frank, Konstantinos Markantonakis, Raja Naeem Akram, Emmanouil Panaousis, Keith Mayes. 179-188 [doi]
- MR-Droid: A Scalable and Prioritized Analysis of Inter-App Communication RisksFang Liu, Haipeng Cai, Gang Wang, Danfeng Yao, Karim O. Elish, Barbara G. Ryder. 189-198 [doi]
- Security Implications of Publicly Reachable Building Automation SystemsOliver Gasser, Quirin Scheitle, Carl Denis, Nadja Schricker, Georg Carle. 199-204 [doi]
- Malware Detection by Analysing Network Traffic with Neural NetworksPaul Prasse, Lukás Machlica, Tomás Pevný, Jirí Havelka, Tobias Scheffer. 205-210 [doi]
- Scalable Secure Multi-party Network Vulnerability Analysis via Symbolic OptimizationKinan Dak Albab, Rawane Issa, Andrei Lapets, Azer Bestavros, Nikolaj Volgushev. 211-216 [doi]
- An Investigation of Power Law Probability Distributions for Network Anomaly DetectionStefan Prandl, Mihai Lazarescu, Duc-Son Pham, Sieteng Soh, Subhash C. Kak. 217-222 [doi]
- Real Time Network File Similarity Detection Based on Approximate MatchingAonan Zhai, Fei Xu, Zigang Cao, Haiqing Pan, Zhen Li, Gang Xiong. 223-228 [doi]
- Using Gaussian Mixture Models to Detect Outliers in Seasonal Univariate Network TrafficAarthi Reddy, Meredith Ordway-West, Melissa Lee, Matt Dugan, Joshua Whitney, Ronen Kahana, Brad Ford, Johan Muedsam, Austin Henslee, Max Rao. 229-234 [doi]
- Effects of Shared Bandwidth on Anonymity of the I2P Network UsersKhalid Shahbar, A. Nur Zincir-Heywood. 235-240 [doi]
- Traffic Monitoring and Diagnosis with Multivariate Statistical Network Monitoring: A Case StudyJosé Camacho, Pedro Garcia-Teodoro, Gabriel Maciá-Fernández. 241-246 [doi]
- Ethics and Internet MeasurementsJeroen van der Ham. 247-251 [doi]