Abstract is missing.
- Audio Adversarial Examples: Targeted Attacks on Speech-to-TextNicholas Carlini, David A. Wagner 0001. 1-7 [doi]
- A Deep Learning Approach to Fast, Format-Agnostic Detection of Malicious Web ContentJoshua Saxe, Richard E. Harang, Cody Wild, Hillary Sanders. 8-14 [doi]
- Mouse Authentication Without the Temporal Aspect - What Does a 2D-CNN Learn?Penny Chong, Yi Xiang Marcus Tan, Juan Guarnizo, Yuval Elovici, Alexander Binder. 15-21 [doi]
- Detecting Homoglyph Attacks with a Siamese Neural NetworkJonathan Woodbridge, Hyrum S. Anderson, Anjum Ahuja, Daniel Grant. 22-28 [doi]
- Machine Learning DDoS Detection for Consumer Internet of Things DevicesRohan Doshi, Noah Apthorpe, Nick Feamster. 29-35 [doi]
- Adversarial Examples for Generative ModelsJernej Kos, Ian Fischer, Dawn Song. 36-42 [doi]
- Learning Universal Adversarial Perturbations with Generative ModelsJamie Hayes, George Danezis. 43-49 [doi]
- Black-Box Generation of Adversarial Text Sequences to Evade Deep Learning ClassifiersJi Gao, Jack Lanchantin, Mary Lou Soffa, Yanjun Qi. 50-56 [doi]
- Exploring the Use of Autoencoders for Botnets Traffic RepresentationRuggiero Dargenio, Shashank Srikant, Erik Hemberg, Una-May O'Reilly. 57-62 [doi]
- The Good, the Bad and the Bait: Detecting and Characterizing Clickbait on YouTubeSavvas Zannettou, Sotirios Chatzis, Kostantinos Papadamou, Michael Sirivianos. 63-69 [doi]
- Bringing a GAN to a Knife-Fight: Adapting Malware Communication to Avoid DetectionMaria Rigaki, Sebastian Garcia. 70-75 [doi]
- Adversarial Deep Learning for Robust Detection of Binary Encoded MalwareAbdullah Al-Dujaili, Alex Huang, Erik Hemberg, Una-May O'Reilly. 76-82 [doi]
- Extending Detection with Privileged Information via Generalized DistillationZ. Berkay Celik, Patrick D. McDaniel. 83-88 [doi]
- Detecting Deceptive Reviews Using Generative Adversarial NetworksHojjat Aghakhani, Aravind Machiry, Shirin Nilizadeh, Christopher Kruegel, Giovanni Vigna. 89-95 [doi]
- Background Class Defense Against Adversarial ExamplesMichael McCoyd, David A. Wagner 0001. 96-102 [doi]
- Time Series Deinterleaving of DNS TrafficAmir Asiaee T., Hardik Goel, Shalini Ghosh, Vinod Yegneswaran, Arindam Banerjee. 103-108 [doi]
- HeNet: A Deep Learning Approach on Intel® Processor Trace for Effective Exploit DetectionLi Chen, Salmin Sultana, Ravi Sahita. 109-115 [doi]
- Deep Reinforcement FuzzingKonstantin Böttinger, Patrice Godefroid, Rishabh Singh. 116-122 [doi]
- Security Risks in Deep Learning ImplementationsQixue Xiao, Kang Li, Deyue Zhang, Weilin Xu. 123-128 [doi]
- Evaluating Automated Facial Age Estimation Techniques for Digital ForensicsFelix Anda, David Lillis, Nhien-An Le-Khac, Mark Scanlon. 129-139 [doi]
- File Fragment Classification Using Grayscale Image Conversion and Deep Learning in Digital ForensicsQian Chen, Qing Liao, Zoe L. Jiang, Jun-bin Fang, Siu-Ming Yiu, Guikai Xi, Rong Li, Zhengzhong Yi, Xuan Wang, Lucas C. K. Hui, Dong Liu, En Zhang. 140-147 [doi]
- Forensic-Aware Anti-DDoS DeviceChi Yuen Tseung, Kam-Pui Chow. 148-159 [doi]
- A Dynamic Taint Analysis Tool for Android App ForensicsZhen Xu, Chen Shi, Chris Chao-Chun Cheng, Neil Zhenqiang Gong, Yong Guan. 160-169 [doi]
- Fingerprinting Cryptographic Protocols with Key Exchange Using an Entropy MeasureShoufu Luo, Jeremy D. Seideman, Sven Dietrich. 170-179 [doi]
- Forensic Analysis of Ransomware Families Using Static and Dynamic AnalysisKul Prasad Subedi, Daya Ram Budhathoki, Dipankar Dasgupta. 180-185 [doi]
- Forensic Analysis of Immersive Virtual Reality Social Applications: A Primary AccountAnanya Yarramreddy, Peter Gromkowski, Ibrahim M. Baggili. 186-196 [doi]
- SOFIT: Sociotechnical and Organizational Factors for Insider ThreatFrank L. Greitzer, Justin Purl, Yung Mei Leong, D. E. Sunny Becker. 197-206 [doi]
- Insider Threat Cybersecurity Framework Webtool & Methodology: Defending Against Complex Cyber-Physical ThreatsMichael Mylrea, Sri Nikhil Gupta Gourisetti, Curtis Larimer, Christine F. Noonan. 207-216 [doi]
- Detection of Masqueraders Based on Graph Partitioning of File System Access EventsFlavio Toffalini, Ivan Homoliak, Athul Harilal, Alexander Binder, Martín Ochoa. 217-227 [doi]
- Simulated User Bots: Real Time Testing of Insider Threat Detection SystemsPreetam Dutta, Gabriel Ryan, Aleksander Zieba, Salvatore J. Stolfo. 228-236 [doi]
- Balancing Organizational Incentives to Counter Insider ThreatAndrew P. Moore, Tracy M. Cassidy, Michael C. Theis, Daniel Bauer, Denise M. Rousseau, Susan B. Moore. 237-246 [doi]
- Navigating the Insider Threat Tool Landscape: Low Cost Technical Solutions to Jump Start an Insider Threat ProgramDerrick Spooner, George Silowash, Daniel Costa, Michael Albrethsen. 247-257 [doi]
- S.P.O.O.F Net: Syntactic Patterns for identification of Ominous Online FactorsVysakh S. Mohan, Vinayakumar R, Soman K. P, Prabaharan Poornachandran. 258-263 [doi]
- WACA: Wearable-Assisted Continuous AuthenticationAbbas Acar, Hidayet Aksu, A. Selcuk Uluagac, Kemal Akkaya. 264-269 [doi]
- Evaluating Insider Threat Detection Workflow Using Supervised and Unsupervised LearningDuc C. Le, A. Nur Zincir-Heywood. 270-275 [doi]
- Towards Human Bio-Inspired Defence Mechanism for Cyber SecurityNanda Kumar Thanigaivelan, Ethiopia Nigussie, Seppo Virtanen, Jouni Isoaho. 276-280 [doi]
- A Case Study in Tailoring a Bio-Inspired Cyber-Security Algorithm: Designing Anomaly Detection for Multilayer NetworksGonzalo Suarez, Lazaros K. Gallos, Nina H. Fefferman. 281-286 [doi]
- Diversity-Based Moving-Target Defense for Secure Wireless Vehicular CommunicationsEsraa M. Ghourab, Effat Samir, Mohamed Azab, Mohamed Eltoweissy. 287-292 [doi]
- Biologically Inspired Safety and Security for Smart Built Environments: Position PaperDenis Gracanin, Adam D'Amico, Mark Manuel, Walter Carson, Mohamed Eltoweissy, Liang Cheng. 293-298 [doi]
- Redesigning Secure Protocols to Compel Grammatical Compliance CheckingKeith Irwin. 299-305 [doi]
- A Binary Analysis Approach to Retrofit Security in Input Parsing RoutinesJayakrishna Menon, Christophe Hauser, Yan Shoshitaishvili, Stephen Schwab. 306-322 [doi]
- A Mathematical Modeling of Exploitations and Mitigation Techniques Using Set TheoryRodrigo Branco, Kekai Hu, Henrique Kawakami, Ke Sun. 323-328 [doi]
- LangSec Revisited: Input Security Flaws of the Second KindErik Poll. 329-334 [doi]