Abstract is missing.
- Fake Malware Generation Using HMM and GANHarshit Trehan, Fabio Di Troia. 3-21 [doi]
- Security Threats in Cloud Rooted from Machine Learning-Based Resource Provisioning SystemsHosein Mohammadi Makrani, Hossein Sayadi, Najmeh Nazari, Houman Homayoun. 22-32 [doi]
- Differential Privacy in Privacy-Preserving Big Data and Learning: Challenge and OpportunityHonglu Jiang, Yifeng Gao, S. M. Sarwar, Luis GarzaPerez, Mahmudul Robin. 33-44 [doi]
- Towards Building Intrusion Detection Systems for Multivariate Time-Series DataChangMin Seong, Youngrok Song, Jiwung Hyun, Yun-Gyung Cheong. 45-56 [doi]
- Encryption Scheme Based on the Generalized Suzuki 2-groups and Homomorphic EncryptionGennady Khalimov, Yevgen Kotukh, Sang-Yoon Chang, Yaroslav Balytskyi, Maksym Kolisnyk, Svitlana Khalimova, Oleksandr Marukhnenko. 59-76 [doi]
- End-to-End Security Scheme for E-Health Systems Using DNA-Based ECCSanaz Rahimi Moosavi, Arman Izadifar. 77-89 [doi]
- A Comprehensive Analysis of Chaos-Based Secure SystemsAva Hedayatipour, Ravi Monani, Amin Rezaei 0001, Mehrdad Aliasgari, Hossein Sayadi. 90-105 [doi]
- Crowdfunding Non-fungible Tokens on the BlockchainSean Basu, Kimaya Basu, Thomas H. Austin. 109-125 [doi]
- Automated Flag Detection and Participant Performance Evaluation for Pwnable CTFManikant Singh, Rohit Negi, Sandeep K. Shukla. 126-142 [doi]
- Towards Securing Availability in 5G: Analyzing the Injection Attack Impact on Core NetworkManohar Raavi, Simeon Wuthier, Arijet Sarker, Jinoh Kim, Jong-Hyun Kim, Sang-Yoon Chang. 143-154 [doi]