Abstract is missing.
- Robustness of Image-Based Malware AnalysisKatrina Tran, Fabio Di Troia, Mark Stamp 0001. 3-21 [doi]
- Word Embeddings for Fake Malware GenerationQuang Duy Tran, Fabio Di Troia. 22-37 [doi]
- Twitter Bots' Detection with Benford's Law and Machine LearningSanmesh Bhosale, Fabio Di Troia. 38-54 [doi]
- A Blockchain-Based Retribution Mechanism for Collaborative Intrusion DetectionWenjun Fan, Shubham Kumar, Sang-Yoon Chang, Younghee Park. 57-73 [doi]
- Smart Contracts in the CloudLuis Angel D. Bathen, Divyesh Jadav. 74-89 [doi]
- A Blockchain-Based Tamper-Resistant Logging FrameworkThomas H. Austin, Fabio Di Troia. 90-104 [doi]
- Impact of Location Spoofing Attacks on Performance Prediction in Mobile NetworksNikhil Sai Kanuri, Sang-Yoon Chang, Younghee Park, Jonghyun Kim, Jinoh Kim. 107-119 [doi]
- Deep IoT Monitoring: Filtering IoT Traffic Using Deep LearningGargi Gopalkrishna Prabhugaonkar, Xiaoyan Sun 0003, Xuyu Wang, Jun Dai. 120-136 [doi]