Abstract is missing.
- Safety and Consistency of Mutable Attributes Using Quotas: A Formal AnalysisMehrnoosh Shakarami, Ravi Sandhu. 1-9 [doi]
- Z Table: Cost-Optimized Attack on Reinforcement LearningIan Y. Garrett, Ryan M. Gerdes. 10-17 [doi]
- Diggi: A Secure Framework for Hosting Native Cloud Functions with Minimal TrustAnders Tungeland Gjerdrum, Håvard Dagenborg Johansen, Lars Brenna, Dag Johansen. 18-27 [doi]
- An Intelligent Behavior-Based Ransomware Detection System For Android PlatformAbdulrahman Alzahrani, Hani Alshahrani, Ali Alshehri, Huirong Fu. 28-35 [doi]
- Disincentivizing Double Spend Attacks Across Interoperable BlockchainsKuheli Sai, David Tipper. 36-45 [doi]
- Design and Implementation of Privacy-Preserving, Flexible and Scalable Role-Based Hierarchical Access ControlTyler Phillips, Xiaoyuan Yu, Brandon Haakenson, Xukai Zou. 46-55 [doi]
- ComplexIoT: Behavior-Based Trust For IoT NetworksKyle Haefner, Indrakshi Ray. 56-65 [doi]
- An RNS Implementation of the Elliptic Curve Cryptography for IoT SecurityJai Gopal Pandey, Chhavi Mitharwal, Abhijit Karmakar. 66-72 [doi]
- Machine Learning and Recognition of User Tasks for Malware DetectionYasamin Alagrash, Nithasha Mohan, Sandhya Rani Gollapalli, Julian L. Rrushi. 73-81 [doi]
- Effects of Differential Privacy and Data Skewness on Membership Inference VulnerabilityStacey Truex, Ling Liu, Mehmet Emre Gursoy, Wenqi Wei, Lei Yu 0002. 82-91 [doi]
- Towards Deep Federated Defenses Against Malware in Cloud EcosystemsJosh Payne, Ashish Kundu. 92-100 [doi]
- Twitter Bot Detection Using Bidirectional Long Short-Term Memory Neural Networks and Word EmbeddingsFeng Wei 0002, Uyen Trang Nguyen. 101-109 [doi]
- Countering Malware Via Decoy Processes with Improved Resource Utilization ConsistencySara Sutton, Benjamin Bond, Sementa Tahiri, Julian L. Rrushi. 110-119 [doi]
- Analysis and Nudging of Personally Identifiable Information in Online Used MarketsHyunsu Mun, Youngseok Lee. 120-129 [doi]
- SERS: A Security-Related and Evidence-Based Ranking Scheme for Mobile AppsNahida Sultana Chowdhury, Rajeev R. Raje. 130-139 [doi]
- A Performance Evaluation of CAN EncryptionHanlin Chen, Baijian Yang. 140-149 [doi]
- Redistricting using Blockchain NetworkNaresh Adhikari, Naila Bushra, Mahalingam Ramkumar. 150-159 [doi]
- Secure Queryable Dynamic Graphs using BlockchainNaila Bushra, Naresh Adhikari, Mahalingam Ramkumar. 160-167 [doi]
- Data Siphoning Across Borders: The Role of Internet TrackingAshwini Rao, Jürgen Pfeffer. 168-176 [doi]
- Open-TEE is No Longer Virtual: Towards Software-Only Trusted Execution Environments Using White-Box CryptographyKemal Bicakci, Ihsan Kagan Ak, Betul Askin Ozdemir, Mesut Gozutok. 177-183 [doi]
- Factoring RSA Keys in the IoT EraJonathan Kilgallin, Ross Vasko. 184-189 [doi]
- Contextualizing Consensus Protocols in Blockchain: A Short SurveyGolam Dastoger Bashar, Graham Hill, Subroto Singha, Praneeth Babu Marella, Gaby G. Dagher, Jidong Xiao. 190-195 [doi]
- Towards Applying Design-Thinking for Designing Privacy-Protecting Information SystemsMortaza S. Bargh, Sunil Choenni. 196-202 [doi]
- User Acceptance of Usable Blockchain-Based Research Data Sharing System: An Extended TAM-Based StudyAjay Kumar Shrestha, Julita Vassileva. 203-208 [doi]
- Central Attribute Authority (CAA): A Vision for Seamless Sharing of Organizational ResourcesSaptarshi Das, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri. 209-217 [doi]
- Securing Big Data in the Age of AIMurat Kantarcioglu, Fahad Shaon. 218-220 [doi]
- Malware Containment in CloudAbhishek Malvankar, Josh Payne, Karan K. Budhraja, Ashish Kundu, Suresh Chari, Mukesh K. Mohania. 221-227 [doi]
- Secure Real-Time Heterogeneous IoT Data Management SystemMd Shihabul Islam, Harsh Verma, Latifur Khan, Murat Kantarcioglu. 228-235 [doi]
- Robust (Deep) Learning Framework Against Dirty Labels and BeyondAmirmasoud Ghiassi, Taraneh Younesian, Zilong Zhao, Robert Birke, Valerio Schiavoni, Lydia Y. Chen. 236-244 [doi]
- Trustworthy Misinformation Mitigation with Soft Information NudgingBenjamin D. Horne, Maurício Gruppi, Sibel Adali. 245-254 [doi]
- Computer Systems Have 99 Problems, Let's Not Make Machine Learning Another OneDavid A. Mohaisen, Songqing Chen. 255-259 [doi]
- Next Generation Smart Built Environments: The Fusion of Empathy, Privacy and EthicsDenis Gracanin, Ramoni O. Lasisi, Mohamed Azab, Mohamed Eltoweissy. 260-267 [doi]