Abstract is missing.
- A Queueing Solution to Reduce Delay in Processing of Disclosed VulnerabilitiesAndrew Feutrill, Matthew Roughan, Joshua Ross, Yuval Yarom. 1-11 [doi]
- Security and Privacy for a Sustainable Internet of ThingsHelge Janicke, Sharif Abuadbba, Surya Nepal. 12-19 [doi]
- An Exploratory Analysis on Users' Contributions in Federated LearningJiyue Huang, Rania Talbi, Zilong Zhao, Sara Bouchenak, Lydia Y. Chen, Stefanie Roos. 20-29 [doi]
- Utility-Optimized Synthesis of Differentially Private Location TracesMehmet Emre Gursoy, Vivekanand Rajasekar, Ling Liu 0001. 30-39 [doi]
- Big Data Privacy Management: A Vision PaperXiaofeng Meng 0001, Xiaojian Zhang. 40-45 [doi]
- A Needle in a Haystack: Finding a Suitable Lightweight IoT Authentication Protocol and Improving Its UsabilityNan Li, Dongxi Liu, Surya Nepal, Guangyu Pei. 46-54 [doi]
- Towards IoT Security Automation and OrchestrationYifeng Zheng, Arindam Pal 0001, Sharif Abuadbba, Shiva Raj Pokhrel, Surya Nepal, Helge Janicke. 55-63 [doi]
- imdpGAN: Generating Private and Specific Data with Generative Adversarial NetworksSaurabh Gupta, Arun Balaji Buduru, Ponnurangam Kumaraguru. 64-72 [doi]
- BCB-X3DH: a Blockchain Based Improved Version of the Extended Triple Diffie-Hellman ProtocolArmando Ruggeri, Antonio Celesti, Maria Fazio, Antonino Galletta, Massimo Villari. 73-78 [doi]
- Handling Incomplete Information in Policy Evaluation using Attribute SimilaritySowmya Ravidas, Indrakshi Ray, Nicola Zannone. 79-88 [doi]
- Requirements and Challenges for Secure and Trustworthy UAS CollaborationMarco Anisetti, Claudio Agostino Ardagna, Barbara Carminati, Elena Ferrari, Cora Lisa Perner. 89-98 [doi]
- MultiModal Deception Detection: Accuracy, Applicability and GeneralizabilityVibha Belavadi, Yan Zhou, Jonathan Z. Bakdash, Murat Kantarcioglu, Daniel C. Krawczyk, Linda Nguyen, Jelena Rakic, Bhavani Thuriasingham. 99-106 [doi]
- Energy Attacks on Mobile DevicesAshish Kundu, Zhiqiang Lin, Joshua Hammond. 107-117 [doi]
- From Blue-Sky to Practical Adversarial LearningAminollah Khormali, Ahmed Abusnaina, Songqing Chen, DaeHun Nyang, David A. Mohaisen. 118-127 [doi]
- Quantum Adversarial Machine Learning: Status, Challenges and PerspectivesDeMarcus Edwards, Danda B. Rawat. 128-133 [doi]
- Privacy in the Era of 5G, IoT, Big Data and Machine LearningElisa Bertino. 134-137 [doi]
- A Framework for Privacy-Preserving Genomic Data Analysis Using Trusted Execution EnvironmentsAref Asvadishirehjini, Murat Kantarcioglu, Bradley A. Malin. 138-147 [doi]
- Convergent Access Control to Enable Secure Smart CommunitiesSmriti Bhatt, Ravi Sandhu. 148-156 [doi]
- Maintaining Privacy and Utility in IoT System AnalyticsDaniel Mossé, Henrique Pötter, Stephen Lee. 157-164 [doi]
- Towards Dynamic Access Control for PrivacyChinmay Kundu. 165-168 [doi]
- A Model for the Administration of Access Control in Software Defined Networking using Custom PermissionsAbdullah Al-Alaj, Ravi Sandhu, Ram Krishnan. 169-178 [doi]
- Role-Based Access Control Models for AndroidSamir Talegaon, Ram Krishnan. 179-188 [doi]
- AuthN-AuthZ: Integrated, User-Friendly and Privacy-Preserving Authentication and AuthorizationTyler Phillips, Xiaoyuan Yu, Brandon Haakenson, Shreya Goyal, Xukai Zou, Saptarshi Purkayastha, Huanmei Wu. 189-198 [doi]
- MAFIA: Multi-layered Architecture For IoT-based AuthenticationPranut Jain, Henrique Pötter, Adam J. Lee, Daniel Mossé. 199-208 [doi]
- A Survival Game Analysis to Personal Identity Protection StrategiesDavid Liau, Razieh Nokhbeh Zaeem, K. Suzanne Barber. 209-217 [doi]
- A Modern Implementation of System Call Sequence Based Host-based Intrusion Detection SystemsJeffrey Byrnes, Thomas Hoang, Nihal Nitin Mehta, Yuan Cheng. 218-225 [doi]
- Revisiting Secure Computation Using Functional Encryption: Opportunities and Research DirectionsRunhua Xu, James Joshi. 226-235 [doi]
- Adversarial Deception in Deep Learning: Analysis and MitigationWenqi Wei, Ling Liu, Margaret Loper, Ka Ho Chow, Mehmet Emre Gursoy, Stacey Truex, Yanzhao Wu. 236-245 [doi]
- MoNet: Impressionism As A Defense Against Adversarial ExamplesHuangyi Ge, Sze Yiu Chau, Ninghui Li. 246-255 [doi]
- Is Your Phone You? How Privacy Policies of Mobile Apps Allow the Use of Your Personally Identifiable InformationKai Chih Chang, Razieh Nokhbeh Zaeem, K. Suzanne Barber. 256-262 [doi]
- Adversarial Objectness Gradient Attacks in Real-time Object Detection SystemsKa Ho Chow, Ling Liu, Margaret Loper, Juhyun Bae, Mehmet Emre Gursoy, Stacey Truex, Wenqi Wei, Yanzhao Wu. 263-272 [doi]
- Physics Reasoning for Intrusion Detection in Industrial NetworksMohammad Yahya, Nasir Sharaf, Julian L. Rrushi, Ho Ming Tay, Bing Liu, Kai Xu. 273-283 [doi]
- Security-Aware Energy Management in CloudsJianzhou Mao, Ting Cao, Xiaopu Peng, Tathagata Bhattacharya, Wei-Shinn Ku, Xiao Qin 0001. 284-293 [doi]
- StackVault: Protection from Untrusted FunctionsQi Zhang, Zehra Sura, Ashish Kundu, Gong Su, Arun Iyengar, Ling Liu. 294-306 [doi]
- Envisioning a Cyber-Security Incident Managed Campus EnvironmentSean S. E. Thorpe, Julian Jarrett, Tyrone Grandison. 307-309 [doi]
- Data Security and Malware Detection in Cloud Storage ServicesTing Cao, Jianzhou Mao, Tathagata Bhattacharya, Xiaopu Peng, Wei-Shinn Ku, Xiao Qin 0001. 310-318 [doi]
- Toward Automated Enforcement of Cyber-Physical Security Requirements for Energy Delivery SystemsCarlos E. Rubio-Medrano, Ziming Zhao 0001, Gail-Joon Ahn. 319-322 [doi]