Abstract is missing.
- Building Trust in Container EnvironmentYunlong Guo, Aimin Yu, Xiaoli Gong, Lixin Zhao, Lijun Cai, Dan Meng. 1-9 [doi]
- Trustworthy Privacy-Preserving Service CompositionsKevin Theuermann. 10-17 [doi]
- A Unified Measurable Software Trustworthy Model Based on Vulnerability Loss Speed IndexGul Jabeen, Luo Ping. 18-25 [doi]
- MicroTEE: Designing TEE OS Based on the Microkernel ArchitectureDongxu Ji, Qianying Zhang, Shijun Zhao, Zhiping Shi, Yong Guan. 26-33 [doi]
- Trust and Reputation in Vehicular Networks: A Smart Contract-Based ApproachNisha Malik, Priyadarsi Nanda, Xiangjian He, Ren Ping Liu. 34-41 [doi]
- Optimal File Dissemination Scheduling Under a General Binary Tree of Trust RelationshipYun-Ping Tien, Wei-Chen Lin, Jan-Ming Ho, Wing-Kai Hon. 42-49 [doi]
- Horcruxes for Everyone - A Framework for Key-Loss Recovery by Splitting TrustFelix Hörandner, Christof Rabensteiner. 50-57 [doi]
- HyperMI: A Privilege-level VM Protection Approach against Compromised HypervisorKunli Lin, Wenqing Liu, Kun Zhang, Bibo Tu. 58-65 [doi]
- The Deviation Attack: A Novel Denial-of-Service Attack Against IKEv2Tristan Ninet, Axel Legay, Romaric Maillard, Louis-Marie Traonouez, Olivier Zendra. 66-74 [doi]
- A Survey of Research on CAPTCHA Designing and Breaking TechniquesYang Zhang, Haichang Gao, Ge Pei, Sainan Luo, Guoqin Chang, Nuo Cheng. 75-84 [doi]
- AVOCAD: Adaptive Terrorist Comms Surveillance and Interception using Machine LearningOmaru Maruatona, Ahmad Azab, Paul A. Watters. 85-94 [doi]
- Malware Detection with Malware Images using Deep Learning TechniquesKe He, Dong Seong Kim. 95-102 [doi]
- IoT Device Identification via Network-Flow Based Fingerprinting and LearningSalma Abdalla Hamad, Wei Emma Zhang, Quan Z. Sheng, Surya Nepal. 103-111 [doi]
- Phishing URL Detection via CNN and Attention-Based Hierarchical RNNYongjie Huang, Qiping Yang, Jinghui Qin, Wushao Wen. 112-119 [doi]
- STDeepGraph: Spatial-Temporal Deep Learning on Communication Graphs for Long-Term Network Attack DetectionYepeng Yao, Liya Su, Zhigang Lu, Baoxu Liu. 120-127 [doi]
- Continuous Authentication of Embedded SoftwareKarl Ott, Rabi Mahapatra. 128-135 [doi]
- CCGA: Clustering and Capturing Group Activities for DGA-Based Botnets DetectionZhicheng Liu, Xiaochun Yun, Yongzheng Zhang, Yipeng Wang. 136-143 [doi]
- Real-Time Detection of Malware Activities by Analyzing Darknet Traffic Using Graphical LassoChansu Han, Jumpei Shimamura, Takeshi Takahashi 0001, Daisuke Inoue, Masanori Kawakita, Jun'ichi Takeuchi, Koji Nakao. 144-151 [doi]
- A Worst-Case Entropy Estimation of Oscillator-Based Entropy Sources: When the Adversaries Have Access to the History OutputsShaofeng Zhu, Hua Chen, Wei Xi, MeiHui Chen, Limin Fan, Dengguo Feng. 152-159 [doi]
- Power-Grid Controller Anomaly Detection with Enhanced Temporal Deep LearningZecheng He, Aswin Raghavan, Guangyuan Hu, Sek M. Chai, Ruby B. Lee. 160-167 [doi]
- When are Opaque Predicates Useful?Lukas Zobernig, Steven D. Galbraith, Giovanni Russello. 168-175 [doi]
- An Ant Colony Algorithm Based Content Poisoning Mitigation in Named Data NetworkingWenjing Cui, Yang Li, Yan Zhang, Chang Liu, Mengqi Zhan. 176-183 [doi]
- A Heuristic Method for Network Modification Against Cyber Epidemic AttacksDingyu Yan, Feng Liu 0001. 184-191 [doi]
- Tracking Sensitive Information and Operations in Integrated Clinical EnvironmentZhangtan Li, Liang Cheng 0004, Yang Zhang. 192-199 [doi]
- Distributed Quantitative Information Flow Evaluation for Service Composition in CloudsNing Xi 0002, Cong Sun 0001, Jianfeng Ma, Jing Lv. 200-207 [doi]
- A Topic-Based Unsupervised Learning Approach for Online Underground Market ExplorationShin-Ying Huang, Tao Ban. 208-215 [doi]
- The Weakest Link of Certificate Transparency: Exploring the TLS/HTTPS Configurations of Third-Party MonitorsBingyu Li, Dawei Chu, Jingqiang Lin, Quanwei Cai 0001, Congli Wang, Lingjia Meng. 216-223 [doi]
- Hybrid Logical Clocks for Database Forensics: Filling the Gap between Chain of Custody and Database AuditingDenys A. Flores, Arshad Jhumka. 224-231 [doi]
- MURITE-Detector: Identifying User-Role in Information Theft Events of Mobile NetworkZhenyu Cheng, Xunxun Chen, Yongzheng Zhang 0002, Shuhao Li, Jian Xu 0010. 232-239 [doi]
- AIMED: Evolving Malware with Genetic Programming to Evade DetectionRaphael Labaca Castro, Corinna Schmitt, Gabi Dreo. 240-247 [doi]
- FIoT: Detecting the Memory Corruption in Lightweight IoT Device FirmwareLipeng Zhu, Xiaotong Fu, Yao Yao, Yuqing Zhang, He Wang. 248-255 [doi]
- A Signature-Based Assistant Random Oversampling Method for Malware DetectionYing Pang, Zhenxiang Chen, Lizhi Peng, Kun Ma, Chuan Zhao, Ke-ji. 256-263 [doi]
- A Security Framework for IoT Authentication and Authorization Based on Blockchain TechnologyM. A. Rashid, Houshyar Honar Pajooh. 264-271 [doi]
- Selective Adversarial Learning for Mobile MalwareMahbub E. Khoda, Tasadduq Imam, Joarder Kamruzzaman, Iqbal Gondal, Ashfaqur Rahman. 272-279 [doi]
- Credit Card Fraud Detection in E-CommerceUtkarsh Porwal, Smruthi Mukund. 280-287 [doi]
- Security and Performance Assessment of IP Multiplexing Moving Target Defence in Software Defined NetworksCole Dishington, Dilli P. Sharma, Dong Seong Kim, Jin-Hee Cho, Terrence J. Moore, Frederica F. Nelson. 288-295 [doi]
- Deep Android Malware Classification with API-Based Feature GraphNa Huang, Ming Xu, Ning Zheng 0001, Tong Qiao, Kim-Kwang Raymond Choo. 296-303 [doi]
- Context-Aware Authentication Using Co-Located DevicesHidehito Gomi, Shuji Yamaguchi, Wataru Ogami, Teruhiko Teraoka, Tatsuru Higurashi. 304-311 [doi]
- Understanding the Influence of Graph Kernels on Deep Learning Architecture: A Case Study of Flow-Based Network Attack DetectionLiya Su, Yepeng Yao, Zhigang Lu, Baoxu Liu. 312-318 [doi]
- Thermal Covert Channels Leveraging Package-on-Package DRAMShuai Chen, Wenjie Xiong 0001, Yehan Xu, Bing Li, Jakub Szefer. 319-326 [doi]
- Continuous Authorization in Subject-Driven Data Sharing Using Wearable DevicesMohammad Jabed Morshed Chowdhury, Alan Colman, Muhammad Ashad Kabir, Jun Han 0004, Paul Sarda. 327-333 [doi]
- A Secure User-Centric Framework for Dynamic Service Provisioning in IoT EnvironmentsAmartya Sen, Kenneth Fletcher, Sanjay Madria. 334-341 [doi]
- Laughter in the Wild: A Study Into DoS Vulnerabilities in YAML LibrariesShawn Rasheed, Jens Dietrich 0001, Amjed Tahir. 342-349 [doi]
- HSDC-Net: Secure Anonymous Messaging in Online Social NetworksMohammad Reza Nosouhi, Shui Yu, Keshav Sood, Marthie Grobler. 350-357 [doi]
- Automatic Anonymization of Textual Documents: Detecting Sensitive Information via Word EmbeddingsFadi Hassan, David Sánchez 0001, Jordi Soria-Comas, Josep Domingo-Ferrer. 358-365 [doi]
- A Generic Information and Consent Framework for the IoTVictor Morel, Mathieu Cunche, Daniel Le Métayer. 366-373 [doi]
- Poisoning Attack in Federated Learning using Generative Adversarial NetsJiale Zhang, Junjun Chen, Di Wu, Bing Chen, Shui Yu. 374-380 [doi]
- Trustworthy Distributed Computations on Personal Data Using Trusted Execution EnvironmentsRiad Ladjel, Nicolas Anciaux, Philippe Pucheral, Guillaume Scerri. 381-388 [doi]
- Privacy-Preserving Outsourcing Computation of QR Decomposition in the Encrypted DomainYonghong Zhang, Peijia Zheng, Weiqi Luo. 389-396 [doi]
- A Robust Watermarking Scheme for Encrypted JPEG Bitstreams with Format-Compliant EncryptionWenhao Chen, Bohang Zeng, Peijia Zheng. 397-403 [doi]
- Evolved Similarity Techniques in Malware AnalysisPaul Black, Iqbal Gondal, Peter Vamplew 0001, Arun Lakhotia. 404-410 [doi]
- A Robust and Reversible Watermarking Technique for Relational Dataset Based on ClusteringHeyan Chai, Shuqiang Yang, Zoe L. Jiang, Xuan Wang 0002. 411-418 [doi]
- TRIM, Wear Levelling and Garbage Collection on Solid State Drives: A Prediction Model for Forensic InvestigatorsAlastair Nisbet, Rijo Jacob. 419-426 [doi]
- TwinPorter - An Architecture For Enabling the Live Migration of VMI-Based Monitored Virtual MachinesBenjamin Taubmann, Alexander Böhm 0004, Hans P. Reiser. 427-434 [doi]
- Defeating Fake Food Labels Using Watermarking and Biosequence AnalysisVijay Naidu, Manoranjan Mohanty. 435-441 [doi]
- Finding Rats in Cats: Detecting Stealthy Attacks using Group Anomaly DetectionAditya Kuppa, Slawomir Grzonkowski, Muhammad Rizwan Asghar, Nhien-An Le-Khac. 442-449 [doi]
- Learning Wear Patterns on Footwear Outsoles Using Convolutional Neural NetworksXavier Francis, Hamid R. Sharifzadeh, Angus Newton, Nilufar Baghaei, Soheil Varastehpour. 450-457 [doi]
- Anomaly Detection in Network Traffic Using Dynamic Graph Mining with a Sparse AutoencoderGuanbo Jia, Paul Miller, Xin Hong, Harsha Kalutarage, Tao Ban. 458-465 [doi]
- Characterizing the Limitations of Forensic Event Reconstruction Based on Log FilesTobias Latzo, Felix C. Freiling. 466-475 [doi]
- Framework for the Retrieval of Social Media and Instant Messaging Evidence from Volatile MemoryRanul Deelaka Thantilage, Nhien-An Le-Khac. 476-482 [doi]
- PURE: Generating Quality Threat Intelligence by Clustering and Correlating OSINTRui Azevedo, Ibéria Medeiros, Alysson Bessani. 483-490 [doi]
- AgentChain: A Decentralized Cross-Chain Exchange SystemDawei Li, Jianwei Liu 0001, Zongxun Tang, Qianhong Wu, Zhenyu Guan. 491-498 [doi]
- An Adaptive Physical Layer Key Extraction Scheme for Smart HomesHong Zhao, Yuexin Zhang, Xinyi Huang, Yang Xiang 0001. 499-506 [doi]
- Evaluating DAG-Based Blockchains for IoTLiangrong Zhao, Jiangshan Yu. 507-513 [doi]
- Making Monero Hard-to-Trace and More EfficientQingyi Liu, Zhen Liu, Yu Long, Zhiqiang Liu, Zhimei Sui, Shifeng Sun, Shuyang Tang, Dawu Gu. 514-521 [doi]
- PIT: A Probe Into Internet of Things by Comprehensive Security AnalysisVinay Sachidananda, Suhas Bhairav, Nirnay Ghosh, Yuval Elovici. 522-529 [doi]
- A Probability Prediction Based Mutable Control-Flow Attestation Scheme on Embedded PlatformsJianxing Hu, Dongdong Huo, Meilin Wang, Yazhe Wang, Yan Zhang, Yu Li. 530-537 [doi]
- A Secure and Practical Blockchain Scheme for IoTHongyang Liu, Feng Shen, Zhiqiang Liu, Yu Long, Zhen Liu, Shifeng Sun, Shuyang Tang, Dawu Gu. 538-545 [doi]
- A Typo-Tolerant Password Authentication Scheme with Targeted Error CorrectionXin Chen, Xinyi Huang, Yi Mu 0001, Ding Wang 0002. 546-553 [doi]
- A Correctable Public BlockchainAlexander Marsalek, Thomas Zefferer. 554-561 [doi]
- A Logic for Secure Stratified Systems and its Application to Containerized SystemsHagen Lauer, Amin Sakzad, Carsten Rudolph, Surya Nepal. 562-569 [doi]
- A Secure Decentralized Trustless E-Voting System Based on Smart ContractJiazhuo Lyu, Zoe L. Jiang, Xuan Wang, Zhenhao Nong, Man Ho Au, Junbin Fang. 570-577 [doi]
- (Linkable) Ring Signature from Hash-Then-One-Way SignatureXingye Lu, Man Ho Au, Zhenfei Zhang. 578-585 [doi]
- Constructing Strong Designated Verifier Signatures from Key Encapsulation MechanismsBorui Gong, Man Ho Au, Haiyang Xue. 586-593 [doi]
- MedBloc: A Blockchain-Based Secure EHR System for Sharing and Accessing Medical DataJack Huang, Yuan Wei Qi, Muhammad Rizwan Asghar, Andrew Meads, Yu-Cheng Tu 0001. 594-601 [doi]
- CloudSafe: A Tool for an Automated Security Analysis for Cloud ComputingSeongMo An, Taehoon Eom, Jong Sou Park, Jin Bum Hong, Armstrong Nhlabatsi, Noora Fetais, Khaled M. Khan, Dong Seong Kim. 602-609 [doi]
- Security and Performance Modeling and Optimization for Software Defined NetworkingTaehoon Eom, Jin Bum Hong, SeongMo An, Jong Sou Park, Dong Seong Kim. 610-617 [doi]
- A Dynamic Access Control Policy Model for Sharing of Healthcare Data in Multiple DomainsAhmad Salehi Shahraki, Carsten Rudolph, Marthie Grobler. 618-625 [doi]
- Tackling Data Inefficiency: Compressing the Bitcoin BlockchainAlexander Marsalek, Thomas Zefferer, Edona Fasllija, Dominik Ziegler. 626-633 [doi]
- Identifying High Value Users in Twitter Based on Text Mining ApproachesYibing Yang, M. Omair Shafiq. 634-641 [doi]
- A Secure Private Charging Pile Sharing Scheme with Electric Vehicles in Energy BlockchainYuntao Wang, Zhou Su, Kuan Zhang. 648-654 [doi]
- An Object-Pair Driven Approach for Top-k mCK Query Problem by Using Hilbert R-TreeYuan Qiu, Xinhong Hei 0001, Tadashi Ohmori, Hideyuki Fujita. 655-661 [doi]
- Feature Extraction Optimization for Bitstream Communication Protocol Format Reverse AnalysisXinhong Hei 0001, Binbin Bai, Yichuan Wang, Li Zhang, Lei Zhu, Wenjiang Ji. 662-669 [doi]
- Diffusion Convolutional Recurrent Neural Network with Rank Influence Learning for Traffic ForecastingYujun Huang, Yunpeng Weng, Shuai Yu, Xu Chen. 678-685 [doi]
- A Remaining Useful Life Prediction Method with Automatic Feature Extraction for Aircraft EnginesKunyuan Deng, Xiaoyong Zhang, Yijun Cheng, Zhiyong Zheng, Fu Jiang, Weirong Liu 0001, Jun Peng 0001. 686-692 [doi]
- A Differential Privacy-Based Protecting Data Preprocessing Method for Big Data MiningRan Mo, Jianfeng Liu, Wentao Yu, Fu Jiang, Xin Gu, Xiaoshuai Zhao, Weirong Liu 0001, Jun Peng 0001. 693-699 [doi]
- A Cooperative Edge Computing Scheme for Reducing the Cost of Transferring Big Data in 5G NetworksBo Yin, Yu Cheng, Lin X. Cai, Xianghui Cao. 700-706 [doi]
- Lightweight Deep Learning Model For Facial Expression RecognitionLaha Ale, Xiaojie Fang, Dajiang Chen, Ye Wang, Ning Zhang 0007. 707-712 [doi]
- Access Control Architecture for Smart City IoT PlatformTakayuki Sasaki, Yusuke Morita, Astha Jada. 717-722 [doi]
- A LSTM-Based Method for Comprehension and Evaluation of Network Security SituationShixuan Li, Dongmei Zhao. 723-728 [doi]
- Uncertainty-Aware Resource Provisioning for Workflow Scheduling in Edge Computing EnvironmentHao Cao, Xiaolong Xu, Qingxiang Liu, Yuan Xue, Lianyong Qi. 734-739 [doi]
- Accuracy-Aware Service Recommendation with PrivacyXiaoxiao Chi, Chao Yan, Huaizhen Kou, Lianyong Qi. 740-745 [doi]
- Mutual Information on Tensors for Measuring the Nonlinear Correlations in Network SecurityLiangfu Lu, Xiaohan Ren, Chenming Cui, Yun Luo, Yongheng Jia, Yinong Xu. 746-750 [doi]
- One-Shot Malware Outbreak Detection using Spatio-Temporal Isomorphic Dynamic FeaturesIqbal Gondal, Joarder Kamruzzaman, Leo Zhang. 751-756 [doi]
- A Multi-channel Visualization Method for Malware Classification Based on Deep LearningYanchen Qiao, Qingshan Jiang, Zhenchao Jiang, Liang Gu. 757-762 [doi]
- Privacy and Security Analysis of PACE GM ProtocolMiroslaw Kutylowski, Przemyslaw Kubiak. 763-768 [doi]
- Automatic Device Selection and Access Policy Generation Based on User Preference for IoT Activity WorkflowMohammed Al-Shaboti, Aaron Chen, Ian Welch. 769-774 [doi]
- Measuring Trustworthiness of IoT Image Sensor Data Using Other Sensors' Complementary Multimodal DataMohammad Manzurul Islam, Gour C. Karmakar, Joarder Kamruzzaman, M. Manzur Murshed. 775-780 [doi]
- Differentially Private Streaming to Untrusted Edge Servers in Intelligent Transportation SystemSoheila Ghane Ezabadi, Alireza Jolfaei, Lars Kulik, Ramamohanarao Kotagiri. 781-786 [doi]
- Trusted Autonomous Vehicle: Measuring Trust using On-Board Unit DataAbdullahi Chowdhury, Gour C. Karmakar, Joarder Kamruzzaman. 787-792 [doi]
- Secure Data Streaming to Untrusted Road Side Units in Intelligent Transportation SystemAlireza Jolfaei, Krishna Kant, Hassan Shafei. 793-798 [doi]
- Protecting Code Injection Attacks in Intelligent Transportation SystemHussein Alnabulsi, Md. Rafiqul Islam 0001. 799-806 [doi]
- Big Data Security Frameworks Meet the Intelligent Transportation Systems Trust ChallengesFeras M. Awaysheh, José Carlos Cabaleiro, Tomás Fernández Pena, Mamoun Alazab. 807-813 [doi]
- Common Security Criteria for Vehicular Clouds and Internet of Vehicles Evaluation and SelectionMohammad Aladwan, Feras M. Awaysheh, José Carlos Cabaleiro, Tomás F. Pena, Hamzeh Mohammad Alabool, Mamoun Alazab. 814-820 [doi]
- Joint RSS and CSI Based Access Point Authentication Scheme in WiFi Networks via XGBoostDi Wu 0004, Dali Zhu, YinLong Liu, Luping Ma. 821-826 [doi]
- Anonymous State Pinning for Private BlockchainsPeter Robinson, John Brainard. 827-834 [doi]
- Lock Picking in the Era of Internet of ThingsEdward Knight, Sam Lord, Budi Arief. 835-842 [doi]
- CHTDS: A CP-ABE Access Control Scheme Based on Hash Table and Data Segmentation in NDNZhijun Wu, Enzhong Xu, Liang Liu, Meng Yue. 843-848 [doi]
- On the Effectiveness of Electric Network Frequency (ENF) as a Source of RandomnessGirish Revadigar, Chitra Javali, Yang Li, Sreejaya Viswanathan. 849-854 [doi]