Abstract is missing.
- Hardening the Internet of Things: Toward Designing Access Control For Resource Constrained IoT DevicesManuel Bessler, Paul Sangster, Radhika Upadrashta, Tj OConnor. 1-7  [doi]
- Accelerating Ransomware Defenses with Computational Storage Drive-Based API Call Sequence ClassificationKurt Friday, Elias Bou-Harb. 8-16  [doi]
- Measuring Cyber Essentials Security PoliciesSándor Bartha, Russell Ballantine, David Aspinall 0001. 17-26  [doi]
- Design and Implementation of a Coverage-Guided Ruby FuzzerMatt Schwager, Dominik Klemba, Josiah Dykstra. 27-33  [doi]
- Introducing a Comprehensive, Continuous, and Collaborative Survey of Intrusion Detection DatasetsPhilipp Bönninghausen, Rafael Uetz, Martin Henze. 34-40  [doi]
- Introducing a New Alert Data Set for Multi-Step Attack AnalysisMax Landauer, Florian Skopik, Markus Wurzenberger. 41-53  [doi]
- The attacks aren't alright: Large-Scale Simulation of Fake Base Station Attacks and DetectionsThijs Heijligenberg, David Rupprecht, Katharina Kohls. 54-64  [doi]
- GothX: a generator of customizable, legitimate and malicious IoT network trafficManuel Poisson, Rodrigo Matos Carnier, Kensuke Fukuda. 65-73  [doi]
- NERDS: A Non-invasive Environment for Remote Developer StudiesJoseph Lewis, Kelsey R. Fulton. 74-82  [doi]
- A Testbed for Operations in the Information EnvironmentAdam Tse, Swaroop Vattam, Vincent J. Ercolani, Douglas Stetson, Mary Ellen Zurko. 83-90  [doi]
- Towards a High Fidelity Training Environment for Autonomous Cyber Defense AgentsSean Oesch, Amul Chaulagain, Brian Weber, Matthew Dixson, Amir Sadovnik, Benjamin Roberson, Cory L. Watson, Phillipe Austria. 91-99  [doi]
- COMEX: Deeply Observing Application Behavior on Real Android DevicesZeya Umayya, Dhruv Malik, Arpit Nandi, Akshat Kumar, Sareena Karapoola, Sambuddho Chakravarty. 100-109  [doi]