Authors |
Paper |
Edward Raff, Charles Nicholas and Mark McLean |
A New Burrows Wheeler Transform Markov Distance |
Zheyuan Ryan Shi, Aaron Schlenker, Brian Hay, Daniel Bittleston, Siyu Gao, Emily Peterson, John Trezza and Fei Fang |
Draining the Water Hole: Mitigating Social Engineering Attacks with CyberTWEAK |
Longshaokan Wang, Eric Laber, Yeng Saanchi and Sherrie Caltagirone |
Sex Trafficking Detection with Ordinal Regression Neural Networks |
Lashon Booker and Scott Musman |
A Model-Based, Decision-Theoretic Perspective on Automated Cyber Response |
Alejandro Acien, Aythami Morales, Julian Fierrez, Ruben Vera-Rodriguez and Ivan Bartolome |
Be-CAPTCHA: Detecting Human Behavior in Smartphone Interaction using Multiple Inbuilt Sensors |
Yue Zhao, Xueying Ding, Jianing Yang and Haoping Bai |
SUOD: Toward Scalable Unsupervised Outlier Detection |
Erisa Karafili, Valentine Delory and Emil Lupu |
Towards Cyber-Forensic Evidence Prioritisation using Bayesian Attack Graphs |
Prithviraj Dasgupta, Joseph Collins and Michael McCarrick |
Playing to Learn Better: Repeated Games for Adversarial Learning with Multiple Classifiers |
Shushan Arakelyan, Christophe Hauser, Erik Kline and Aram Galstyan |
Towards Learning Representations of Binary Executable Files for Security Tasks |
Lu Chen and Wei Xu |
Attacking Optical Character Recognition (OCR) Systems with Adversarial Watermarks |
Mu Zhu, Mohammad Miah, Nazia Sharmin, Iffat Anjum, Christopher Kiekintveld, William Enck and Munindar Singh |
Optimizing Vulnerability-Driven Honey Traffic Using Game Theory |