Authors Paper
Edward Raff, Charles Nicholas and Mark McLean A New Burrows Wheeler Transform Markov Distance
Zheyuan Ryan Shi, Aaron Schlenker, Brian Hay, Daniel Bittleston, Siyu Gao, Emily Peterson, John Trezza and Fei Fang Draining the Water Hole: Mitigating Social Engineering Attacks with CyberTWEAK
Longshaokan Wang, Eric Laber, Yeng Saanchi and Sherrie Caltagirone Sex Trafficking Detection with Ordinal Regression Neural Networks
Lashon Booker and Scott Musman A Model-Based, Decision-Theoretic Perspective on Automated Cyber Response
Alejandro Acien, Aythami Morales, Julian Fierrez, Ruben Vera-Rodriguez and Ivan Bartolome Be-CAPTCHA: Detecting Human Behavior in Smartphone Interaction using Multiple Inbuilt Sensors
Yue Zhao, Xueying Ding, Jianing Yang and Haoping Bai SUOD: Toward Scalable Unsupervised Outlier Detection
Erisa Karafili, Valentine Delory and Emil Lupu Towards Cyber-Forensic Evidence Prioritisation using Bayesian Attack Graphs
Prithviraj Dasgupta, Joseph Collins and Michael McCarrick Playing to Learn Better: Repeated Games for Adversarial Learning with Multiple Classifiers
Shushan Arakelyan, Christophe Hauser, Erik Kline and Aram Galstyan Towards Learning Representations of Binary Executable Files for Security Tasks
Lu Chen and Wei Xu Attacking Optical Character Recognition (OCR) Systems with Adversarial Watermarks
Mu Zhu, Mohammad Miah, Nazia Sharmin, Iffat Anjum, Christopher Kiekintveld, William Enck and Munindar Singh Optimizing Vulnerability-Driven Honey Traffic Using Game Theory