The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "IWSPA@CODASPY"( http://dblp.L3S.de/Venues/IWSPA@CODASPY )

URL (DBLP): http://dblp.uni-trier.de/db/conf/codaspy

Publication years (Num. hits)
2015-2016 (24) 2017-2018 (23) 2020-2021 (23) 2022-2023 (27)
Publication types (Num. hits)
inproceedings(89) proceedings(8)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 97 publication records. Showing 97 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Kenta Kitamura, Mhd Irvan, Rie Shigetomi Yamaguchi Disclosure of Multiple "Patient Characteristics" Format Statistics leaks Quasi-identifier Linkage. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Prajwal Panzade, Daniel Takabi FENet: Privacy-preserving Neural Network Training with Functional Encryption. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Jeremy McHatton, Kambiz Ghazinour Mitigating Social Media Privacy Concerns - A Comprehensive Study. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Parisa Rezaee Borj, Kiran B. Raja, Patrick Bours Detecting Online Grooming By Simple Contrastive Chat Embeddings. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Parisa Mehdi Gholampour, Rakesh M. Verma Adversarial Robustness of Phishing Email Detection Models. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Oluwaseun Adegbehingbe, James H. Jones Improving Application Artifact Inference Using Matched Sector Adjacency Weighting. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Maryam Mohammadi, Farida Sabry, Wadha Labda, Qutaibah M. Malluhi Privacy-preserving Deep-learning Models for Fingerprint Data using Differential Privacy. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Md. Shohel Rana, Andrew H. Sung Deepfake Detection: A Tutorial. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Tushar Gupta, Shamik Sural Ontology-based Evaluation of ABAC Policies for Inter-Organizational Resource Sharing. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Musa Ibrahim Bello, Daniel R. Thomas Curbing Ghost Worker Fraud In Developing Countries Using Consortium Blockchain. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1David Banks Adversarial Risk Analysis. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1David J. Marchette, Andrew H. Sung, Rakesh M. Verma (eds.) Proceedings of the 9th ACM International Workshop on Security and Privacy Analytics, IWSPA@CODASPY 2023, Charlotte, NC, USA, 26 April 2023. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Kaisei Kajita, Keita Emura, Kazuto Ogawa, Ryo Nojima, Go Ohtake Continuous Group Key Agreement with Flexible Authorization and Its Applications. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Buse Gul Atli Tekgul, N. Asokan On the Effectiveness of Dataset Watermarking. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Tran Van Sang, Tran Phuong Thao, Rie Shigetomi Yamaguchi, Toshiyuki Nakata 0001 Enhancing Boundary Attack in Adversarial Image Using Square Random Constraint. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Hassan Wasswa, Abdul Serwadda The Proof is in the Glare: On the Privacy Risk Posed by Eyeglasses in Video Calls. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Louise Halvorsen, Siv L. Steffensen, Willard Rafnsson, Oksana Kulyk, Raúl Pardo How Attacker Knowledge Affects Privacy Risks: An Analysis Using Probabilistic Programming. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Daniel N. Jones Shadows Behind the Keyboard: Dark Personalities and Deception in Cyberattacks. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Anantaa Kotal, Aritran Piplai, Sai Sree Laya Chukkapalli, Anupam Joshi PriveTAB: Secure and Privacy-Preserving sharing of Tabular Data. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Nitesh Suresh Sehwani No Features Needed: Using BPE Sequence Embeddings for Web Log Anomaly Detection. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Suku Nair SDP Based Zero-Trust Architectures. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Sam Dawson, Mark Batty Chronos vs. Chaos: Timing Weak Memory Executions in the Linux Kernel. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Sander Joos, Tim Van hamme, Davy Preuveneers, Wouter Joosen Adversarial Robustness is Not Enough: Practical Limitations for Securing Facial Authentication. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Omid Madani, Sai Ankith Averineni, Shashidhar Gandham A Dataset of Networks of Computing Hosts. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Florian Nuding, Rudolf Mayer Data Poisoning in Sequential and Parallel Federated Learning. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Andrew H. Sung, Rakesh M. Verma, Roland H. C. Yap (eds.) IWSPA@CODASPY 2022: Proceedings of the 2022 ACM on International Workshop on Security and Privacy Analytics, Baltimore, MD, USA, April 27, 2022 Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Aleksandar Jankovic, Rudolf Mayer An Empirical Evaluation of Adversarial Examples Defences, Combinations and Robustness Scores. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Brian Krupp, Emily Timko, Kyle Cox, William Hicks, Malik Bursey, Christopher Banfield EMPAware: Analyzing Changes in User Perceptions of Mobile Privacy on iOS with Enhanced Awareness. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Masoumeh Abolfathi, Zohreh Raghebi, Jafar Haadi Jafarian, Farnoush Banaei Kashani A Scalable Role Mining Approach for Large Organizations. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Ismat Jarin, Birhanu Eshete PRICURE: Privacy-Preserving Collaborative Inference in a Multi-Party Setting. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Peter Jachim, Filipo Sharevski, Emma Pieroni TrollHunter2020: Real-time Detection of Trolling Narratives on Twitter During the 2020 U.S. Elections. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Qingzhong Liu, Naciye Celebi Large Feature Mining and Deep Learning in Multimedia Forensics. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Chilukuri K. Mohan, Andrew H. Sung (eds.) IWSPA@CODASPY 2021: ACM Workshop on Security and Privacy Analytics, Virtual Event, USA, April 28, 2021 Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Rofaida Khemaissia, Makhlouf Derdour, Ala Djeddai, Mohamed Amine Ferrag SDGchain: When Service Dependency Graph Meets Blockchain to Enhance Privacy. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Ali Derakhshan, Ian G. Harris, Mitra Behzadi Detecting Telephone-based Social Engineering Attacks using Scam Signatures. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Sébastien Canard, Nicolas Desmoulins, Sébastien Hallay, Adel Hamdi, Dominique Le Hello WeStat: a Privacy-Preserving Mobile Data Usage Statistics System. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Partha Pratim Kundu, Lux Anatharaman, Tram Truong-Huu An Empirical Evaluation of Automated Machine Learning Techniques for Malware Detection. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Ian M. Molloy, Josyula R. Rao, Marc Ph. Stoecklin AI vs. AI: Exploring the Intersections of AI and Cybersecurity. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Susan Jeziorowski, Muhammad Ismail 0001, Ambareen Siraj Towards Image-Based Dark Vendor Profiling: An Analysis of Image Metadata and Image Hashing in Dark Web Marketplaces. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Rakesh M. Verma, Latifur Khan, Chilukuri K. Mohan (eds.) IWSPA@CODASPY '20: Proceedings ofthe Sixth International Workshop on Security and Privacy Analytics, New Orleans, LA, USA, March 18, 2020 Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Huajie Chen, Ali Burak Ünal, Mete Akgün, Nico Pfeifer Privacy-preserving SVM on Outsourced Genomic Data via Secure Multi-party Computation. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Sharad Mehrotra, Shantanu Sharma 0001 Recent Advances in Information-Theoretically Secure Data Outsourcing. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Aunshul Rege, Shanchieh Jay Yang, Alyssa Mendlein, Katorah Williams, Shao-Hsusan Su, Stephen Moskal Dissecting Cyberadversarial Intrusion Stages via Interdisciplinary Observations. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Wyatt Dorris, Ruijia (Roger) Hu, Nishant Vishwamitra, Feng Luo 0001, Matthew Costello Towards Automatic Detection and Explanation of Hate Speech and Offensive Language. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Victor Zeng, Shahryar Baki, Ayman El Aassal, Rakesh M. Verma, Luis Felipe Teixeira De Moraes, Avisha Das Diverse Datasets and a Customizable Benchmarking Framework for Phishing. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ahmed Aleroud, George Karabatis Bypassing Detection of URL-based Phishing Attacks Using Generative Adversarial Deep Neural Networks. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Daniel Lee, Rakesh M. Verma Adversarial Machine Learning for Text. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Hao Liu, Boyang Wang Mitigating File-Injection Attacks with Natural Language Processing. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Anoop Singhal Security Metrics and Risk Analysis for Enterprise Systems. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Qingtian Zou, Anoop Singhal, Xiaoyan Sun 0003, Peng Liu 0005 Automatic Recognition of Advanced Persistent Threat Tactics for Enterprise Security. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Hoi Le, Reihaneh Safavi-Naini On De-anonymization of Single Tweet Messages. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Tahrima Mustafa, Richard Matovu, Abdul Serwadda, Nicholas Muirhead Unsure How to Authenticate on Your VR Headset?: Come on, Use Your Head! Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Rakesh M. Verma Security Analytics: Adapting Data Science for Security Challenges. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Abhiram Kothapalli, Robert Mitchell 0001 Regex-Based Linkography Abstraction Refinement for Information Security. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Boris Chernis, Rakesh M. Verma Machine Learning Methods for Software Vulnerability Detection. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Balamurugan Anandan, Chris Clifton Differentially Private Feature Selection for Data Mining. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Inigo Incer, Michael Theodorides, Sadia Afroz 0001, David A. Wagner 0001 Adversarially Robust Malware Detection Using Monotonic Classification. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Rakesh M. Verma, Murat Kantarcioglu (eds.) Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics, IWSPA@CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018 Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2018 DBLP  BibTeX  RDF
1Welderufael B. Tesfay, Peter Hofmann, Toru Nakamura, Shinsaku Kiyomoto, Jetzabel M. Serna PrivacyGuide: Towards an Implementation of the EU GDPR on Internet Privacy Policy Evaluation. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Latifur Khan Big IoT Data Stream Analytics with Issues in Privacy and Security. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ninghui Li Differential Privacy in the Local Setting. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Brian Thompson, Richard E. Harang Identifying Key Cyber-Physical Terrain. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kyrre Wahl Kongsgård, Nils Agne Nordbotten, Federico Mancini 0001, Paal E. Engelstad An Internal/Insider Threat Score for Data Loss Prevention and Detection. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mohammed K. Alzaylaee, Suleiman Y. Yerima, Sakir Sezer EMULATOR vs REAL PHONE: Android Malware Detection Using Machine Learning. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Cody Burkard, Brent Lagesse Analysis of Causative Attacks against SVMs Learning from Data Streams. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Rakesh M. Verma, Bhavani Thuraisingham (eds.) Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics, IWSPA@CODASPY 2017, Scottsdale, Arizona, USA, March 24, 2017 Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Z. Berkay Celik, Patrick D. McDaniel, Rauf Izmailov Feature Cultivation in Privileged Information-augmented Detection. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shambhu J. Upadhyaya Continuous Authentication Using Behavioral Biometrics. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hemank Lamba, Thomas J. Glazier, Javier Cámara, Bradley R. Schmerl, David Garlan, Jürgen Pfeffer Model-based Cluster Analysis for Identifying Suspicious Activity Sequences in Software. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Benjamin L. Bullough, Anna K. Yanchenko, Christopher L. Smith, Joseph R. Zipkin Predicting Exploitation of Disclosed Software Vulnerabilities Using Open-source Data. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nishant Vishwamitra, Xiang Zhang, Jonathan Tong, Hongxin Hu, Feng Luo 0001, Robin M. Kowalski, Joseph P. Mazer MCDefender: Toward Effective Cyberbullying Defense in Mobile Online Social Networks. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mohammad Alaggan, Mathieu Cunche, Marine Minier Non-interactive (t, n)-Incidence Counting from Differentially Private Indicator Vectors. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Rakesh M. Verma, Avisha Das What's in a URL: Fast Feature Extraction and Malicious URL Detection. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Vlad Bulakh, Minaxi Gupta Countering Phishing from Brands' Vantage Point. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Carl E. Landwehr How Can We Enable Privacy in an Age of Big Data Analytics? Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sana Siddiqui, Muhammad Salman Khan, Ken Ferens, Witold Kinsner Detecting Advanced Persistent Threats using Fractal Dimension based Machine Learning Classification. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Rakesh M. Verma, Michaël Rusinowitch (eds.) Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, IWSPA@CODASPY 2016, New Orleans, LA, USA, March 11, 2016 Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2016 DBLP  BibTeX  RDF
1Vimalkumar Jeyakumar, Omid Madani, Ali ParandehGheibi, Navindra Yadav Data Driven Data Center Network Security. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Marko Dimjasevic, Simone Atzeni, Ivo Ugrina, Zvonimir Rakamaric Evaluation of Android Malware Detection Based on System Calls. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yuta Ishii, Takuya Watanabe 0001, Mitsuaki Akiyama, Tatsuya Mori Clone or Relative?: Understanding the Origins of Similar Android Apps. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Andrew J. Kaizer, Minaxi Gupta Towards Automatic Identification of JavaScript-oriented Machine-Based Tracking. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Swapna Vemparala, Fabio Di Troia, Corrado Aaron Visaggio, Thomas H. Austin, Mark Stamp 0001 Malware Detection Using Dynamic Birthmarks. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Gerardo Canfora, Eric Medvet, Francesco Mercaldo, Corrado Aaron Visaggio Acquiring and Analyzing App Metrics for Effective Mobile Malware Detection. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Nikitha Ganesh, Fabio Di Troia, Corrado Aaron Visaggio, Thomas H. Austin, Mark Stamp 0001 Static Analysis of Malicious Java Applets. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1J. Doug Tygar Security Analytics in the Context of Adversarial Machine Learning. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Xue Zhu, Yuqing Sun 0001 Differential Privacy for Collaborative Filtering Recommender Algorithm. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kyle A. Caudle, Christer Karlsson, Larry D. Pyeatt Using Density Estimation to Detect Computer Intrusions. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Wenyaw Chan, George Cybenko, Murat Kantarcioglu, Ernst L. Leiss, Thamar Solorio, Bhavani Thuraisingham, Rakesh M. Verma Panel: Essential Data Analytics Knowledge forCyber-security Professionals and Students. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hao Zhang 0023, Maoyuan Sun, Danfeng (Daphne) Yao, Chris North 0001 Visualizing Traffic Causality for Analyzing Network Anomalies. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Shobhit S. Shakya, Jian Zhang 0004 Towards Better Semi-Supervised Classification of Malicious Software. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1George Cybenko Deep Learning of Behaviors for Security. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Alaa Darabseh, Akbar Siami Namin Keystroke Active Authentications Based on Most Frequently Used Words. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Zhentan Feng, Shuguang Xiong, Deqiang Cao, Xiaolu Deng, Xin Wang, Yang Yang, Xiaobo Zhou, Yan Huang, Guangzhu Wu HRS: A Hybrid Framework for Malware Detection. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yang Liu 0018, Jing Zhang 0027, Armin Sarabi, Mingyan Liu, Manish Karir, Michael D. Bailey Predicting Cyber Security Incidents Using Feature-Based Characterization of Network-Level Malicious Activities. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Nasir D. Memon Photo Forensics: There is More to a Picture Than Meets the Eye. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Stephen Huang, Rakesh M. Verma (eds.) Proceedings of the 2015 ACM International Workshop on International Workshop on Security and Privacy Analytics, IWSPA@CODASPY 2015, San Antonio, TX, USA, March 4, 2015 Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2015 DBLP  BibTeX  RDF
1Hassan Alizadeh, Samaneh Khoshrou, André Zúquete Application-Specific Traffic Anomaly Detection Using Universal Background Model. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #97 of 97 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license