Accepted Papers

Authors Title
Hossain Shahriar, Hao Zhang, Hossain Shahriar, Dan Lo, Kai Qian, Michael Whitman, Fan Wu Denial of Service Attack Detection Performance Comparison of Supervised Machine Learning Algorithms
Cheng Qian, Weichao Gao, William G. Hatcher, Weixian Liao, Chao Lu and Wei Yu Search Engine for Heterogeneous Internet of Things Systems and Optimization
Dr. P. Renee Carnley Mobile Identity, Credential, and Access Management (ICAM) Framework
Syed Wasif Abbas Hamdani DTMSim-IoT A Distributed Trust Management Simulator for IoT Networks
Edoardo Bompiani, Umberto Ferraro Petrillo, Giovanna Jona Lasinio, Francesco Palini High-Performance Computing with TeraStat
Zicong Zhu Enhancing A New Classification for IDN Homograph Attack Detection
Samaneh Mahdavifar, Andi Fitriah Abdul Kadir, Rasool Fatemi, Dima Alhadidi, Ali A. Ghorbani Dynamic Android Malware Category Classification Using Semi-Supervised Deep Learning
Martina Saletta, Claudio Ferretti A Neural Embedding for Source Code Security Analysis and CWE Lists
Loredana Caruccio, Ornella, Pizza, Giuseppe Polese, Genoveffa Tortora Enhancing IoT-based Critical Diagnosis in Emergency Rooms Through Intelligent Video Surveillance
Andrea F. Abate, Carmen Bisogni, Lucia Cascone, Aniello Castiglione, Gerardo Costabile, Ilenia Mercuri Social Robot Interactions for Social Engineering Opportunities and Open Issues
Md Safiur Rahman Mahdi Secure Count Query on Encrypted Heterogeneous Data
Anthony Melaragno Would an Object Representation Invariant Provide Sufficient State Based Knowledge to Adapt Network Intrusion Detection System Rules With Minimal Impact to System Resources
Zihan Wang Attention-based Bidirectional Long Short-Term Memory Networks for Relation Classification Using Knowledge Distillation from BERT
Zhanwen Chen A New Dynamic Conditional Proxy Broadcast Re-Encryption Scheme for Cloud Storage and Sharing
Alistair Robinson, F. Brown, N. Hall, A. Jackson, G. Kemp, M.Leeke CASTLEGUARD: Anonymised Data Streams with Guaranteed Differential Privacy
Syed Imran Akhtar Inter Cloud Interoperability Use Cases and Gaps in Corresponding Standards
Yasamin Alagrash, Haissam Badih and Julian Rrushi Malware Detection via Machine Learning and Recognition of Non-Stationary Tasks
Haissam Badih, Yasamin Alagrash, and Julian Rrushi A Blockchain and Defensive Deception Co-design for Webcam Spyware Detection
Andrea Francesco Abate, Lucia Cimmino, Fabio Narducci, Chiara Pero Biometric Face Recognition Based on Landmark Dynamics