A semantic-aware log generation method for network activities Aun YichietYen-Min Jasmina KhawVasaki Ponnusamy Regular Contribution 11 April 2021 Pages: 161 - 177
Browser-in-the-Middle (BitM) attack Franco TommasiChristian CatalanoIvan Taurino regular contribution Open access 17 April 2021 Pages: 179 - 189
ISM-AC: an immune security model based on alert correlation and software-defined networking Roberto Vasconcelos MeloDouglas D. J. de MacedoMauricio Martinuzzi Fiorenza regular contribution 03 May 2021 Pages: 191 - 205
Authenticated logarithmic-order supersingular isogeny group key exchange Hector B. HougaardAtsuko Miyaji Regular Contribution 07 May 2021 Pages: 207 - 221
Machine learning approach to vulnerability detection in OAuth 2.0 authentication and authorization flow Kindson MunonyeMartinek Péter regular contribution Open access 13 May 2021 Pages: 223 - 237
Mitigating insider threat by profiling users based on mouse usage pattern: ensemble learning and frequency domain analysis Metehan YildirimEmin Anarim Regular contribution 20 May 2021 Pages: 239 - 251
Automated benchmark network diversification for realistic attack simulation with application to moving target defense Alexander BajicGeorg T. Becker Regular contribution Open access 31 May 2021 Pages: 253 - 278
Applying NLP techniques to malware detection in a practical environment Mamoru MimuraRyo Ito Regular contribution Open access 06 June 2021 Pages: 279 - 291
The Agent Web Model: modeling web hacking for reinforcement learning László ErdődiFabio Massimo Zennaro Regular contribution Open access 08 June 2021 Pages: 293 - 309
An SSH predictive model using machine learning with web proxy session logs Junwon LeeHeejo Lee regular contribution 11 June 2021 Pages: 311 - 322
Optimization of parallel firewalls filtering rules Taha Elamine HadjadjAdel BouhoulaRiadh Ksantini regular contribution 21 June 2021 Pages: 323 - 340
Topology-hiding garbled circuits without universal circuits Zheng ZhangShaohao XieFangguo Zhang Regular Contribution 26 June 2021 Pages: 341 - 356
A novel malicious remote administration tool using stealth and self-defense techniques Ioannis KazoleasPanagiotis Karampelas regular contribution 26 June 2021 Pages: 357 - 378
Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system Tahir AhmadUmberto MorelliNicola Zannone Regular contribution 02 July 2021 Pages: 379 - 408
Password guessers under a microscope: an in-depth analysis to inform deployments Zach ParishConnor CushingJulie Thorpe Regular contribution 23 August 2021 Pages: 409 - 425