The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
Issue No. 02 - Mar./Apr. (vol. 33)
ISSN: 1541-1672

Masthead (PDF)

pp. c2

Table of Contents (PDF)

pp. 1-2
Guest Editor Introduction

Introduction to the Special Issue on Data Mining for Cybersecurity (HTML)

Nathalie Japkowicz , American University
Yuval Elovici , Ben-Gurion University of the Negev
pp. 3-4
Data Mining for Cybersecurity

Real-Time Dynamic Network Anomaly Detection (Abstract)

Jordan Noble , Imperial College London
Niall Adams , Imperial College London
pp. 5-18

Adaptive Biometric Systems using Ensembles (HTML)

Paulo Henrique Pisani , University of São Paulo
Ana Carolina Lorena , Federal University of São Paulo
Andre C.P.L.F. de Carvalho , University of São Paulo
pp. 19-28

Predicting Adversarial Cyber-Intrusion Stages Using Autoregressive Neural Networks (Abstract)

Aunshul Rege , Temple University
Zoran Obradovic , Temple University
Nima Asadi , Temple University
Edward Parker , Temple University
Rohan Pandit , Temple University
Nicholas Masceri , Temple University
Brian Singer , Temple University
pp. 29-39

Transfer Learning for User Action Identication in Mobile Apps via Encrypted Trafc Analysis (Abstract)

Edita Grolman , Department of Software Information Systems Engineering, Ben-Gurion University of the Negev, Israel
Andrey Finkelshtein , Department of Software Information Systems Engineering, Ben-Gurion University of the Negev, Israel
Rami Puzis , Department of Software Information Systems Engineering, Ben-Gurion University of the Negev, Israel
Asaf Shabtai , Department of Software Information Systems Engineering, Ben-Gurion University of the Negev, Israel
Gershon Celniker , Verint Ltd., Israel
Ziv Katzir , Verint Ltd., Israel
Liron Rosenfeld , Verint Ltd., Israel
pp. 40-53

Probing the Limits of Anomaly Detectors for Automobiles with a Cyberattack Framework (Abstract)

Adrian Taylor , Defence R&D Canada, Ottawa, Ontario, Canada
Sylvain Leblanc , Royal Military College of Canada, Kingston, Ontario, Canada
Nathalie Japkowicz , American University, Washington, D.C., USA
pp. 54-62

Identifying SCADA Systems and Their Vulnerabilities on the Internet of Things: A Text-Mining Approach (Abstract)

Sagar Samtani , University of Arizona
Shuo Yu , University of Arizona
Hongyi Zhu , University of Arizona
Mark Patton , University of Arizona
John Matherly , Shodan
Hsinchun Chen , University of Arizona
pp. 63-73
AI and Game Theory

Agent-Based Modeling for Complex Financial Systems (Abstract)

James Paulin , University of Oxford
Anisoara Calinescu , University of Oxford
Michael Wooldridge , University of Oxford
pp. 74-82
Human-Centered Computing

Merwin Award Ad (PDF)

pp. c4
88 ms
(Ver 3.3 (11022016))