- Dieudonne Mulamba, Indrajit Ray, Indrakshi Ray:
On Sybil Classification in Online Social Networks Using Only Structural Features. PST 2018: 1-10 - Hazel Murray, David Malone:
Exploring the Impact of Password Dataset Distribution on Guessing. PST 2018: 1-8 - Lucky Onwuzurike, Mário Almeida, Enrico Mariconti, Jeremy Blackburn, Gianluca Stringhini, Emiliano De Cristofaro:
A Family of Droids-Android Malware Detection via Behavioral Modeling: Static vs Dynamic Analysis. PST 2018: 1-10 - Lukasz Opiola, Lukasz Dutka, Renata G. Slota, Jacek Kitowski:
Trust-driven, Decentralized Data Access Control for Open Network of Autonomous Data Providers. PST 2018: 1-10 - Sophie Le Page, Gregor von Bochmann, Qian Cui, Jason Flood, Guy-Vincent Jourdan, Iosif-Viorel Onut:
Using AP-TED to Detect Phishing Attack Variations. PST 2018: 1-6 - Lanlan Pan, Xin Zhang, Anlei Hu, Xuebiao Yuchi, Jian Wang:
Mitigating Client Subnet Leakage in DNS Queries. PST 2018: 1-2 - Kasper Bonne Rasmussen, Paolo Gasti:
Weak and Strong Deniable Authenticated Encryption: On their Relationship and Applications. PST 2018: 1-10 - João S. Resende, Rolando Martins, Luis Antunes:
Enforcing Privacy and Security in Public Cloud Storage. PST 2018: 1-5 - Zohaib Riaz, Frank Dürr, Kurt Rothermel:
Location Privacy and Utility in Geo-social Networks: Survey and Research Challenges. PST 2018: 1-10 - Jukka Ruohonen, Joonas Salovaara, Ville Leppänen:
Crossing Cross-Domain Paths in the Current Web. PST 2018: 1-5 - Navoda Senavirathne, Vicenç Torra:
Approximating Robust Linear Regression With An Integral Privacy Guarantee. PST 2018: 1-10 - Eunbi Seo, Hyun Min Song, Huy Kang Kim:
GIDS: GAN based Intrusion Detection System for In-Vehicle Network. PST 2018: 1-6 - Iman Sharafaldin, Ali A. Ghorbani:
EagleEye: A Novel Visual Anomaly Detection Method. PST 2018: 1-6 - Nissy Sombatruang, Youki Kadobayashi, M. Angela Sasse, Michelle Baddeley, Daisuke Miyamoto:
The continued risks of unsecured public Wi-Fi and why users keep using it: Evidence from Japan. PST 2018: 1-11 - Milica Stojmenovic, Robert Biddle:
Hide-and-Seek with Website Identity Information. PST 2018: 1-6 - Andrew Sutton, Reza Samavi, Thomas E. Doyle, David Koff:
Digitized Trust in Human-in-the-Loop Health Research. PST 2018: 1-10 - Gamze Tillem, Zekeriya Erkin, Reginald L. Lagendijk:
Mining Sequential Patterns from Outsourced Data via Encryption Switching. PST 2018: 1-10 - Giulia Traverso, Denis Butin, Johannes Buchmann, Alex Palesandro:
Coalition-Resistant Peer Rating for Long-Term Confidentiality. PST 2018: 1-10 - Soheil Varastehpour, Hamid R. Sharifzadeh, Iman Ardekani, Abdolhossein Sarrafzadeh:
Extended Abstract: A Review of Biometric Traits with Insight into Vein Pattern Recognition. PST 2018: 1-2 - Stefan Wüller, Benjamin Assadsolimani, Ulrike Meyer, Susanne Wetzel:
Privacy-Preserving Subgraph Checking. PST 2018: 1-6 - Michihiro Yamada, Riko Shigeno, Hiroaki Kikuchi, Maki Sakamoto:
Evaluation and Development of Onomatopoeia CAPTCHAs. PST 2018: 1-2 - Gongxian Zeng, Meiqi He, Linru Zhang, Jun Zhang, Yuechen Chen, Siu-Ming Yiu:
Secure Compression and Pattern Matching Based on Burrows-Wheeler Transform. PST 2018: 1-10 - Yiming Zhang, Baljeet Malhotra, Cheng Chen:
Industry-Wide Analysis of Open Source Security. PST 2018: 1-10 - Kieran McLaughlin, Ali A. Ghorbani, Sakir Sezer, Rongxing Lu, Liqun Chen, Robert H. Deng, Paul Miller, Stephen Marsh, Jason R. C. Nurse:
16th Annual Conference on Privacy, Security and Trust, PST 2018, Belfast, Northern Ireland, Uk, August 28-30, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-7493-2 [contents]