![]() |
|
| IWSPA'17 Table of Contents IWSPA
2017 Chairs Welcome IWSPA 2017 Workshop Organization Privacy
and Threats Session Non-interactive
(t, n)-Incidence Counting from Differentially Private Indicator Vectors (Page
1) An
Internal/Insider Threat Score for Data Loss Prevention and Detection (Page
11) Model-based
Cluster Analysis for Identifying Suspicious Activity Sequences in Software (Page
17) Identifying
Key Cyber-Physical Terrain (Page
23) |
|
| (Return to Top) | Authentication
Keynote and Attacks Session Continuous
Authentication Using Behavioral Biometrics (Page
29) Analysis
of Causative Attacks against SVMs Learning from Data Streams (Page
31) MCDefender:
Toward Effective Cyberbullying Defense in Mobile Online Social Networks (Page
37) |
| (Return to Top) | Smartphone
Security Keynote and Software Vulnerabilities Session Tracing
the Arc of Smartphone Application Security (Page
43) Predicting
Exploitation of Disclosed Software Vulnerabilities Using Open-source
Data (Page 45) |
| (Return to Top) | Attacks
and New Detection Method Session What's
in a URL: Fast Feature Extraction and Malicious URL Detection (Page
55) EMULATOR
vs REAL PHONE: Android Malware Detection Using Machine Learning (Page
65) Feature
Cultivation in Privileged Information-augmented Detection (Page
73) |