Ostinato: Cross-host Attack Correlation through Attack Activity Similarity
Detection.-DKS-PKI: A Distributed Key Server Architecture for Public Key
Infrastructure.-Generating-Set Evaluation of Bloom Filter Hardening Techniques in Private
Record Linkage.-SHIELD: A Multimodal Deep Learning Framework For Android Malware
Detection.-Samyukta: A Unified Access Control Model using Roles, Labels, and
Attributes.-Efficient and Effective Static Android Malware Detection Using Machine
Learning.-Attacks on ML Systems: From Security Analysis to Attack Mitigation.-MILSA: Model Interpretation based Label Sniffing Attack in Federated Learning.-IoTInDet: Detecting Internet of Things Intrusions with Class Scatter Ratio and Hellinger Distance Statistics.-Detecting Cloud originated DDoS attacks at the source using Out-cloud attack detection (OCAD).-Mining Attribute-Based Access Control Policies.-Preventing Privacy-Violating Information Flows in JavaScript Applications using Dynamic Labelling.-On the Impact of Model Tolerance in Power Grid Anomaly Detection Systems.-WiP: Control Plane Saturation Attack Mitigation in Software Defined Networks.-WiP: EventTracker-Event Driven Evidence Collection for Digital Forensics.-WiP: Characterizing the Impact of Multiplexed DoS Attacks on HTTP and Detection