All Stories

  1. An Adversarial Model with Diffusion for Robust Recommendation against Shilling Attack
  2. Defending against adversarial machine learning attacks using hierarchical learning: A case study on network traffic attack classification
  3. Bu-Dash: a universal and dynamic graphical password scheme (extended version)
  4. AI hyped? A horizon scan of discourse on artificial intelligence in education (AIED) and development
  5. Functionality-Preserving Adversarial Machine Learning for Robust Classification in Cybersecurity and Intrusion Detection Domains: A Survey
  6. Functionality-preserving Adversarial Machine Learning For Robust Classification In Cybersecurity And Intrusion Detection Domains: A Survey
  7. Bu-Dash: A Universal and Dynamic Graphical Password Scheme
  8. Feature Vulnerability and Robustness Assessment against Adversarial Machine Learning Attacks
  9. To Allow, or Deny? That is the Question
  10. MaMaDroid
  11. Distributed Consensus Algorithm for Events Detection in Cyber-Physical Systems
  12. Emotional Bots: Content-based Spammer Detection on Social Media
  13. Studying users’ adaptation to Android’s run-time fine-grained access control system
  14. A Comparative Study of Android Users’ Privacy Preferences Under the Runtime Permission Model
  15. Privacy Decision-Making in the Digital Era: A Game Theoretic Review
  16. MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models
  17. Permissions snapshots: Assessing users' adaptation to the Android runtime permission model
  18. Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network
  19. Android User Authentication
  20. Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret
  21. Impact of User Data Privacy Management Controls on Mobile Device Investigations
  22. Highlighting Relationships of a Smartphone's Social Ecosystem in Potentially Large Investigations
  23. Real-Time Monitoring of Privacy Abuses and Intrusion Detection in Android System
  24. Messaging Activity Reconstruction with Sentiment Polarity Identification
  25. An Extensible Platform for the Forensic Analysis of Social Media Data
  26. A FRAMEWORK FOR DESCRIBING MULTIMEDIA CIRCULATION IN A SMARTPHONE ECOSYSTEM
  27. Complexity Metrics and User Strength Perceptions of the Pattern-Lock Graphical Authentication Method
  28. Smartphone Message Sentiment Analysis
  29. On the Development of Automated Forensic Analysis Methods for Mobile Devices
  30. JPEG steganography detection with Benford's Law
  31. A pilot study on the security of pattern screen-lock methods and soft side channel attacks
  32. Multilevel Visualization Using Enhanced Social Network Analysis with Smartphone Data
  33. Forensic analysis of wireless networking evidence of Android smartphones