Carlos E. Rubio-Medrano, M. Hill, Luis Claramunt, Jaejong Baek, Gail-Joon Ahn
{"title":"DyPolDroid: Protecting Users and Organizations from Permission-Abuse Attacks in Android","authors":"Carlos E. Rubio-Medrano, M. Hill, Luis Claramunt, Jaejong Baek, Gail-Joon Ahn","doi":"10.1007/978-3-030-97532-6_2","DOIUrl":"https://doi.org/10.1007/978-3-030-97532-6_2","url":null,"abstract":"","PeriodicalId":373029,"journal":{"name":"Secure Knowledge Management","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125303446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Do Fake News Between Different Languages Talk Alike? A Case Study of COVID-19 Related Fake News","authors":"Lina Zhou, Jie Tao, E. Lai, Dongsong Zhang","doi":"10.1007/978-3-030-97532-6_11","DOIUrl":"https://doi.org/10.1007/978-3-030-97532-6_11","url":null,"abstract":"","PeriodicalId":373029,"journal":{"name":"Secure Knowledge Management","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126729725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analyzing CNN Models' Sensitivity to the Ordering of Non-natural Data","authors":"Randy Klepetko, R. Krishnan","doi":"10.1007/978-3-030-97532-6_8","DOIUrl":"https://doi.org/10.1007/978-3-030-97532-6_8","url":null,"abstract":"","PeriodicalId":373029,"journal":{"name":"Secure Knowledge Management","volume":"316 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133820715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Metacognitive Skills in Phishing Email Detection: A Study of Calibration and Resolution","authors":"Yuan Li, Jingguo Wang, H. Rao","doi":"10.1007/978-3-030-97532-6_3","DOIUrl":"https://doi.org/10.1007/978-3-030-97532-6_3","url":null,"abstract":"","PeriodicalId":373029,"journal":{"name":"Secure Knowledge Management","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114610428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RQ Labs: A Cybersecurity Workforce Talent Program Design","authors":"Clinton Daniel, Matthew T. Mullarkey, M. Agrawal","doi":"10.1007/978-3-030-97532-6_10","DOIUrl":"https://doi.org/10.1007/978-3-030-97532-6_10","url":null,"abstract":"","PeriodicalId":373029,"journal":{"name":"Secure Knowledge Management","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114218822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attribute-Based Access Control Policy Review in Permissioned Blockchain","authors":"Sherifdeen Lawal, R. Krishnan","doi":"10.1007/978-3-030-97532-6_6","DOIUrl":"https://doi.org/10.1007/978-3-030-97532-6_6","url":null,"abstract":"","PeriodicalId":373029,"journal":{"name":"Secure Knowledge Management","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132403791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lenhard Reuter, Maria Leitner, Philip Smith, Manuel Koschuch
{"title":"Dealing with Complexity for Immune-Inspired Anomaly Detection in Cyber Physical Systems","authors":"Lenhard Reuter, Maria Leitner, Philip Smith, Manuel Koschuch","doi":"10.1007/978-3-030-97532-6_9","DOIUrl":"https://doi.org/10.1007/978-3-030-97532-6_9","url":null,"abstract":"","PeriodicalId":373029,"journal":{"name":"Secure Knowledge Management","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132974842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}