Title Authors
Securing Kubernetes Pods communicating over Weave Net through eBPF/XDP from DDoS attacks Talaya Farasat (GIST), Ahmad Rathore (North Western University) and Jongwon Kim (GIST)
RanSAM: Randomized Search for ABAC Policy Mining Nakul Aggarwal (Indian Institute of Technology Kharagpur) and Shamik Sural (Indian Institute of Technology Kharagpur)
The Design of an Ontology for ATT&CK and its Application to Cybersecurity Khandakar Ashrafi Akbar (The University of Texas at Dallas), Sadaf Md Halim (The University of Texas at Dallas), Anoop Singhal (National Institute of Standards and Technology, USA), Basel Abdeen (The University of Texas at Dallas), Latifur Khan (The University of Texas at Dallas) and Bhavani Thuraisingham (The University of Texas at Dallas)
Exploiting Windows PE Structure for Adversarial Malware Evasion Attacks Kshitiz Aryal (Tennessee Technological University), Maanak Gupta (Tennessee Technological University) and Mahmoud Abdelsalam (North Carolina A&T State University)
Blockchain-based Privacy Preserving Linear Regression Zeynep Delal Mutlu (TOBB University), Yesem Kurt Peker (Columbus State University) and Ali Aydin Selcuk (TOBB University)
Utilizing The DLBAC Approach Toward a ZT Score-based Authorization for IoT Systems Safwa Ameer (The university of Texas at San Antonio), Ram Krishnan (The university of Texas at San Antonio), Ravi Sandhu (The university of Texas at San Antonio) and Maanak Gupta (Tennessee Technological University)