![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
6th IWSPA@CODASPY 2020: New Orleans, LA, USA
- Rakesh M. Verma, Latifur Khan, Chilukuri K. Mohan:
IWSPA@CODASPY '20: Proceedings ofthe Sixth International Workshop on Security and Privacy Analytics, New Orleans, LA, USA, March 18, 2020. ACM 2020, ISBN 978-1-4503-7115-5 - Anoop Singhal:
Security Metrics and Risk Analysis for Enterprise Systems. 1 - Hao Liu, Boyang Wang:
Mitigating File-Injection Attacks with Natural Language Processing. 3-13 - Susan Jeziorowski, Muhammad Ismail, Ambareen Siraj:
Towards Image-Based Dark Vendor Profiling: An Analysis of Image Metadata and Image Hashing in Dark Web Marketplaces. 15-22 - Wyatt Dorris, Ruijia (Roger) Hu, Nishant Vishwamitra, Feng Luo, Matthew Costello:
Towards Automatic Detection and Explanation of Hate Speech and Offensive Language. 23-29 - Sharad Mehrotra, Shantanu Sharma
:
Recent Advances in Information-Theoretically Secure Data Outsourcing. 31-32 - Daniel Lee, Rakesh M. Verma
:
Adversarial Machine Learning for Text. 33-34 - Victor Zeng
, Shahryar Baki, Ayman El Aassal, Rakesh M. Verma
, Luis Felipe Teixeira De Moraes, Avisha Das
:
Diverse Datasets and a Customizable Benchmarking Framework for Phishing. 35-41 - Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Automatic Recognition of Advanced Persistent Threat Tactics for Enterprise Security. 43-52 - Ahmed Aleroud, George Karabatis:
Bypassing Detection of URL-based Phishing Attacks Using Generative Adversarial Deep Neural Networks. 53-60 - Huajie Chen, Ali Burak Ünal, Mete Akgün, Nico Pfeifer:
Privacy-preserving SVM on Outsourced Genomic Data via Secure Multi-party Computation. 61-69 - Aunshul Rege, Shanchieh Jay Yang, Alyssa Mendlein, Katorah Williams, Shao-Hsusan Su, Stephen Moskal:
Dissecting Cyberadversarial Intrusion Stages via Interdisciplinary Observations. 71-77
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.