•  
  •  
 

Table of Contents

Front Matter/Back Matter

Articles

PDF

Exploring Deviant Hacker Networks (DHM) on Social Media Platforms
Samer Al-khateeb, Kevin J. Conlan, Nitin Agarwal, Ibrahim Baggili, and Frank Breitinger

PDF

Security Analysis of MVhash-B Similarity Hashing
Donghoon Chang, Somitra Sanadhya, and Monika Singh

PDF

Bytewise Approximate Matching: The Good, The Bad, and The Unknown
Vikram S. Harichandran, Frank Breitinger, and Ibrahim Baggili

PDF

On Efficiency of Distributed Password Recovery
Radek Hranický, Martin Holkovič, and Petr Matoušek

PDF

Towards Syntactic Approximate Matching - A Pre-Processing Experiment
Doowon Jeong, Frank Breitinger, Hari Kang, and Sangjin Lee

PDF

Countering Noise-based Splicing Detection Using Noise Density Transfer
Thibault Julliand, Vincent Nozick, and Hugues Talbot

PDF

Electronic Voting Service Using Block-Chain
Kibin Lee, Joshua I. James, Tekachew G. Ejeta, and Hyoung J. Kim

PDF

Making Sense of Email Addresses on Drives
Neil C. Rowe, Riqui Schwamm, Michael R. McCarrin, and Ralucca Gera