Description
Contents:
Article 16 (23 pages)
Differentially Private k-Nearest Neighbor Missing Data Imputation
C. Clifton
E. J. Hanson
K. Merrill
S. Merrill
Article 17 (31 pages)
Sok: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems
Y. Chen
J. Zhang
X. Yuan
S. Zhang
K. Chen
X. Wang
S. Guo
Article 18 (36 pages)
Dealing with Security Alert Flooding: Using Machine Learning for Domain-independent Alert Aggregation
M. Landauer
F. Skopik
M. Wurzenberger
A. Rauber
Article 19 (36 pages)
Generating Quality Threat Intelligence Leveraging OSINT and a Cyber Threat Unified Taxonomy
C. Martins
I. Medeiros
ISBN:ACMTRANSACTIO