Ostinato: Cross-host Attack Correlation through Attack Activity Similarity<div>Detection.-DKS-PKI: A Distributed Key Server Architecture for Public Key</div><div>Infrastructure.-Generating-Set Evaluation of Bloom Filter Hardening Techniques in Private</div><div>Record Linkage.-SHIELD: A Multimodal Deep Learning Framework For Android Malware</div><div>Detection.-Samyukta: A Unified Access Control Model using Roles, Labels, and</div><div>Attributes.-Efficient and Effective Static Android Malware Detection Using Machine</div><div>Learning.-Attacks on ML Systems: From Security Analysis to Attack Mitigation.-MILSA: Model Interpretation based Label Sniffing Attack in Federated Learning.-IoTInDet: Detecting Internet of Things Intrusions with Class Scatter Ratio and Hellinger Distance Statistics.-Detecting Cloud originated DDoS attacks at the source using Out-cloud attack detection (OCAD).-Mining Attribute-Based Access Control Policies.-Preventing Privacy-Violating Information Flows in JavaScript Applications using Dynamic Labelling.-On the Impact of Model Tolerance in Power Grid Anomaly Detection Systems.-WiP: Control Plane Saturation Attack Mitigation in Software Defined Networks.-WiP: EventTracker-Event Driven Evidence Collection for Digital Forensics.-WiP: Characterizing the Impact of Multiplexed DoS Attacks on HTTP and Detection</div><div><br></div><div><br></div><div><br></div><div><br></div><div><br></div><div><br></div><div><br></div><div><br></div><div><br></div><div><br></div><div><br></div><div><br></div><div><br></div><div><br></div><div><br></div><div><br></div>