Chris Fennell (Walmart)
Evaluating the Impact of Cybersecurity Training: Exploring the Utility of Behavior Intentions and Security Best Practices
View More Papers
Iris: Dynamic Privacy Preserving Search in Authenticated Chord Peer-to-Peer...
Angeliki Aktypi (University of Oxford), Kasper Rasmussen (University of Oxford)
Read MoreAI-Assisted RF Fingerprinting for Identification of User Devices in...
Aishwarya Jawne (Center for Connected Autonomy & AI, Florida Atlantic University), Georgios Sklivanitis (Center for Connected Autonomy & AI, Florida Atlantic University), Dimitris A. Pados (Center for Connected Autonomy & AI, Florida Atlantic University), Elizabeth Serena Bentley (Air Force Research Laboratory)
Read MoreTruman: Constructing Device Behavior Models from OS Drivers to...
Zheyu Ma (Institute for Network Sciences and Cyberspace (INSC), Tsinghua University; EPFL; JCSS, Tsinghua University (INSC) - Science City (Guangzhou) Digital Technology Group Co., Ltd.), Qiang Liu (EPFL), Zheming Li (Institute for Network Sciences and Cyberspace (INSC), Tsinghua University; JCSS, Tsinghua University (INSC) - Science City (Guangzhou) Digital Technology Group Co., Ltd.), Tingting Yin (Zhongguancun…
Read MoreFUZZUER: Enabling Fuzzing of UEFI Interfaces on EDK-2
Connor Glosner (Purdue University), Aravind Machiry (Purdue University)
Read More