Cherlynn Cha (ExpressVPN)
Detection-as-Code: Build threat detections the way you build software
View More Papers
Mixnets on a Tightrope: Quantifying the Leakage of Mix...
Sebastian Meiser, Debajyoti Das, Moritz Kirschte, Esfandiar Mohammadi, Aniket Kate
Read MoreAutomated Expansion of Privacy Data Taxonomy for Compliant Data...
Yue Qin (Indiana University Bloomington & Central University of Finance and Economics), Yue Xiao (Indiana University Bloomington & IBM Research), Xiaojing Liao (Indiana University Bloomington)
Read MoreAuthentication-Event Processing for Enhanced SOC Investigations
Seth Hasings (University of Tulsa)
Read MoreThe Midas Touch: Triggering the Capability of LLMs for...
Yi Yang (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, China), Jinghua Liu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, China), Kai Chen (Institute of Information Engineering, Chinese Academy of…
Read More