Cherlynn Cha (ExpressVPN)
Detection-as-Code: Build threat detections the way you build software
View More Papers
Human Performance in Security Operations: A Survey on Burnout,...
Kashyap Thimmaraju (TU Berlin)
Read MoreIsolateGPT: An Execution Isolation Architecture for LLM-Based Agentic Systems
Yuhao Wu (Washington University in St. Louis), Franziska Roesner (University of Washington), Tadayoshi Kohno (University of Washington), Ning Zhang (Washington University in St. Louis), Umar Iqbal (Washington University in St. Louis)
Read MoreOn the Realism of LiDAR Spoofing Attacks against Autonomous...
Takami Sato (University of California, Irvine), Ryo Suzuki (Keio University), Yuki Hayakawa (Keio University), Kazuma Ikeda (Keio University), Ozora Sako (Keio University), Rokuto Nagata (Keio University), Ryo Yoshida (Keio University), Qi Alfred Chen (University of California, Irvine), Kentaro Yoshioka (Keio University)
Read MoreSpace Cybersecurity Testbed: Fidelity Framework, Example Implementation, and Characterization
Jose Luis Castanon Remy, Caleb Chang, Ekzhin Ear, Shouhuai Xu (University of Colorado Colorado Springs (UCCS))
Read More