Cherlynn Cha (ExpressVPN)
Detection-as-Code: Build threat detections the way you build software
View More Papers
Ring of Gyges: Accountable Anonymous Broadcast via Secret-Shared Shuffle
Wentao Dong (City University of Hong Kong), Peipei Jiang (Wuhan University; City University of Hong Kong), Huayi Duan (ETH Zurich), Cong Wang (City University of Hong Kong), Lingchen Zhao (Wuhan University), Qian Wang (Wuhan University)
Read MoreAuthentication-Event Processing for Enhanced SOC Investigations
Seth Hasings (University of Tulsa)
Read MoreNon-intrusive and Unconstrained Keystroke Inference in VR Platforms via...
Tao Ni (City University of Hong Kong), Yuefeng Du (City University of Hong Kong), Qingchuan Zhao (City University of Hong Kong), Cong Wang (City University of Hong Kong)
Read MoreA Comparative Analysis of Difficulty Between Log and Graph-Based...
Matt Jansen, Rakesh Bobba, Dave Nevin (Oregon State University)
Read More