Cherlynn Cha (ExpressVPN)
Detection-as-Code: Build threat detections the way you build software
View More Papers
A Comparative Analysis of Difficulty Between Log and Graph-Based...
Matt Jansen, Rakesh Bobba, Dave Nevin (Oregon State University)
Read MoreSheep's Clothing, Wolf's Data: Detecting Server-Induced Client Vulnerabilities in...
Fangming Gu (Institute of Information Engineering, Chinese Academy of Sciences), Qingli Guo (Institute of Information Engineering, Chinese Academy of Sciences), Jie Lu (Institute of Computing Technology, Chinese Academy of Sciences), Qinghe Xie (Institute of Information Engineering, Chinese Academy of Sciences), Beibei Zhao (Institute of Information Engineering, Chinese Academy of Sciences), Kangjie Lu (University of Minnesota),…
Read More