Cherlynn Cha (ExpressVPN)
Detection-as-Code: Build threat detections the way you build software
View More Papers
A Usability Evaluation Method for SOC Tools Using a...
Yukina Okazawa (Toho University), Akira Kanaoka (Toho University), Takumi Yamamoto (Mitsubishi Electric Corporation)
Read MoreBlindfold: Confidential Memory Management by Untrusted Operating System
Caihua Li (Yale University), Seung-seob Lee (Yale University), Lin Zhong (Yale University)
Read More