Cherlynn Cha (ExpressVPN)
Detection-as-Code: Build threat detections the way you build software
View More Papers
What Makes Phishing Simulation Campaigns (Un)Acceptable? A Vignette Experiment
Jasmin Schwab (German Aerospace Center (DLR)), Alexander Nussbaum (University of the Bundeswehr Munich), Anastasia Sergeeva (University of Luxembourg), Florian Alt (University of the Bundeswehr Munich and Ludwig Maximilian University of Munich), and Verena Distler (Aalto University)
Read MoremmProcess: Phase-Based Speech Reconstruction from mmWave Radar
Hyeongjun Choi, Young Eun Kwon, Ji Won Yoon (Korea University)
Read MoreSecuWear: Secure Data Sharing Between Wearable Devices
Sujin Han (KAIST) Diana A. Vasile (Nokia Bell Labs), Fahim Kawsar (Nokia Bell Labs, University of Glasgow), Chulhong Min (Nokia Bell Labs)
Read MoreEvaluating the Impact of Cybersecurity Training: Exploring the Utility...
Chris Fennell (Walmart)
Read More