Cherlynn Cha (ExpressVPN)
Detection-as-Code: Build threat detections the way you build software
View More Papers
Vulnerability, Where Art Thou? An Investigation of Vulnerability Management...
Daniel Klischies (Ruhr University Bochum), Philipp Mackensen (Ruhr University Bochum), Veelasha Moonsamy (Ruhr University Bochum)
Read MoreAutomating Remediation: Accelerating Mean Time to Response for Externally...
Johnathan Wilkes, John Anny (Palo Alto Networks)
Read MoreExploring User Perceptions of Security Auditing in the Web3...
Molly Zhuangtong Huang (University of Macau), Rui Jiang (University of Macau), Tanusree Sharma (Pennsylvania State University), Kanye Ye Wang (University of Macau)
Read More