Cherlynn Cha (ExpressVPN)
Detection-as-Code: Build threat detections the way you build software
View More Papers
Talk: ORTSOC: A Clinical Rotation Approach to Professional Cybersecurity...
Rakesh Bobba, Dave Nevin (Oregon State University)
Read MoreAI-Assisted RF Fingerprinting for Identification of User Devices in...
Aishwarya Jawne (Center for Connected Autonomy & AI, Florida Atlantic University), Georgios Sklivanitis (Center for Connected Autonomy & AI, Florida Atlantic University), Dimitris A. Pados (Center for Connected Autonomy & AI, Florida Atlantic University), Elizabeth Serena Bentley (Air Force Research Laboratory)
Read MoreHome Shield IoT Traffic Analyzer: A Comprehensive Analysis of...
Dhananjai Bajpai (Marquette University), Keyang Yu (Marquette University)
Read MoreTruman: Constructing Device Behavior Models from OS Drivers to...
Zheyu Ma (Institute for Network Sciences and Cyberspace (INSC), Tsinghua University; EPFL; JCSS, Tsinghua University (INSC) - Science City (Guangzhou) Digital Technology Group Co., Ltd.), Qiang Liu (EPFL), Zheming Li (Institute for Network Sciences and Cyberspace (INSC), Tsinghua University; JCSS, Tsinghua University (INSC) - Science City (Guangzhou) Digital Technology Group Co., Ltd.), Tingting Yin (Zhongguancun…
Read More