Cherlynn Cha (ExpressVPN)
Detection-as-Code: Build threat detections the way you build software
View More Papers
The Midas Touch: Triggering the Capability of LLMs for...
Yi Yang (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, China), Jinghua Liu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, China), Kai Chen (Institute of Information Engineering, Chinese Academy of…
Read MoreTowards Establishing a Systematic Security Framework for Next Generation...
Tolga O. Atalay (A2 Labs LLC), Tianyuan Yu (UCLA), Lixia Zhang (UCLA), Angelos Stavrou (A2 Labs LLC)
Read MoreBefore the Vicious Cycle Starts: Preventing Burnout Across SOC...
Kashyap Thimmaraju (Technische Universitat Berlin), Duc Anh Hoang (Technische Universitat Berlin), Souradip Nath (Arizona State University), Jaron Mink (Arizona State University), Gail-Joon Ahn (Arizona State University)
Read More