Cherlynn Cha (ExpressVPN)
Detection-as-Code: Build threat detections the way you build software
View More Papers
Beyond Classification: Inferring Function Names in Stripped Binaries via...
Linxi Jiang (The Ohio State University), Xin Jin (The Ohio State University), Zhiqiang Lin (The Ohio State University)
Read MoreCybersecurity Perspectives: Bridging the Gap Between Academic and Practitioners
Chris Fennell, Walmart
Read MorePoster: Securing IoT Edge Devices: Applying NIST IR 8259A...
Rahul Choutapally, Konika Reddy Saddikuti, Solomon Berhe (University of the Pacific)
Read MoreVision: The Price Should Be Right: Exploring User Perspectives...
Jacob Hopkins (Texas A&M University - Corpus Christi), Carlos Rubio-Medrano (Texas A&M University - Corpus Christi), Cori Faklaris (University of North Carolina at Charlotte)
Read More