Cherlynn Cha (ExpressVPN)
Detection-as-Code: Build threat detections the way you build software
View More Papers
Cellular Metasploit
Dr. Yongdae Kim, Director, KAIST Chair Professor, Electrical Engineering and GSIS, KAIST
Read MoreRethink Custom Transformers for Binary Analysis
Heng Yin, Professor, Department of Computer Science and Engineering, University of California, Riverside
Read MoreSpace Cybersecurity Testbed: Fidelity Framework, Example Implementation, and Characterization
Jose Luis Castanon Remy, Caleb Chang, Ekzhin Ear, Shouhuai Xu (University of Colorado Colorado Springs (UCCS))
Read More