Cherlynn Cha (ExpressVPN)
Detection-as-Code: Build threat detections the way you build software
View More Papers
What Makes Phishing Simulation Campaigns (Un)Acceptable? A Vignette Experiment
Jasmin Schwab (German Aerospace Center (DLR)), Alexander Nussbaum (University of the Bundeswehr Munich), Anastasia Sergeeva (University of Luxembourg), Florian Alt (University of the Bundeswehr Munich and Ludwig Maximilian University of Munich), and Verena Distler (Aalto University)
Read MoreGadgetMeter: Quantitatively and Accurately Gauging the Exploitability of Speculative...
Qi Ling (Purdue University), Yujun Liang (Tsinghua University), Yi Ren (Tsinghua University), Baris Kasikci (University of Washington and Google), Shuwen Deng (Tsinghua University)
Read MoreSOC Service Areas: Identification, Prioritization, and Implementation
Christopher Rodman, Breanna Kraus, Justin Novak (SEI/CERT)
Read More