Cherlynn Cha (ExpressVPN)
Detection-as-Code: Build threat detections the way you build software
View More Papers
PowerRadio: Manipulate Sensor Measurement via Power GND Radiation
Yan Jiang (Zhejiang University), Xiaoyu Ji (Zhejiang University), Yancheng Jiang (Zhejiang University), Kai Wang (Zhejiang University), Chenren Xu (Peking University), Wenyuan Xu (Zhejiang University)
Read MoreAutomating Remediation: Accelerating Mean Time to Response for Externally...
Johnathan Wilkes, John Anny (Palo Alto Networks)
Read MoreFive Word Password Composition Policy
Sirvan Almasi (Imperial College London), William J. Knottenbelt (Imperial College London)
Read MoreRevisiting Physical-World Adversarial Attack on Traffic Sign Recognition: A...
Ningfei Wang (University of California, Irvine), Shaoyuan Xie (University of California, Irvine), Takami Sato (University of California, Irvine), Yunpeng Luo (University of California, Irvine), Kaidi Xu (Drexel University), Qi Alfred Chen (University of California, Irvine)
Read More