Philip Stoner (Deloitte)
AI Adoption and Skill Development in Security Operations Centers
View More Papers
EAGLEYE: Exposing Hidden Web Interfaces in IoT Devices via...
Hangtian Liu (Information Engineering University), Lei Zheng (Institute for Network Sciences and Cyberspace (INSC), Tsinghua University), Shuitao Gan (Laboratory for Advanced Computing and Intelligence Engineering), Chao Zhang (Institute for Network Sciences and Cyberspace (INSC), Tsinghua University), Zicong Gao (Information Engineering University), Hongqi Zhang (Henan Key Laboratory of Information Security), Yishun Zeng (Institute for Network Sciences…
Read MoreDiffence: Fencing Membership Privacy With Diffusion Models
Yuefeng Peng (University of Massachusetts Amherst), Ali Naseh (University of Massachusetts Amherst), Amir Houmansadr (University of Massachusetts Amherst)
Read MoreScopeVerif: Analyzing the Security of Android’s Scoped Storage via...
Zeyu Lei (Purdue University), Güliz Seray Tuncay (Google), Beatrice Carissa Williem (Purdue University), Z. Berkay Celik (Purdue University), Antonio Bianchi (Purdue University)
Read More