Philip Stoner (Deloitte)
AI Adoption and Skill Development in Security Operations Centers
View More Papers
From Observations to Insights: Constructing Effective Cyberattack Provenance with...
Anis Yusof (NU Singapore)
Read MoreDetecting IMSI-Catchers by Characterizing Identity Exposing Messages in Cellular...
Tyler Tucker (University of Florida), Nathaniel Bennett (University of Florida), Martin Kotuliak (ETH Zurich), Simon Erni (ETH Zurich), Srdjan Capkun (ETH Zuerich), Kevin Butler (University of Florida), Patrick Traynor (University of Florida)
Read MoreDefending Against Membership Inference Attacks on Iteratively Pruned Deep...
Jing Shang (Beijing Jiaotong University), Jian Wang (Beijing Jiaotong University), Kailun Wang (Beijing Jiaotong University), Jiqiang Liu (Beijing Jiaotong University), Nan Jiang (Beijing University of Technology), Md Armanuzzaman (Northeastern University), Ziming Zhao (Northeastern University)
Read MoreBlindfold: Confidential Memory Management by Untrusted Operating System
Caihua Li (Yale University), Seung-seob Lee (Yale University), Lin Zhong (Yale University)
Read More