Philip Stoner (Deloitte)
AI Adoption and Skill Development in Security Operations Centers
View More Papers
Sheep's Clothing, Wolf's Data: Detecting Server-Induced Client Vulnerabilities in...
Fangming Gu (Institute of Information Engineering, Chinese Academy of Sciences), Qingli Guo (Institute of Information Engineering, Chinese Academy of Sciences), Jie Lu (Institute of Computing Technology, Chinese Academy of Sciences), Qinghe Xie (Institute of Information Engineering, Chinese Academy of Sciences), Beibei Zhao (Institute of Information Engineering, Chinese Academy of Sciences), Kangjie Lu (University of Minnesota),…
Read MoreA Comparative Analysis of Difficulty Between Log and Graph-Based...
Matt Jansen, Rakesh Bobba, Dave Nevin (Oregon State University)
Read MoreTowards LLM-Assisted Vulnerability Detection and Repair for Open-Source 5G...
Rupam Patir (University at Buffalo), Qiqing Huang (University at Buffalo), Keyan Guo (University at Buffalo), Wanda Guo (Texas A&M University), Guofei Gu (Texas A&M University), Haipeng Cai (University at Buffalo), Hongxin Hu (University at Buffalo)
Read MoreRecurrent Private Set Intersection for Unbalanced Databases with Cuckoo...
Eduardo Chielle (New York University Abu Dhabi), Michail Maniatakos (New York University Abu Dhabi)
Read More