Philip Stoner (Deloitte)
AI Adoption and Skill Development in Security Operations Centers
View More Papers
Was This You? Investigating the Design Considerations for Suspicious...
Sena Sahin (Georgia Institute of Technology), Burak Sahin (Georgia Institute of Technology), Frank Li (Georgia Institute of Technology)
Read MoreTWINFUZZ: Differential Testing of Video Hardware Acceleration Stacks
Matteo Leonelli (CISPA Helmholtz Center for Information Security), Addison Crump (CISPA Helmholtz Center for Information Security), Meng Wang (CISPA Helmholtz Center for Information Security), Florian Bauckholt (CISPA Helmholtz Center for Information Security), Keno Hassler (CISPA Helmholtz Center for Information Security), Ali Abbasi (CISPA Helmholtz Center for Information Security), Thorsten Holz (CISPA Helmholtz Center for Information…
Read MoreAnalysis of Misconfigured IoT MQTT Deployments and a Lightweight...
Seyed Ali Ghazi Asgar, Narasimha Reddy (Texas A&M University)
Read MoreSecure Data Analytics in Apache Spark with Fine-grained Policy...
Byeongwook Kim (Seoul National University), Jaewon Hur (Seoul National University), Adil Ahmad (Arizona State University), Byoungyoung Lee (Seoul National University)
Read More