Wes Hardaker (USC)
To understand anomalies, you must first understand your past
View More Papers
Vulnerability, Where Art Thou? An Investigation of Vulnerability Management...
Daniel Klischies (Ruhr University Bochum), Philipp Mackensen (Ruhr University Bochum), Veelasha Moonsamy (Ruhr University Bochum)
Read MoreCASPR: Context-Aware Security Policy Recommendation
Lifang Xiao (Institute of Information Engineering, Chinese Academy of Sciences), Hanyu Wang (Institute of Information Engineering, Chinese Academy of Sciences), Aimin Yu (Institute of Information Engineering, Chinese Academy of Sciences), Lixin Zhao (Institute of Information Engineering, Chinese Academy of Sciences), Dan Meng (Institute of Information Engineering, Chinese Academy of Sciences)
Read MoreEvaluating the Impact of Cybersecurity Training: Exploring the Utility...
Chris Fennell (Walmart)
Read More