Wes Hardaker (USC)
To understand anomalies, you must first understand your past
View More Papers
Hidden and Lost Control: on Security Design Risks in...
Haoqiang Wang, Yiwei Fang (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences; Indiana University Bloomington), Yichen Liu (Indiana University Bloomington), Ze Jin (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences; Indiana University Bloomington), Emma Delph…
Read MoreVision: Comparison of AI-assisted Policy Development Between Professionals and...
Rishika Thorat (Purdue University), Tatiana Ringenberg (Purdue University)
Read MoreSecurity Signals: Making Web Security Posture Measurable at Scale
Michele Spagnuolo (Google), David Dworken (Google), Artur Janc (Google), Santiago Díaz (Google), Lukas Weichselbaum (Google)
Read More