Wes Hardaker (USC)
To understand anomalies, you must first understand your past
View More Papers
“Do We Call Them That? Absolutely Not.”: Juxtaposing the...
Alexandra Klymenko (Technical University of Munich), Stephen Meisenbacher (Technical University of Munich), Luca Favaro (Technical University of Munich), and Florian Matthes (Technical University of Munich)
Read MoreMismatched SOCs: A Case Study of Cybersecurity Goal Incongruency...
Andrew Morin (University of Tulsa)
Read MoreOrbID: Identifying Orbcomm Satellite RF Fingerprints
Cédric Solenthaler (ETH Zurich), Joshua Smailes (University of Oxford), Martin Strohmeier (armasuisse Science & Technology)
Read MoreInterventional Root Cause Analysis of Failures in Multi-Sensor Fusion...
Shuguang Wang (City University of Hong Kong), Qian Zhou (City University of Hong Kong), Kui Wu (University of Victoria), Jinghuai Deng (City University of Hong Kong), Dapeng Wu (City University of Hong Kong), Wei-Bin Lee (Information Security Center, Hon Hai Research Institute), Jianping Wang (City University of Hong Kong)
Read More