Wes Hardaker (USC)
To understand anomalies, you must first understand your past
View More Papers
Be Careful of What You Embed: Demystifying OLE Vulnerabilities
Yunpeng Tian (Huazhong University of Science and Technology), Feng Dong (Huazhong University of Science and Technology), Haoyi Liu (Huazhong University of Science and Technology), Meng Xu (University of Waterloo), Zhiniang Peng (Huazhong University of Science and Technology; Sangfor Technologies Inc.), Zesen Ye (Sangfor Technologies Inc.), Shenghui Li (Huazhong University of Science and Technology), Xiapu Luo…
Read MoreCognitive Threat Detection for SOC Operations: Automating Manipulation Tactic...
Keerthana Madhavan (School of Computer Science, University of Guelph, Canada), Luiza Antonie (School of Computer Science; CARE-AI, University of Guelph, Canada), Stacey D. Scott, School of Computer Science; CARE-AI, University of Guelph, Canada)
Read MoreNo Source Code? No Problem! Twenty Years of Research...
Jack W. Davidson, Professor of Computer Science in the School of Engineering and Applied Science, University of Virginia
Read More