Wes Hardaker (USC)
To understand anomalies, you must first understand your past
View More Papers
DiStefano: Decentralized Infrastructure for Sharing Trusted Encrypted Facts and...
Sofia Celi (Brave Software), Alex Davidson (NOVA LINCS & Universidade NOVA de Lisboa), Hamed Haddadi (Imperial College London & Brave Software), Gonçalo Pestana (Hashmatter), Joe Rowell (Information Security Group, Royal Holloway, University of London)
Read MoreSecret Spilling Drive: Leaking User Behavior through SSD Contention
Jonas Juffinger (Graz University of Technology), Fabian Rauscher (Graz University of Technology), Giuseppe La Manna (Amazon), Daniel Gruss (Graz University of Technology)
Read MoreAn Empirical Study on Fingerprint API Misuse with Lifecycle...
Xin Zhang (Fudan University), Xiaohan Zhang (Fudan University), Zhichen Liu (Fudan University), Bo Zhao (Fudan University), Zhemin Yang (Fudan University), Min Yang (Fudan University)
Read More“Where Are We On Cyber?” – A Qualitative Study...
Jens Christian Opdenbusch (Ruhr University Bochum), Jonas Hielscher (Ruhr University Bochum), M. Angela Sasse (Ruhr University Bochum, University College London)
Read More