Wes Hardaker (USC)
To understand anomalies, you must first understand your past
View More Papers
Beyond the Breach: Unleashing the Power of Post Access...
James Fitts, Chris Fennel (Walmart)
Read MoreTarget-Centric Firmware Rehosting with Penguin
Andrew Fasano, Zachary Estrada, Luke Craig, Ben Levy, Jordan McLeod, Jacques Becker, Elysia Witham, Cole DiLorenzo, Caden Kline, Ali Bobi (MIT Lincoln Laboratory), Dinko Dermendzhiev (Georgia Institute of Technology), Tim Leek (MIT Lincoln Laboratory), William Robertson (Northeastern University)
Read MoreContinuous Threat Hunting: Expanding beyond alerts to detect modern...
Cherlynn Cha (ExpressVPN)
Read MorePrivacy Preserved Integrated Big Data Analytics Framework Using Federated...
Sarah Kaleem (Prince Sultan University, PSU) Awais Ahmad (Imam Mohammad Ibn Saud Islamic University, IMSIU), Muhammad Babar (Prince Sultan University, PSU), Goutham Reddy Alavalapati (University of Illinois, Springfield)
Read More