Tristan Bilot (University of British Columbia)
Tutorial: Accelerating Provenance-based Intrusion Detection Research with PIDSMaker
View More Papers
Achieving Interpretable DL-based Web Attack Detection through Malicious Payload...
Peiyang Li (Tsinghua University & Ant Group), Fukun Mei (Tsinghua University), Ye Wang (Tsinghua University), Zhuotao Liu (Tsinghua University), Ke Xu (Tsinghua University & Zhongguancun Laboratory), Chao Shen (Xi'an Jiaotong University), Qian Wang (Wuhan University), Qi Li (Tsinghua University & Zhongguancun Laboratory)
Read MoreFrom Scam to Safety: Participatory Design of Digital Privacy...
Sarah Tabassum (University of North Carolina at Charlotte, USA), Narges Zare (University of North Carolina at Charlotte, USA), Cori Faklaris(University of North Carolina at Charlotte, USA)
Read MoreMirage: Private, Mobility-based Routing for Censorship Evasion
Zachary Ratliff (Harvard University), Ruoxing (David) Yang (Georgetown University), Avery Bai (Georgetown University), Harel Berger (Ariel University), Micah Sherr (Georgetown University), James Mickens (Harvard University)
Read More