Anis Yusof (NU Singapore)
From Observations to Insights: Constructing Effective Cyberattack Provenance with PROVCON
View More Papers
“Where Are We On Cyber?” – A Qualitative Study...
Jens Christian Opdenbusch (Ruhr University Bochum), Jonas Hielscher (Ruhr University Bochum), M. Angela Sasse (Ruhr University Bochum, University College London)
Read MoreBalancing Privacy and Data Utilization: A Comparative Vignette Study...
Leona Lassak (Ruhr University Bochum), Hanna Püschel (TU Dortmund University), Oliver D. Reithmaier (Leibniz University Hannover), Tobias Gostomzyk (TU Dortmund University), Markus Dürmuth (Leibniz University Hannover)
Read MoreBeyond Classification: Inferring Function Names in Stripped Binaries via...
Linxi Jiang (The Ohio State University), Xin Jin (The Ohio State University), Zhiqiang Lin (The Ohio State University)
Read MoreUncovering the iceberg from the tip: Generating API Specifications...
Miaoqian Lin (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, China), Kai Chen (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, China), Yi Yang (Institute of Information Engineering, Chinese Academy of…
Read More