Philip Stoner (Deloitte)
AI Adoption and Skill Development in Security Operations Centers
View More Papers
Explanation as a Watermark: Towards Harmless and Multi-bit Model...
Shuo Shao (Zhejiang University), Yiming Li (Zhejiang University), Hongwei Yao (Zhejiang University), Yiling He (Zhejiang University), Zhan Qin (Zhejiang University), Kui Ren (Zhejiang University)
Read MoreCyber Threat Intelligence for SOC Analysts
Nidhi Rastogi, Md Tanvirul Alam (Rochester Institute of Technology)
Read MoreTowards Understanding Unsafe Video Generation
Yan Pang (University of Virginia), Aiping Xiong (Penn State University), Yang Zhang (CISPA Helmholtz Center for Information Security), Tianhao Wang (University of Virginia)
Read MoreTarget-Centric Firmware Rehosting with Penguin
Andrew Fasano, Zachary Estrada, Luke Craig, Ben Levy, Jordan McLeod, Jacques Becker, Elysia Witham, Cole DiLorenzo, Caden Kline, Ali Bobi (MIT Lincoln Laboratory), Dinko Dermendzhiev (Georgia Institute of Technology), Tim Leek (MIT Lincoln Laboratory), William Robertson (Northeastern University)
Read More