Anis Yusof (NU Singapore)
From Observations to Insights: Constructing Effective Cyberattack Provenance with PROVCON
View More Papers
SecuWear: Secure Data Sharing Between Wearable Devices
Sujin Han (KAIST) Diana A. Vasile (Nokia Bell Labs), Fahim Kawsar (Nokia Bell Labs, University of Glasgow), Chulhong Min (Nokia Bell Labs)
Read MoreRediscovering Method Confusion in Proposed Security Fixes for Bluetooth
Maximilian von Tschirschnitz (Technical University of Munich), Ludwig Peuckert (Technical University of Munich), Moritz Buhl (Technical University of Munich), Jens Grossklags (Technical University of Munich)
Read MoreCan a Cybersecurity Question Answering Assistant Help Change User...
Lea Duesterwald (Carnegie Mellon University), Ian Yang (Carnegie Mellon University), Norman Sadeh (Carnegie Mellon University)
Read More