Cherlynn Cha (ExpressVPN)
Detection-as-Code: Build threat detections the way you build software
View More Papers
Horcrux: Synthesize, Split, Shift and Stay Alive; Preventing Channel...
Anqi Tian (Institute of Software, Chinese Academy of Sciences; School of Computer Science and Technology, University of Chinese Academy of Sciences), Peifang Ni (Institute of Software, Chinese Academy of Sciences; Zhongguancun Laboratory, Beijing, P.R.China), Yingzi Gao (Institute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences), Jing Xu (Institute of Software, Chinese…
Read MoreA Comparative Analysis of Difficulty Between Log and Graph-Based...
Matt Jansen, Rakesh Bobba, Dave Nevin (Oregon State University)
Read MoreA Preliminary Study on Using Large Language Models in...
Kumar Shashwat, Francis Hahn, Xinming Ou, Dmitry Goldgof, Jay Ligatti, Larrence Hall (University of South Florida), S. Raj Rajagoppalan (Resideo), Armin Ziaie Tabari (CipherArmor)
Read MorePoster: Securing IoT Edge Devices: Applying NIST IR 8259A...
Rahul Choutapally, Konika Reddy Saddikuti, Solomon Berhe (University of the Pacific)
Read More