Lingzhi Wang (Northwestern University)
Tutorial: Using Aurora, an automated attack emulation system, to create benchmark datasets for intrusion detection
View More Papers
VulSCA: A Community-Level SCA Approach for Accurate C/C++ Supply...
Yutao Hu (Huazhong University of Science and Technology), Chaofan Li (Huazhong University of Science and Technology), Yueming Wu (Huazhong University of Science and Technology), Yifeng Cai (Peking University), Deqing Zou (Huazhong University of Science and Technology)
Read MoreSuccess Rates Doubled with Only One Character: Mask Password...
Yunkai Zou (Nankai University), Ding Wang (Nankai University), Fei Duan (Nankai University)
Read MoreBit of a Close Talker: A Practical Guide to...
Wei Shao (University of California, Davis), Najmeh Nazari (University of California, Davis), Behnam Omidi (George Mason University), Setareh Rafatirad (University of California, Davis), Khaled N. Khasawneh (George Mason University), Houman Homayoun (University of California Davis), Chongzhou Fang (Rochester Institute of Technology)
Read More