Tobias Länge (SECUSO, Karlsruhe Institute of Technology, Karlsruhe, Germany), Fabian Lucas Ballreich (SECUSO, Karlsruhe Institute of Technology, Karlsruhe, Germany), Anne Hennig (SECUSO, Karlsruhe Institute of Technology, Karlsruhe, Germany), Peter Mayer (SECUSO, Karlsruhe Institute of Technology, Karlsruhe, Germany), Melanie Volkamer (SECUSO, Karlsruhe Institute of Technology, Karlsruhe, Germany)
From Matrix to Metrics: Introducing and Applying a Configuration Matrix to Evaluate DMARC Policies
View More Papers
BACnet or “BADnet”? On the (In)Security of Implicitly Reserved...
Qiguang Zhang (Southeast University), Junzhou Luo (Southeast University, Fuyao University of Science and Technology), Zhen Ling (Southeast University), Yue Zhang (Shandong University), Chongqing Lei (Southeast University), Christopher Morales (University of Massachusetts Lowell), Xinwen Fu (University of Massachusetts Lowell)
Read MoreOrbital Escalation: Modeling Satellite Ransomware Attacks Using Game Theory
Efrén López-Morales (New Mexico State University)
Read MoreWhat the Fork? Finding and Analyzing Malware in GitHub...
Alan Cao (New York University) and Brendan Dolan-Gavitt (New York University)
Read More