Search for persons
X
?
Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses ,
1
Extracting Threat Intelligence From Cheat Binaries For Anti..:
, In:
?
Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security ,
2
Cryptographic Key Derivation from Biometric Inferences for ..:
, In:
?
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security ,
3
Automated Bug Hunting With Data-Driven Symbolic Root Cause ..:
, In:
?
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security ,
4
Validating the Integrity of Audit Logs Against Execution Re..:
, In:
?
Annual Computer Security Applications Conference ,
6
On the Feasibility of Automating Stock Market Manipulation:
, In:
?
Lecture Notes in Computer Science; Information Security ,
7
Barnum: Detecting Document Malware via Control Flow Anomali..:
, In:
?
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security ,
8