Search results

  • CSV Spreadsheet
  • RSS Feed
(1 - 9 of 9)
Active Cyber Defense Planning and Orchestration
Advances in Modern Botnet Understanding and the Accurate Enumeration of Infected Hosts
Autonomous Malware Deception and Orchestration
Clustering and Recommendation Techniques for Access Control Policy Management
Data Mining and Deep Learning Systems for Network Traffic Classification and Characterization at Scale
ESIDE: The integration of secure programming education into the IDE
Formal Techniques for Cyber Resilience: Modeling, Synthesis, and Verification
HIJaX - Human Intent To JavaScript XSS Generator
Towards Effective Third-Party Application Dialogs: Solutions for Improved Attention and Comprehension