Real-Time Outlier Connections Detection in Databases Network TrafficLeonid RodnianskyTania Butovskyet al.2025arXiv
WannaLaugh: A Configurable Ransomware EmulatorDionysios DiamantopoulosRoman Pletkaet al.2024SYSTOR 2024
True Attacks, Attack Attempts, or Benign Triggers? An Empirical Measurement of Network Alerts in a Security Operations CenterLimin YangZhi Chenet al.2024USENIX Security 2024
Automated Synthesis of Effect Graph Policies for Microservice-Aware Stateful System Call SpecializationWill BlairFred Araujoet al.2024S&P 2024
Pruning Federated Learning Models for Anomaly Detection in Resource-Constrained EnvironmentsSimone MagnaniStefano Braghinet al.2023Big Data 2023
Are GNNs the Right Tool to Mine the Blockchain? The Case of the Bitcoin Generator ScamZhikun YuenPaula Brancoet al.2023DSAA 2023
SoCurity: A Design Approach for Enhancing SoC SecurityNaorin HossainAlper Buyuktosunogluet al.2023DAC 2023
Benchmarking the Effect of Poisoning Defenses on the Security and Bias of Deep Learning ModelsNathalie Baracaldo AngelFarhan Ahmedet al.2023S&P 2023
Fashion Faux Pas: Implicit Stylistic Fingerprints for Bypassing Browsers' Anti-Fingerprinting DefensesXu LinFrederico Araujoet al.2023S&P 2023