Round 2 - 11th Competition.zip |
|
21 - AIML for Network Security The Emperor has no Clothes - NS.pdf |
|
21 - AIML for Network Security The Emperor has no Clothes.pdf |
|
22 - The Security and Privacy Acceptance Framework - NS.pdf |
|
22 - The Security and Privacy Acceptance Framework.pdf |
|
23 - Uninvited Guests Analyzing the Identity and Behavior of Certificate Transparency Bots - NS.pdf |
|
23 - Uninvited Guests Analyzing the Identity and Behavior of Certificate Transparency Bots.pdf |
|
25 - EpiGRAM Practical Garbled RAM - NS.pdf |
|
25 - EpiGRAM Practical Garbled RAM.pdf |
|
26 - Evaluating Mail Based Security for Electoral Processes Using Attack Trees - NS.pdf |
|
26 - Evaluating Mail Based Security for Electoral Processes Using Attack Trees.pdf |
|
27 - Electronic Monitoring Smartphone Apps - NS.pdf |
|
27 - Electronic Monitoring Smartphone Apps.pdf |
|
28 - Privacy Preserving and Efficient Verification of the Outcome in Genome Wide Association Studies - NS.pdf |
|
28 - Privacy Preserving and Efficient Verification of the Outcome in Genome Wide Association Studies.pdf |
|
29 - Progressive Scrutiny Incremental Detection of UBI bugs in the Linux Kernel - NS.pdf |
|
29 - Progressive Scrutiny Incremental Detection of UBI bugs in the Linux Kernel.pdf |
|
30 - A Wolf in Sheeps Clothing Spready Deadly Pathogens Under the Disguise of Popular Music - NS.pdf |
|
30 - A Wolf in Sheeps Clothing Spready Deadly Pathogens Under the Disguise of Popular Music.pdf |
|
1 - Verified_Security_for_the_Morello Capability-Enhanced.pdf |
|
1 - Verified_Security_for_the_Morello Capability-Enhanced_NS.pdf |
|
2 - Dos and Donts of Machine Learning in Computer Security - NS.pdf |
|
2 - Dos and Donts of Machine Learning in Computer Security.pdf |
|