Title Date
Round 2 - 11th Competition.zip
21 - AIML for Network Security The Emperor has no Clothes - NS.pdf
21 - AIML for Network Security The Emperor has no Clothes.pdf
22 - The Security and Privacy Acceptance Framework - NS.pdf
22 - The Security and Privacy Acceptance Framework.pdf
23 - Uninvited Guests Analyzing the Identity and Behavior of Certificate Transparency Bots - NS.pdf
23 - Uninvited Guests Analyzing the Identity and Behavior of Certificate Transparency Bots.pdf
25 - EpiGRAM Practical Garbled RAM - NS.pdf
25 - EpiGRAM Practical Garbled RAM.pdf
26 - Evaluating Mail Based Security for Electoral Processes Using Attack Trees - NS.pdf
26 - Evaluating Mail Based Security for Electoral Processes Using Attack Trees.pdf
27 - Electronic Monitoring Smartphone Apps - NS.pdf
27 - Electronic Monitoring Smartphone Apps.pdf
28 - Privacy Preserving and Efficient Verification of the Outcome in Genome Wide Association Studies - NS.pdf
28 - Privacy Preserving and Efficient Verification of the Outcome in Genome Wide Association Studies.pdf
29 - Progressive Scrutiny Incremental Detection of UBI bugs in the Linux Kernel - NS.pdf
29 - Progressive Scrutiny Incremental Detection of UBI bugs in the Linux Kernel.pdf
30 - A Wolf in Sheeps Clothing Spready Deadly Pathogens Under the Disguise of Popular Music - NS.pdf
30 - A Wolf in Sheeps Clothing Spready Deadly Pathogens Under the Disguise of Popular Music.pdf
1 - Verified_Security_for_the_Morello Capability-Enhanced.pdf
1 - Verified_Security_for_the_Morello Capability-Enhanced_NS.pdf
2 - Dos and Donts of Machine Learning in Computer Security - NS.pdf
2 - Dos and Donts of Machine Learning in Computer Security.pdf