| HoTSoS 2024 Call for Papers |
|
| HoTSoS 2024 Program Agenda |
|
| C3E 2024 Travel Reimbursement Worksheet |
|
| NSF Funded Undergraduate Computer Research in Cybersecurity and AI (UnCoRe-CyberAI) |
|
| Save the Date: Forecasting the Future of Social Norms with AI |
|
| Language Models For Formal Proof |
|
| Retrospective: 30 years of Cybersecurity R&D |
|
| Defeating Ransomware, How a Small, Midwestern University Defeated Ransomware Adversaries |
|
| Defeating Ransomware, How a Small, Midwestern University Defeated Ransomware Adversaries |
|
| Defeating Ransomware, How a Small, Midwestern University Defeated Ransomware Adversaries |
|
| HotSoS 2024 Welcome and Opening Remarks |
|
| Bots, Crawlers, and Spiders: Understanding How Automated Web Clients Find and Attack their Victims |
|
| Adversarial Data-Augmented Resilient Intrusion Detection System for Unmanned Aerial Vehicles |
|
| SyzDescribe: Principled, Automated, Static Generation of Syscall Descriptions for Kernel Drivers |
|
| Formal Specification and Verification of Architecturally-defined Attestation Mechanisms in Arm CCA and Intel TDX |
|
| Security Misconfigurations in Open Source Kubernetes Manifests: An Empirical Study |
|
| An Attack Volume Metric |
|
| A Tale of Two Industroyers: It was the Season of Darkness |
|
| Building and Testing a Network of Social Trust in an Underground Forum: Robust Connections and Overlapping Criminal Domains |
|
| MAYALOK: A Cyber-Deception Hardware Using Runtime Instruction Infusion |
|
| HoTSoS 2024: Closing Remarks |
|
| Software Certification Consortium (SCC) #22 Program Agenda |
|
| From Paper Piles to Predictive Platforms: Transforming Aerospace Design |
|
| From Brain to Bytes: Championing the Human in Artificial Intelligence |
|
| C3E 2024 Poster Template (Tall) |
|