HoTSoS 2024 Call for Papers |
|
HoTSoS 2024 Program Agenda |
|
C3E 2024 Travel Reimbursement Worksheet |
|
NSF Funded Undergraduate Computer Research in Cybersecurity and AI (UnCoRe-CyberAI) |
|
Save the Date: Forecasting the Future of Social Norms with AI |
|
Language Models For Formal Proof |
|
Retrospective: 30 years of Cybersecurity R&D |
|
Defeating Ransomware, How a Small, Midwestern University Defeated Ransomware Adversaries |
|
Defeating Ransomware, How a Small, Midwestern University Defeated Ransomware Adversaries |
|
Defeating Ransomware, How a Small, Midwestern University Defeated Ransomware Adversaries |
|
HotSoS 2024 Welcome and Opening Remarks |
|
Bots, Crawlers, and Spiders: Understanding How Automated Web Clients Find and Attack their Victims |
|
Adversarial Data-Augmented Resilient Intrusion Detection System for Unmanned Aerial Vehicles |
|
SyzDescribe: Principled, Automated, Static Generation of Syscall Descriptions for Kernel Drivers |
|
Formal Specification and Verification of Architecturally-defined Attestation Mechanisms in Arm CCA and Intel TDX |
|
Security Misconfigurations in Open Source Kubernetes Manifests: An Empirical Study |
|
An Attack Volume Metric |
|
A Tale of Two Industroyers: It was the Season of Darkness |
|
Building and Testing a Network of Social Trust in an Underground Forum: Robust Connections and Overlapping Criminal Domains |
|
MAYALOK: A Cyber-Deception Hardware Using Runtime Instruction Infusion |
|
HoTSoS 2024: Closing Remarks |
|
Program Agenda |
|
From Paper Piles to Predictive Platforms: Transforming Aerospace Design |
|
From Brain to Bytes: Championing the Human in Artificial Intelligence |
|
C3E 2024 Poster Template (Tall) |
|