News
OSDI brings together professionals from academic and industrial backgrounds in what has become a premier forum for discussing the design, implementation, and implications of systems software. The ...
Advance Persistent Threats (APTs), adopted by most delicate attackers, are becoming increasing common and pose great threat to various enterprises and institutions. Data provenance analysis on ...
Deep learning has proven to be promising for traffic fingerprinting that explores features of packet timing and sizes. Although well-known for automatic feature extraction, it is faced with a gap ...
Pascal Lafourcade and Dhekra Mahmoud, Université Clermont Auvergne, CNRS, Clermont Auvergne INP, Mines Saint-Etienne, LIMOS, 63000 Clermont-Ferrand, France; Sylvain Ruhault and Abdul Rahman Taleb, ...
Sai Ritvik Tanksalkar, Siddharth Muralee, Datta manikanta sri hari Danduri, Paschal Amusuo, Antonio Bianchi, James C Davis, and Aravind Machiry, Purdue University ...
Divyanshu Bhardwaj and Sumair Ijaz Hashmi, CISPA Helmholtz Center for Information Security, Saarland University; Katharina Krombholz and Maximilian Golla, CISPA Helmholtz Center for Information ...
SoK: Inaccessible & Insecure: An Exposition of Authentication Challenges Faced by Blind and Visually Impaired Users in State-of-the-Art Academic Proposals ...
BLuEMan: A Stateful Simulation-based Fuzzing Framework for Open-Source RTOS Bluetooth Low Energy Protocol Stacks ...
Jinwen He, Yiyang Lu, Zijin Lin, Kai Chen, and Yue Zhao, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China ...
Zibo Gao, Junjie Hu, Feng Guo, Yixin Zhang, Yinglong Han, Siyuan Liu, Haiyang Li, and Zhiqiang Lv, Institute of Information Engineering, Chinese Academy of Sciences. School of Cyber Security, ...
We define a two-state Markov model for a port's power states, transitioning between a high-power and a low-power state. The transition is assumed to take a finite time . Every port consumes 3W in its ...
"I Cannot Write This Because It Violates Our Content Policy'': Understanding Content Moderation Policies and User Experiences in Generative AI Products ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results