Graph Representation Learning based Vulnerable Target Identification in Ransomware AttacksWenqi WeiMu Qiaoet al.2022Big Data 2022
Automating privacy compliance in the decentralized enterpriseGero DittmannChristopher Giblinet al.2022Big Data 2022
Full-Stack Information Extraction System for Cybersecurity IntelligenceYoungja ParkTaesung Lee2022EMNLP 2022
RAPID: Real-Time Alert Investigation with Context-aware Prioritization for Efficient Threat DiscoveryYushan LiuXiaokui Shuet al.2022ACSAC 2022
Zero Trust Hardware Architectures: when we “never trust”, what can we do to “always verify?”Mengmei YeSandhya Koteshwara2022WISE 2022
1st Workshop on Data Integrity and Secure Cloud Computing (DISCC-2022)Pradip BoseJennifer Dworaket al.2022MICRO 2022
No More Turtles: The SecondaryVM Framework - An Alternative to Nested VirtualizationMengmei YeAngelo Ruocco2022KVM Forum 2022
AI-Assisted Controls Change Management for Cybersecurity in the CloudHarshal TupsamudreArun Kumaret al.2022IAAI 2022