Real-Time Outlier Connections Detection in Databases Network TrafficLeonid RodnianskyTania Butovskyet al.2025arXiv
Crossing Shifted Moats: Replacing Old Bridges with New Tunnels to Confidential ContainersRay ValdezMd Salman Ahmedet al.2024CCS 2024
Enhancing Transparency and Accountability of TPLs with PBOM: A Privacy Bill of MaterialsYue XiaoAdwait Nadkarniet al.2024CCS 2024
WannaLaugh: A Configurable Ransomware EmulatorDionysios DiamantopoulosRoman Pletkaet al.2024SYSTOR 2024
Dynamic Possible Source Count Analysis for Data Leakage PreventionEri OgawaTetsuro Yamazakiet al.2024MPLR 2024