YoVDO

IEEE Symposium on Security and Privacy Courses

Why Crypto-Detectors Fail - A Systematic Evaluation of Cryptographic Misuse Detection Techniques
IEEE via YouTube
DEPCOMM - Graph Summarization on System Audit Logs for Attack Investigation
IEEE via YouTube
SPURT - Scalable Distributed Randomness Beacon with Transparent Setup
IEEE via YouTube
DeepCASE - Semi-Supervised Contextual Analysis of Security Events
IEEE via YouTube
A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols
IEEE via YouTube
IronMask - Versatile Verification of Masking Security
IEEE via YouTube
Transcending TRANSCEND - Revisiting Malware Classification in the Presence of Concept Drift
IEEE via YouTube
Statistical Quantification of Differential Privacy - A Local Approach
IEEE via YouTube
Differentially Private Histograms in the Shuffle Model from Fake Users
IEEE via YouTube
Differential Privacy and Swapping - Examining De-Identification's Impact on Minority Representation and Privacy Preservation in the U.S. Census
IEEE via YouTube
< Prev Page 19 Next >