Adversarial EXEmples: functionality-preserving optimization of adversarial Windows malware
55:28
Obfuscation and Concealment Methods for Network Traffic (S. Wendzel)
43:27
Side Channels in Web Browsers: Applications to Security and Privacy (T. Rokicki)
30:08
DualCF: Efficient Model Extraction Attack from Counterfactual Explanations (H. Qian)
23:37
BAGUETTE: Hunting for evidence of malicious behavior in dynamic analysis reports (V. Raulin)
17:54
ScaDaMaLe WASP-UU 2024 -Student Group Project 11- matrees
23:56
Poneypot: Highlighting Botnet Flaws and Erratic Behaviors (G. Vachez)
3:50:19
Data Analytics for Beginners | Data Analytics Training | Data Analytics Course | Intellipaat
50:45