USENIX Enigma 2017 — What Cybersecurity Can Learn from the Secret Service
USENIX Enigma 2017 — FeatureSmith: Learning to Detect Malware by Mining the Security Literature
USENIX Enigma 2017 — Brains Can Be Hacked. Why Should You Care?
USENIX Enigma 2017 — Cyber Security: A DARPA Perspective
USENIX Enigma 2017 — Security for Vulnerable Populations - On the Interplay of ...
USENIX Enigma 2017 — Test Driven Security in Continuous Integration
USENIX Enigma 2017 — StreamAlert: A Serverless, Real-time Intrusion Detection Engine
USENIX Enigma 2017 — Adversarial Examples in Machine Learning
USENIX Enigma 2017 — National Scale Cyber Security
USENIX Enigma 2017 — Ghost in the Machine: Challenges in Embedded Binary Security
USENIX Enigma 2017 — Classifiers under Attack
USENIX Enigma 2017 — Secrets at Scale: Automated Bootstrapping of Secrets & Identity in the Cloud
USENIX Enigma 2017 — Leveraging the Power of Automated Reasoning in ...
USENIX Enigma 2017 — Understanding and Securing DoD Weapon Systems
USENIX Enigma 2017 — Human Computation with an Application to Passwords
USENIX Enigma 2017 — Behaviors and Patterns of Bulletproof and Anonymous Hosting Providers
USENIX Enigma 2017 — Neural and Behavioral Insights on Trust
USENIX Enigma 2017 — Drawing the Foul: Operation of a DDoS Honeypot
USENIX Enigma 2017 — Understanding and Designing for End Users' Security Expectations
USENIX Enigma 2017 — Why Philanthropy Is Critical for Cybersecurity