Showing results 1 to 5 of 5
Title | Author(s) | Issue Date | |
---|---|---|---|
Bookworm game: Automatic discovery of LTE vulnerabilities through documentation analysis Proceeding/Conference:Proceedings - IEEE Symposium on Security and Privacy | 2021 | ||
Drugs and bitcoins: What role do bitcoins play in the darknet market? A preliminary study Proceeding/Conference:Proceedings of the Association for Information Science and Technology | 2018 | ||
Dynamic scholarly collaborator recommendation via competitive multi-agent reinforcement learning Proceeding/Conference:RecSys 2017 - Proceedings of the 11th ACM Conference on Recommender Systems | 2017 | ||
Seeing the Forest for the Trees: Understanding Security Hazards in the 3GPP Ecosystem through Intelligent Analysis on Change Requests Proceeding/Conference:Proceedings of the 31st USENIX Security Symposium, Security 2022 | 2022 | ||
Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning Proceeding/Conference:32nd USENIX Security Symposium, USENIX Security 2023 | 2023 |