Search Results for "-I구글-웹문서-광고─텔레hhu9999─대출-찌라시광고-작업웹문서-홍보“찌라시-광고이달㏝찌라시-광고1등업체㏘.ffs.-.oyq"

Industrial Experience of Finding Cryptographic Vulnerabilities in Large-scale Codebases

Coding Practices and Recommendations of Spring Security for Enterprise Applications

Privacy Guarantees of BLE Contact Tracing: A Case Study on COVIDWISE

Embedding Code Contexts for Cryptographic API Suggestion: New Methodologies and Comparisons

Data-Driven Vulnerability Detection and Repair in Java Code

Tutorial: Investigating Advanced Exploits for System Security Assurance

Salman Ahmed, Long Cheng, Hans Liljestrand, N. Asokan, Danfeng Daphne Yao: Tutorial: Investigating Advanced Exploits for System Security Assurance. SecDev 2021: 3-4

Measurement of Local Differential Privacy Techniques for IoT-based Streaming Data

Sharmin Afrose, Danfeng Daphne Yao, Olivera Kotevska: Measurement of Local Differential Privacy Techniques for IoT-based Streaming Data. PST 2021: 1-10

Measurable and Deployable Security: Gaps, Successes, and Opportunities

Danfeng (Daphne) Yao: Measurable and Deployable Security: Gaps, Successes, and Opportunities. CODASPY 2021: 3

Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches

Context-Rich Privacy Leakage Analysis Through Inferring Apps in Smart Home IoT