Applying Information Security Paradigms to Misinformation Campaigns: A Multidisciplinary Approach
Building an enterprise security knowledge graph to fuel better decisions, faster
Grapl - A Graph Platform for Detection and Response
Profiling User Risk: Borrowing from Business Intelligence to Understand the Security of Your Userbase
Reducing Inactionable Alerts via Policy Layer
Trying (Unsuccessfully) to Make Meterpreter into an Adversarial Example
Evaluating Code Embeddings
Security data science -- Getting the fundamentals right
Is This Magikarp a Gyarados?: Using Machine Learning for Phishing Detection
Old things are new again: efficient automatic signature generation for malware classification
Reduce, Reuse and Recycle ML models - and the security powers is yours
Scheming with Machines: Using ML to Support Offensive Teams
Birthday Hunting
All that glitters isn't Chrome: Hunting for suspicious browser extensions
Scratching the Surface of Risk