CATCHING INSIDER DATA THEFT WITH STOCHASTIC FORENSICS
FIND ME IN YOUR DATABASE: AN EXAMINATION OF INDEX SECURITY
PASSIVE BLUETOOTH MONITORING IN SCAPY
SYNFUL DECEIT, STATEFUL SUBTERFUGE
STAMP OUT HASH CORRUPTION, CRACK ALL THE THINGS
CLONEWISE - AUTOMATED PACKAGE CLONE DETECTION
SSRF VS. BUSINESS CRITICAL APPLICATIONS