Theme Selector
Filter by
No Results Found, Please Adjust Your Search
Cybersecurity
DROIDCCT: Cryptographic Compliance Test via Trillion-Scale Measurement
ACSAC 2025
ai
Autonomous Timeline Analysis and Threat Hunting
DEF CON 33 2025
ai
Autonomous Timeline Analysis and Threat Hunting
BH25 2025
AI
Toward Secure & Trustworthy AI: Independent Benchmarking
InCyber Forum 2025
AI
AI for Cybersecurity: Get Started Today
Sectember AI 2024
AI
AI Security: Top 5 Recommendations To Get Started Today
DevFest 2024
AI
Lessons Learned from Developing Secure AI Workflows at Google
RSA 2024
AI
How Large Language Models Are Reshaping the Cybersecurity Landscape
RSA 2024
cybersecurity
How AI helps keeping Gmail inboxes malware free
FIC 2023
cybersecurity
Building Safe End-to-End Encrypted Services for Business - a Google Workspace perspective
RSA 2022
cybersecurity
Designing Toxic Content Classification for a Diversity of Perspectives
SOUPS 2021
cybersecurity
SoK: Hate, Harassment, and the Changing Landscape of Online Abuse
S&P 2021
cybersecurity
Who is targeted by email-based phishing and malware? Measuring factors that differentiate risk
IMC 2020
cybersecurity
Why wouldn't someone think of democracy as a target? Security practices & challenges of people involved with U.S. political campaigns"
Usenix Security 2021
cybersecurity
Deep-Cryptanalysis - Fashion or Revolution?
WAC 2021
how-to
Stay safe online in 10 easy steps
Aug 2021
cryptography
Hacker's guide to deep-learning side-channel attacks: code walkthrough
Jun 2021
cryptography
Hacker's guide to deep-learning side-channel attacks: the theory
May 2021
cybersecurity
Inside Mirai the infamous IoT Botnet: A Retrospective Analysis
Dec 2017