theme image

cybersecurity

cybersecurity
profile
AI for Cybersecurity: Get Started Today
AI

AI for Cybersecurity: Get Started Today

Sectember AI 2024

AI Security: Top 5 Recommendations To Get Started Today
AI

AI Security: Top 5 Recommendations To Get Started Today

DevFest 2024

Lessons Learned from Developing Secure AI Workflows at Google
AI

Lessons Learned from Developing Secure AI Workflows at Google

RSA 2024

How Large Language Models Are Reshaping the Cybersecurity Landscape
AI

How Large Language Models Are Reshaping the Cybersecurity Landscape

RSA 2024

 How AI helps keeping Gmail inboxes malware free
cybersecurity

How AI helps keeping Gmail inboxes malware free

FIC 2023

Building Safe End-to-End Encrypted Services for Business - a Google Workspace perspective
cybersecurity

Building Safe End-to-End Encrypted Services for Business - a Google Workspace perspective

RSA 2022

Designing Toxic Content Classification for a Diversity of Perspectives
cybersecurity

Designing Toxic Content Classification for a Diversity of Perspectives

SOUPS 2021

SoK: Hate, Harassment, and the Changing Landscape of Online Abuse
cybersecurity

SoK: Hate, Harassment, and the Changing Landscape of Online Abuse

S&P 2021

Who is targeted by email-based phishing and malware? Measuring factors that differentiate risk
cybersecurity

Who is targeted by email-based phishing and malware? Measuring factors that differentiate risk

IMC 2020

Why wouldn't someone think of democracy as a target? Security practices & challenges of people involved with U.S. political campaigns"
cybersecurity

Why wouldn't someone think of democracy as a target? Security practices & challenges of people involved with U.S. political campaigns"

Usenix Security 2021

Deep-Cryptanalysis - Fashion or Revolution?
cybersecurity

Deep-Cryptanalysis - Fashion or Revolution?

WAC 2021

Stay safe online in 10 easy steps
how-to

Stay safe online in 10 easy steps

Aug 2021

Hacker's guide to deep-learning side-channel attacks: code walkthrough
cryptography

Hacker's guide to deep-learning side-channel attacks: code walkthrough

Jun 2021

Hacker's guide to deep-learning side-channel attacks: the theory
cryptography

Hacker's guide to deep-learning side-channel attacks: the theory

May 2021

Inside Mirai the infamous IoT Botnet: A Retrospective Analysis
cybersecurity

Inside Mirai the infamous IoT Botnet: A Retrospective Analysis

Dec 2017

newsletter signup slide

Get cutting edge research directly in your inbox.

newsletter signup slide

Get cutting edge research directly in your inbox.