1

Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks
Revisiting Client Puzzles for State Exhaustion Attacks Resilience
An Unsupervised Multi-Detector Approach for Identifying Malicious Lateral Movement
Accounting for the human user in predictive security models
A Game-Theoretic Approach to Respond to Attacker Lateral Movement
Portable Parallel Programs using architecture-aware libraries