Fatemeh Mireshghallah
How Much Can We Trust Large Language Models?
View More Papers
Learning Automated Defense Strategies Using Graph-Based Cyber Attack Simulations
Jakob Nyber, Pontus Johnson (KTH Royal Institute of Technology)
Read MoreInvestigating HbbTV Privacy Invasiveness Across European Countries
Carlotta Tagliaro (TU Wien)
Read MoreA Systematic Study of the Consistency of Two-Factor Authentication...
Sanam Ghorbani Lyastani (CISPA Helmholtz Center for Information Security, Saarland University), Michael Backes (CISPA Helmholtz Center for Information Security), Sven Bugiel (CISPA Helmholtz Center for Information Security)
Read More