Cybersecurity Technologies S08-349 Geosecurity System – Geotags from Multiple Sources and Noisy Location Data Di Qiu Per Enge Dan Boneh Sherman Lo David De Lorenzo S22-139 LightHash: Photonic Blockchain Based on Optical Proof-of-Work Sunil Pai David Miller Olav Solgaard Shanhui Fan Michael Dubrovsky Bogdan Penkovsky Marshall Ball S22-217 Anomaly Detection in Complex Data Streams Daniel Ratner Eric Darve Ryan Humble S19-208 Improved Anomaly Detection Using Adversarially Learned Inference Ziyi Yang Eric Darve Iman Soltani Bozchalooi S06-321 Proxy Identity Based Encryption Toshihiko Matsuo Dan Boneh Eu-Jin Goh S06-260 Host-Based Detection of Remotely Controlled Malware John Mitchell Elizabeth Stinson S13-249 Android Program Analysis Tools Jason Franklin John Mitchell Alex Aiken Saswat Anand
S08-349 Geosecurity System – Geotags from Multiple Sources and Noisy Location Data Di Qiu Per Enge Dan Boneh Sherman Lo David De Lorenzo
S22-139 LightHash: Photonic Blockchain Based on Optical Proof-of-Work Sunil Pai David Miller Olav Solgaard Shanhui Fan Michael Dubrovsky Bogdan Penkovsky Marshall Ball
S19-208 Improved Anomaly Detection Using Adversarially Learned Inference Ziyi Yang Eric Darve Iman Soltani Bozchalooi