J. Lee, P. Ye, R. Liu, D. Divakaran, C. Choon
Building Robust Phishing Detection System: an Empirical Analysis
View More Papers
DorkPot: A Honeypot-based Analysis of Google Dorks
Florian Quinkert, Eduard Leonhardt, Thorsten Holz
Read MoreApplying Accessibility Metrics to Measure the Threat Landscape for...
John Breton, AbdelRahman Abdou (Carleton University)
Read MoreA Few-Shot Practical Behavioral Biometrics Model for Login Authentication...
J. Solano, L. Tengana, A. Castelblanco, E. Rivera, C. Lopez, M. Ochoa
Read MoreAnalysis of the Effect of the Difference between Japanese...
Rei Yamagishi, Shinya Sasa, and Shota Fujii (Hitachi, Ltd.)
Read More