Nethanel Gelernter, Itamar Peretz
Cross-Site Challenge-Response Attacks
View More Papers
Building Robust Phishing Detection System: an Empirical Analysis
J. Lee, P. Ye, R. Liu, D. Divakaran, C. Choon
Read MoreDetecting Tor Bridge from Sampled Traffic in Backbone Networks
Hua Wu (School of Cyber Science & Engineering and Key Laboratory of Computer Network and Information Integration Southeast University, Ministry of Education, Jiangsu Nanjing, Purple Mountain Laboratories for Network and Communication Security (Nanjing, Jiangsu)), Shuyi Guo, Guang Cheng, Xiaoyan Hu (School of Cyber Science & Engineering and Key Laboratory of Computer Network and Information Integration…
Read MoreWork-in-Progress: Uncovering Dark Patterns: A Longitudinal Study of Cookie...
Zihan Qu (Johns Hopkins University), Xinyi Qu (University College London), Xin Shen, Zhen Liang, and Jianjia Yu (Johns Hopkins University)
Read MoreAn Adaptive Method for Cross-Platform Browser History Sniffing
A. Huang, C. Zhu, D. Wu, Y. Xie, X. Luo
Read More