Florian Quinkert, Eduard Leonhardt, Thorsten Holz
DorkPot: A Honeypot-based Analysis of Google Dorks
View More Papers
Building Robust Phishing Detection System: an Empirical Analysis
J. Lee, P. Ye, R. Liu, D. Divakaran, C. Choon
Read MoreDeFiIntel: A Dataset Bridging On-Chain and Off-Chain Data for...
Iori Suzuki (Graduate School of Environment and Information Sciences, Yokohama National University), Yin Minn Pa Pa (Institute of Advanced Sciences, Yokohama National University), Nguyen Thi Van Anh (Institute of Advanced Sciences, Yokohama National University), Katsunari Yoshioka (Graduate School of Environment and Information Sciences, Yokohama National University)
Read MoreA First Look at Scams on YouTube
Elijah Bouma-Sims, Bradley Reaves (North Carolina State University)
Read MoreEmpirical Scanning Analysis of Censys and Shodan
Christopher Bennett, AbdelRahman Abdou, and Paul C. van Oorschot (School of Computer Science, Carleton University, Canada)
Read More