Florian Quinkert, Eduard Leonhardt, Thorsten Holz
DorkPot: A Honeypot-based Analysis of Google Dorks
View More Papers
Characterizing the Adoption of Security.txt Files and their Applications...
William Findlay (Carleton University) and AbdelRahman Abdou (Carleton University)
Read MoreEmpirical Scanning Analysis of Censys and Shodan
Christopher Bennett, AbdelRahman Abdou, and Paul C. van Oorschot (School of Computer Science, Carleton University, Canada)
Read MoreFive Word Password Composition Policy
Sirvan Almasi (Imperial College London), William J. Knottenbelt (Imperial College London)
Read MoreA First Look at Scams on YouTube
Elijah Bouma-Sims, Bradley Reaves (North Carolina State University)
Read More