Florian Quinkert, Eduard Leonhardt, Thorsten Holz
DorkPot: A Honeypot-based Analysis of Google Dorks
View More Papers
Characterizing the Adoption of Security.txt Files and their Applications...
William Findlay (Carleton University) and AbdelRahman Abdou (Carleton University)
Read MoreWork-in-progress: Uncovering the Invisible: A Large-Scale Analysis of Service...
Sivakanesan Dhanushkanda (Old Dominion University), Mustafa Ibrahim (Old Dominion University), Shuai Hao (Old Dominion University)
Read More[WITHDRAWN] First, Do No Harm: Studying the manipulation of...
Shubham Agarwal (Saarland University), Ben Stock (CISPA Helmholtz Center for Information Security)
Read More