C. Kelton, A. Balasubramanian, R. Raghavendra, M. Srivatsa
Browser-Based Deep Behavioral Detection of Web Cryptomining with CoinSpy
View More Papers
insecure:// Vulnerability Analysis of URI Scheme Handling in Android...
Abdulla Aldoseri (University of Birmingham) and David Oswald (University of Birmingham)
Read MoreDorkPot: A Honeypot-based Analysis of Google Dorks
Florian Quinkert, Eduard Leonhardt, Thorsten Holz
Read MoreCharacterizing the Adoption of Security.txt Files and their Applications...
William Findlay (Carleton University) and AbdelRahman Abdou (Carleton University)
Read MoreCan Public IP Blocklists Explain Internet Radiation?
Simone Cossaro (University of Trieste), Damiano Ravalico (University of Trieste), Rodolfo Vieira Valentim (University of Turin), Martino Trevisan (University of Trieste), Idilio Drago (University of Turin)
Read More