C. Kelton, A. Balasubramanian, R. Raghavendra, M. Srivatsa
Browser-Based Deep Behavioral Detection of Web Cryptomining with CoinSpy
View More Papers
DorkPot: A Honeypot-based Analysis of Google Dorks
Florian Quinkert, Eduard Leonhardt, Thorsten Holz
Read Moreinsecure:// Vulnerability Analysis of URI Scheme Handling in Android...
Abdulla Aldoseri (University of Birmingham) and David Oswald (University of Birmingham)
Read MoreA Few-Shot Practical Behavioral Biometrics Model for Login Authentication...
J. Solano, L. Tengana, A. Castelblanco, E. Rivera, C. Lopez, M. Ochoa
Read MoreDetecting Tor Bridge from Sampled Traffic in Backbone Networks
Hua Wu (School of Cyber Science & Engineering and Key Laboratory of Computer Network and Information Integration Southeast University, Ministry of Education, Jiangsu Nanjing, Purple Mountain Laboratories for Network and Communication Security (Nanjing, Jiangsu)), Shuyi Guo, Guang Cheng, Xiaoyan Hu (School of Cyber Science & Engineering and Key Laboratory of Computer Network and Information Integration…
Read More