S. Almasi, W. J.Knottenbelt
Protecting Users from Compromised Browsers and Form Grabbers
View More Papers
Empirical Scanning Analysis of Censys and Shodan
Christopher Bennett, AbdelRahman Abdou, and Paul C. van Oorschot (School of Computer Science, Carleton University, Canada)
Read MoreDorkPot: A Honeypot-based Analysis of Google Dorks
Florian Quinkert, Eduard Leonhardt, Thorsten Holz
Read MoreEMMasker: EM Obfuscation Against Website Fingerprinting
Mohammed Aldeen, Sisheng Liang, Zhenkai Zhang, Linke Guo (Clemson University), Zheng Song (University of Michigan – Dearborn), and Long Cheng (Clemson University)
Read More