S. Almasi, W. J.Knottenbelt
Protecting Users from Compromised Browsers and Form Grabbers
View More Papers
[WITHDRAWN] First, Do No Harm: Studying the manipulation of...
Shubham Agarwal (Saarland University), Ben Stock (CISPA Helmholtz Center for Information Security)
Read MoreBridging the Privacy Gap: Enhanced User Consent Mechanisms on...
Carl Magnus Bruhner (Linkoping University), David Hasselquist (Linkoping University, Sectra Communications), Niklas Carlsson (Linkoping University)
Read MoreDorkPot: A Honeypot-based Analysis of Google Dorks
Florian Quinkert, Eduard Leonhardt, Thorsten Holz
Read MoreComparative Analysis of the DoT with HTTPS Certificate Ecosystems
Ali Sadeghi Jahromi, AbdelRahman Abdou (Carleton University)
Read More