J. Lee, P. Ye, R. Liu, D. Divakaran, C. Choon
Building Robust Phishing Detection System: an Empirical Analysis
View More Papers
Detecting Tor Bridge from Sampled Traffic in Backbone Networks
Hua Wu (School of Cyber Science & Engineering and Key Laboratory of Computer Network and Information Integration Southeast University, Ministry of Education, Jiangsu Nanjing, Purple Mountain Laboratories for Network and Communication Security (Nanjing, Jiangsu)), Shuyi Guo, Guang Cheng, Xiaoyan Hu (School of Cyber Science & Engineering and Key Laboratory of Computer Network and Information Integration…
Read MoreK-resolver: Towards Decentralizing Encrypted DNS Resolution
N.P. Hoang, I. Lin, S. Ghavamnia, M. Polychronakis
Read MoreFP-Crawlers: Studying the Resilience of Browser Fingerprinting to Block...
A. Vastel, W. Rudametkin, R. Rouvoy, X. Blanc
Read MoreEMMasker: EM Obfuscation Against Website Fingerprinting
Mohammed Aldeen, Sisheng Liang, Zhenkai Zhang, Linke Guo (Clemson University), Zheng Song (University of Michigan – Dearborn), and Long Cheng (Clemson University)
Read More