J. Lee, P. Ye, R. Liu, D. Divakaran, C. Choon
Building Robust Phishing Detection System: an Empirical Analysis
View More Papers
Free Proxies Unmasked: A Vulnerability and Longitudinal Analysis of...
Naif Mehanna (Univ. Lille / Inria / CNRS), Walter Rudametkin (IRISA / Univ Rennes), Pierre Laperdrix (CNRS, Univ Lille, Inria Lille), and Antoine Vastel (Datadome)
Read MoreNinjaDoH: A Censorship-Resistant Moving Target DoH Server Using Hyperscalers...
Scott Seidenberger (University of Oklahoma), Marc Beret (University of Oklahoma), Raveen Wijewickrama (University of Texas at San Antonio), Murtuza Jadliwala (University of Texas at San Antonio), Anindya Maiti (University of Oklahoma)
Read MoreWork-in-progress: Spurious Credentials in Breach Compilations
Lucas Stephens (Oregon State University), Jacob Porter (Oregon State University), Zane Ma (Oregon State University)
Read More