J. Solano, L. Tengana, A. Castelblanco, E. Rivera, C. Lopez, M. Ochoa
A Few-Shot Practical Behavioral Biometrics Model for Login Authentication in Web Applications
View More Papers
Free Proxies Unmasked: A Vulnerability and Longitudinal Analysis of...
Naif Mehanna (Univ. Lille / Inria / CNRS), Walter Rudametkin (IRISA / Univ Rennes), Pierre Laperdrix (CNRS, Univ Lille, Inria Lille), and Antoine Vastel (Datadome)
Read MoreDetecting Tor Bridge from Sampled Traffic in Backbone Networks
Hua Wu (School of Cyber Science & Engineering and Key Laboratory of Computer Network and Information Integration Southeast University, Ministry of Education, Jiangsu Nanjing, Purple Mountain Laboratories for Network and Communication Security (Nanjing, Jiangsu)), Shuyi Guo, Guang Cheng, Xiaoyan Hu (School of Cyber Science & Engineering and Key Laboratory of Computer Network and Information Integration…
Read MoreTowards Anonymous Chatbots with (Un)Trustworthy Browser Proxies
Dzung Pham, Jade Sheffey, Chau Minh Pham, and Amir Houmansadr (University of Massachusetts Amherst)
Read MoreShipping security at scale in the Chrome browser
Adriana Porter Felt (Director of Engineering for Chrome)
Read More