N.P. Hoang, I. Lin, S. Ghavamnia, M. Polychronakis
K-resolver: Towards Decentralizing Encrypted DNS Resolution
View More Papers
Work-in-progress: Spurious Credentials in Breach Compilations
Lucas Stephens (Oregon State University), Jacob Porter (Oregon State University), Zane Ma (Oregon State University)
Read MoreFrom Matrix to Metrics: Introducing and Applying a Configuration...
Tobias Länge (SECUSO, Karlsruhe Institute of Technology, Karlsruhe, Germany), Fabian Lucas Ballreich (SECUSO, Karlsruhe Institute of Technology, Karlsruhe, Germany), Anne Hennig (SECUSO, Karlsruhe Institute of Technology, Karlsruhe, Germany), Peter Mayer (SECUSO, Karlsruhe Institute of Technology, Karlsruhe, Germany), Melanie Volkamer (SECUSO, Karlsruhe Institute of Technology, Karlsruhe, Germany)
Read MoreBuilding Robust Phishing Detection System: an Empirical Analysis
J. Lee, P. Ye, R. Liu, D. Divakaran, C. Choon
Read More