B. Kaleli, G. Stringhini, M. Egele
Studying the Privacy Issues of the Incorrect Use of the Feature Policy
View More Papers
Detecting Tor Bridge from Sampled Traffic in Backbone Networks
Hua Wu (School of Cyber Science & Engineering and Key Laboratory of Computer Network and Information Integration Southeast University, Ministry of Education, Jiangsu Nanjing, Purple Mountain Laboratories for Network and Communication Security (Nanjing, Jiangsu)), Shuyi Guo, Guang Cheng, Xiaoyan Hu (School of Cyber Science & Engineering and Key Laboratory of Computer Network and Information Integration…
Read MoreDeFiIntel: A Dataset Bridging On-Chain and Off-Chain Data for...
Iori Suzuki (Graduate School of Environment and Information Sciences, Yokohama National University), Yin Minn Pa Pa (Institute of Advanced Sciences, Yokohama National University), Nguyen Thi Van Anh (Institute of Advanced Sciences, Yokohama National University), Katsunari Yoshioka (Graduate School of Environment and Information Sciences, Yokohama National University)
Read MoreMeasuring the Impact of HTTP/2 and Server Push on...
Weiran Lin, Sanjeev Reddy, Nikita Borisov
Read More