B. Kaleli, G. Stringhini, M. Egele
Studying the Privacy Issues of the Incorrect Use of the Feature Policy
View More Papers
Characterizing the Adoption of Security.txt Files and their Applications...
William Findlay (Carleton University) and AbdelRahman Abdou (Carleton University)
Read MoreAnalysis of the Effect of the Difference between Japanese...
Rei Yamagishi, Shinya Sasa, and Shota Fujii (Hitachi, Ltd.)
Read MoreChhoyhopper: A Moving Target Defense with IPv6
A S M Rizvi (University of Southern California/Information Sciences Institute) and John Heidemann (University of Southern California/Information Sciences Institute)
Read MoreK-resolver: Towards Decentralizing Encrypted DNS Resolution
N.P. Hoang, I. Lin, S. Ghavamnia, M. Polychronakis
Read More