B. Kaleli, G. Stringhini, M. Egele
Studying the Privacy Issues of the Incorrect Use of the Feature Policy
View More Papers
Why do Internet Devices Remain Vulnerable? A Survey with...
Tamara Bondar, Hala Assal, AbdelRahman Abdou (Carleton University)
Read MoreBrowser-Based Deep Behavioral Detection of Web Cryptomining with CoinSpy
C. Kelton, A. Balasubramanian, R. Raghavendra, M. Srivatsa
Read MoreEvaluating the Strength and Availability of Multilingual Passphrase Authentication
Chi-en Amy Tai (University of Waterloo), Urs Hengartner (University of Waterloo), Alexander Wong (University of Waterloo)
Read MoreP4DDPI: Securing P4-Programmable Data Plane Networks via DNS Deep...
Ali AlSabeh (University of South Carolina), Elie Kfoury (University of South Carolina), Jorge Crichigno (University of South Carolina) and Elias Bou-Harb (University of Texas at San Antonio)
Read More