Wouter Lueks, Matthieu Daumas, Carmela Troncoso

View More Papers

Why do Internet Devices Remain Vulnerable? A Survey with...

Tamara Bondar, Hala Assal, AbdelRahman Abdou (Carleton University)

Read More

Characterizing the Adoption of Security.txt Files and their Applications...

William Findlay (Carleton University) and AbdelRahman Abdou (Carleton University)

Read More

Cross-Site Challenge-Response Attacks

Nethanel Gelernter, Itamar Peretz

Read More