C. Kelton, A. Balasubramanian, R. Raghavendra, M. Srivatsa
Browser-Based Deep Behavioral Detection of Web Cryptomining with CoinSpy
View More Papers
Lessons Learned from SunDEW: A Self Defense Environment for...
M. Sahin, C. Hebert, A. De Oliveira
Read MoreCan You Tell Me the Time? Security Implications of...
Vik Vanderlinden, Wouter Joosen, Mathy Vanhoef (imec-DistriNet, KU Leuven)
Read MoreEvaluating the Strength and Availability of Multilingual Passphrase Authentication
Chi-en Amy Tai (University of Waterloo), Urs Hengartner (University of Waterloo), Alexander Wong (University of Waterloo)
Read MoreDetecting Tor Bridge from Sampled Traffic in Backbone Networks
Hua Wu (School of Cyber Science & Engineering and Key Laboratory of Computer Network and Information Integration Southeast University, Ministry of Education, Jiangsu Nanjing, Purple Mountain Laboratories for Network and Communication Security (Nanjing, Jiangsu)), Shuyi Guo, Guang Cheng, Xiaoyan Hu (School of Cyber Science & Engineering and Key Laboratory of Computer Network and Information Integration…
Read More