H. Jonker, S. Karsch, B. Krumnow, M. Sleegers

View More Papers

Cross-Site Challenge-Response Attacks

Nethanel Gelernter, Itamar Peretz

Read More

Why do Internet Devices Remain Vulnerable? A Survey with...

Tamara Bondar, Hala Assal, AbdelRahman Abdou (Carleton University)

Read More

What Remains Uncaught?: Characterizing Sparsely Detected Malicious URLs on...

Sayak Saha Roy, Unique Karanjit, Shirin Nilizadeh (The University of Texas at Arlington)

Read More