Vijay k. Gurbani and Cynthia Hood ( Illinois Institute of Technology), Anita Nikolich (University of Illinois), Henning Schulzrinne (Columbia University) and Radu State (University of Luxembourg)
When DNS Goes Dark: Understanding Privacy and Shaping Policy of an Evolving Protocol
View More Papers
What Remains Uncaught?: Characterizing Sparsely Detected Malicious URLs on...
Sayak Saha Roy, Unique Karanjit, Shirin Nilizadeh (The University of Texas at Arlington)
Read MoreEmpirical Scanning Analysis of Censys and Shodan
Christopher Bennett, AbdelRahman Abdou, and Paul C. van Oorschot (School of Computer Science, Carleton University, Canada)
Read MoreDenial-of-Service Attacks on C-V2X Networks
Natasa Trkulja, David Starobinski (Boston University), and Randall Berry (Northwestern University)
Read MoreManipulating the Byzantine: Optimizing Model Poisoning Attacks and Defenses...
Virat Shejwalkar (UMass Amherst), Amir Houmansadr (UMass Amherst)
Read More