J. Lee, P. Ye, R. Liu, D. Divakaran, C. Choon
Building Robust Phishing Detection System: an Empirical Analysis
View More Papers
A Few-Shot Practical Behavioral Biometrics Model for Login Authentication...
J. Solano, L. Tengana, A. Castelblanco, E. Rivera, C. Lopez, M. Ochoa
Read MoreWhy do Internet Devices Remain Vulnerable? A Survey with...
Tamara Bondar, Hala Assal, AbdelRahman Abdou (Carleton University)
Read MoreComparative Analysis of the DoT with HTTPS Certificate Ecosystems
Ali Sadeghi Jahromi, AbdelRahman Abdou (Carleton University)
Read Moreinsecure:// Vulnerability Analysis of URI Scheme Handling in Android...
Abdulla Aldoseri (University of Birmingham) and David Oswald (University of Birmingham)
Read More