N.P. Hoang, I. Lin, S. Ghavamnia, M. Polychronakis
K-resolver: Towards Decentralizing Encrypted DNS Resolution
View More Papers
Why do Internet Devices Remain Vulnerable? A Survey with...
Tamara Bondar, Hala Assal, AbdelRahman Abdou (Carleton University)
Read MoreApplying Accessibility Metrics to Measure the Threat Landscape for...
John Breton, AbdelRahman Abdou (Carleton University)
Read MoreLog4shell: Redefining the Web Attack Surface
Douglas Everson (Clemson University), Long Cheng (Clemson University), and Zhenkai Zhang (Clemson University)
Read More