J. Lee, P. Ye, R. Liu, D. Divakaran, C. Choon
Building Robust Phishing Detection System: an Empirical Analysis
View More Papers
DorkPot: A Honeypot-based Analysis of Google Dorks
Florian Quinkert, Eduard Leonhardt, Thorsten Holz
Read MoreEMMasker: EM Obfuscation Against Website Fingerprinting
Mohammed Aldeen, Sisheng Liang, Zhenkai Zhang, Linke Guo (Clemson University), Zheng Song (University of Michigan – Dearborn), and Long Cheng (Clemson University)
Read MoreTag of the Dead: How Terminated SaaS Tags Become...
Takahito Sakamoto, Takuya Murozono (DataSign Inc)
Read MoreChhoyhopper: A Moving Target Defense with IPv6
A S M Rizvi (University of Southern California/Information Sciences Institute) and John Heidemann (University of Southern California/Information Sciences Institute)
Read More