Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Sayna Parsi
Daniel P. Kennedy
Dan Graur
Barbara Aquilani
Parker, D.E.
Pedro M. Fonte
Roland Zumkeller
Maximilian Dürr
Liangliang Shang
Chen Ma
Home
/
Author
/
ALEXANDROS KAPRAVELOS
Author Info
Open Visualization
Name
Affiliation
Papers
ALEXANDROS KAPRAVELOS
University of California, Santa Barbara, Santa Barbara, CA, USA
30
Collaborators
Citations
PageRank
89
324
20.58
Referers
Referees
References
796
469
240
Search Limit
100
796
Publications (30 rows)
Collaborators (89 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Measuring the Privacy vs. Compatibility Trade-off in Preventing Third-Party Stateful Tracking
0
0.34
2022
CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing
0
0.34
2022
Detecting Filter List Evasion with Event-Loop-Turn Granularity JavaScript Signatures.
0
0.34
2021
Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets
0
0.34
2021
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing
1
0.38
2021
Towards Realistic and ReproducibleWeb Crawl Measurements
0
0.34
2021
Favocado: Fuzzing The Binding Code Of Javascript Engines Using Semantically Correct Test Cases
1
0.35
2021
Cookie Swap Party: Abusing First-Party Cookies for Web Tracking
1
0.35
2021
Browserprint: An Analysis of the Impact of Browser Features on Fingerprintability and Web Privacy
0
0.34
2021
You've Changed: Detecting Malicious Browser Extensions through their Update Deltas
1
0.36
2020
Mininode - Reducing the Attack Surface of Node.js Applications.
0
0.34
2020
Hiding in Plain Site: Detecting JavaScript Obfuscation through Concealed Browser API Usage
2
0.36
2020
The Blind Men and the Internet: Multi-Vantage Point Web Measurements.
0
0.34
2019
VisibleV8: In-browser Monitoring of JavaScript in the Wild
4
0.41
2019
Unnecessarily Identifiable: Quantifying the fingerprintability of browser extensions due to bloat
1
0.36
2019
Everyone Is Different: Client-Side Diversification For Defending Against Extension Fingerprinting
0
0.34
2019
Session details: Session 10D: Fuzzing, Exploitation, and Side Channels
0
0.34
2018
Mystique: Uncovering Information Leakage from Browser Extensions.
5
0.48
2018
Cloak of Visibility: Detecting When Machines Browse a Different Web
9
0.51
2016
Ad Injection at Scale: Assessing Deceptive Advertisement Modifications
22
0.85
2015
The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements
30
1.30
2014
Hulk: eliciting malicious behavior in browser extensions
38
1.57
2014
Pexy: The Other Side Of Exploit Kits
7
0.46
2014
On the Workings and Current Practices of Web-Based Device Fingerprinting
5
0.46
2014
Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting
112
4.53
2013
You are what you include: large-scale evaluation of remote javascript inclusions
66
2.40
2012
Escape from monkey island: evading high-interaction honeyclients
9
0.81
2011
D(e|i)aling with VoIP: robust prevention of DIAL attacks
2
0.38
2010
Realistic Passive Packet Loss Measurement for High-Speed Networks
3
0.46
2009
FleXConf: A Flexible Conference Assistant Using Context-Aware Notification Services
5
0.44
2009
1