CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing | 1 | 0.38 | 2021 |
Favocado: Fuzzing The Binding Code Of Javascript Engines Using Semantically Correct Test Cases | 1 | 0.35 | 2021 |
Scam Pandemic: How Attackers Exploit Public Fear through Phishing | 2 | 0.39 | 2020 |
Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers. | 0 | 0.34 | 2020 |
HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems | 5 | 0.46 | 2020 |
SmokeBomb: effective mitigation against cache side-channel attacks on the ARM architecture | 0 | 0.34 | 2020 |
Proactive Risk Assessment for Preventing Attribute-Forgery Attacks to ABAC Policies | 0 | 0.34 | 2020 |
Towards a reliable firewall for software-defined networks. | 1 | 0.35 | 2019 |
Effectively Enforcing Authorization Constraints for Emerging Space-Sensitive Technologies | 0 | 0.34 | 2019 |
iCore - continuous and proactive extrospection on multi-core IoT devices. | 0 | 0.34 | 2019 |
DexMonitor: Dynamically Analyzing and Monitoring Obfuscated Android Applications. | 0 | 0.34 | 2018 |
Risk assessment of mobile applications based on machine learned malware dataset. | 1 | 0.35 | 2018 |
Measuring E-mail header injections on the world wide web. | 2 | 0.37 | 2018 |
Challenges, Opportunities and a Framework for Web Environment Forensics. | 0 | 0.34 | 2018 |
AIM-SDN: Attacking Information Mismanagement in SDN-datastores. | 1 | 0.35 | 2018 |
Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection. | 13 | 0.58 | 2018 |
CacheLight: Defeating the CacheKit Attack. | 0 | 0.34 | 2018 |
SeCore: Continuous Extrospection with High Visibility on Multi-core ARM Platforms. | 0 | 0.34 | 2018 |
HoneyProxy: Design and implementation of next-generation honeynet via SDN. | 1 | 0.34 | 2017 |
Toward Standardization of Authenticated Caller ID Transmission. | 0 | 0.34 | 2017 |
Mutated Policies: Towards Proactive Attribute-based Defenses for Access Control. | 0 | 0.34 | 2017 |
OntoEDS: Protecting Energy Delivery Systems by Collaboratively Analyzing Security Requirements | 0 | 0.34 | 2017 |
HoneyMix: Toward SDN-based Intelligent Honeynet. | 7 | 0.56 | 2016 |
Mules, Seals, and Attacking Tools: Analyzing 12 Online Marketplaces. | 1 | 0.34 | 2016 |
dbling: Identifying extensions installed on encrypted web thin clients | 0 | 0.34 | 2016 |
Towards Automated Threat Intelligence Fusion | 1 | 0.35 | 2016 |
Checking Intent-based Communication in Android with Intent Space Analysis. | 8 | 0.44 | 2016 |
Preface - WISA 2014. | 0 | 0.34 | 2015 |
Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation | 9 | 0.46 | 2015 |
Towards a Reliable SDN Firewall. | 7 | 0.47 | 2014 |
Achieving security assurance with assertion-based application construction | 0 | 0.34 | 2014 |
RiskMon: continuous and automated risk assessment of mobile applications | 25 | 0.84 | 2014 |
Morpheus: automatically generating heuristics to detect Android emulators. | 29 | 0.97 | 2014 |
Verifying Access Control Properties with Design by Contract: Framework and Lessons Learned | 0 | 0.34 | 2013 |
Multiparty Access Control for Online Social Networks: Model and Mechanisms | 71 | 2.09 | 2013 |
Using instruction sequence abstraction for shellcode detection and attribution | 3 | 0.49 | 2013 |
Towards comprehensive and collaborative forensics on email evidence | 4 | 0.49 | 2013 |
Role-Based Cryptosystem: A New Cryptographic RBAC System Based on Role-Key Hierarchy | 10 | 0.55 | 2013 |
Simulation-Based Validation for Smart Grid Environments: Framework and Experimental Results. | 1 | 0.40 | 2013 |
Remote Attestation with Domain-Based Integrity Model and Policy Analysis | 12 | 0.88 | 2012 |
Secure Collaborative Integrity Verification For Hybrid Cloud Environments | 10 | 0.55 | 2012 |
Access control for online social networks third party applications | 20 | 0.82 | 2012 |
Model-Based Conformance Testing for Android. | 7 | 0.59 | 2012 |
SocialImpact: Systematic Analysis of Underground Social Dynamics. | 8 | 1.06 | 2012 |
Towards HIPAA-compliant healthcare systems | 7 | 0.72 | 2012 |
Towards HIPAA-Compliant Healthcare Systems in Cloud Computing. | 1 | 0.35 | 2012 |
Policy-driven role-based access management for ad-hoc collaboration | 1 | 0.35 | 2012 |
Comparison-based encryption for fine-grained access control in clouds | 6 | 0.50 | 2012 |
Multiparty authorization framework for data sharing in online social networks | 18 | 0.82 | 2011 |
Examining Social Dynamics for Countering Botnet Attacks | 3 | 0.39 | 2011 |