Don't Kick Over the Beehive: Attacks and Security Analysis on Zigbee. | 0 | 0.34 | 2022 |
Understanding and Detecting Mobile Ad Fraud Through the Lens of Invalid Traffic | 2 | 0.38 | 2021 |
Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks | 0 | 0.34 | 2021 |
Understanding Promotion-as-a-Service on GitHub. | 0 | 0.34 | 2020 |
Attributing and Detecting Fake Images Generated by Known GANs | 1 | 0.40 | 2020 |
Lies in the Air: Characterizing Fake-base-station Spam Ecosystem in China | 0 | 0.34 | 2020 |
CDN Backfired: Amplification Attacks Based on HTTP Range Requests | 1 | 0.35 | 2020 |
CDN Judo: Breaking the CDN DoS Protection with Itself | 3 | 0.40 | 2020 |
Talking with Familiar Strangers: An Empirical Study on HTTPS Context Confusion Attacks | 2 | 0.37 | 2020 |
Measuring and Analyzing Search Engine Poisoning of Linguistic Collisions | 0 | 0.34 | 2019 |
Casino royale: a deep exploration of illegal online gambling | 1 | 0.35 | 2019 |
TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-Scale DNS Analysis | 1 | 0.35 | 2019 |
An End-to-End, Large-Scale Measurement of DNS-over-Encryption: How Far Have We Come? | 4 | 0.43 | 2019 |
Tl;Dr Hazard: A Comprehensive Study Of Levelsquatting Scams | 0 | 0.34 | 2019 |
AUSERA: Large-Scale Automated Security Risk Assessment of Global Mobile Banking Apps. | 2 | 0.37 | 2018 |
Semantic Segmentation of Aerial Image Using Fully Convolutional Network. | 0 | 0.34 | 2018 |
Enumerating Active IPv6 Hosts for Large-Scale Security Scans via DNSSEC-Signed Reverse Zones | 2 | 0.39 | 2018 |
A Reexamination of Internationalized Domain Names: The Good, the Bad and the Ugly | 2 | 0.37 | 2018 |
Measuring Privacy Threats in China-Wide Mobile Networks. | 0 | 0.34 | 2018 |
Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach. | 26 | 0.80 | 2018 |
Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates. | 2 | 0.39 | 2018 |
Abusing CDNs for Fun and Profit: Security Issues in CDNs' Origin Validation | 1 | 0.36 | 2018 |
Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks. | 12 | 0.57 | 2018 |
Cloud repository as a malicious service: challenge, identification and implication. | 0 | 0.34 | 2018 |
Analysis of mobile learning as an innovation in higher education: a comparative study of three countries. | 0 | 0.34 | 2017 |
Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions. | 1 | 0.35 | 2017 |
Hardening Malware Detection Systems Against Cyber Maneuvers: An Adversarial Machine Learning Approach. | 0 | 0.34 | 2017 |
DIFUZE: Interface Aware Fuzzing for Kernel Drivers. | 5 | 0.43 | 2017 |
On the Privacy and Security of the Ultrasound Ecosystem. | 3 | 0.48 | 2017 |
Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service. | 3 | 0.37 | 2016 |
Characterizing Long-tail SEO Spam on Cloud Web Hosting Services. | 9 | 0.50 | 2016 |
Probabilistic logical approach for testing diagnosability of stochastic discrete event systems. | 2 | 0.36 | 2016 |
Drops for Stuff: An Analysis of Reshipping Mule Scams | 6 | 0.50 | 2015 |
Highly survivable software defined synergistic IP+Optical Transport networks | 1 | 0.34 | 2014 |
A queue model to detect DDos attacks | 0 | 0.34 | 2005 |
Using trust for restricted delegation in grid environments | 2 | 0.41 | 2005 |