Personensuche
X
?
Lecture Notes in Computer Science; Cyber Security Cryptography and Machine Learning ,
1
Privacy-Preserving Password Strength Meters with FHE:
, In:
?
Proceedings of the Genetic and Evolutionary Computation Conference Companion ,
2
A divide and conquer approach for web services location all..:
, In:
?
Communications in Computer and Information Science; Database and Expert Systems Applications - DEXA 2021 Workshops ,
3
Privacy Preserving Machine Learning for Malicious URL Detec..:
, In:
?
2021 APWG Symposium on Electronic Crime Research (eCrime) ,
4
When Diversity Meets Hostility: A Study of Domain Squatting..:
, In:
?
Financial Cryptography and Data Security; Lecture Notes in Computer Science ,
5
Fixing the Fixes: Assessing the Solutions of SAST Tools for..:
, In:
?
Information Systems Security; Lecture Notes in Computer Science ,
6
Revelio: A Lightweight Captcha Solver Using a Dictionary Ba..:
, In:
?
Lecture Notes in Computer Science; Cyber Security Cryptography and Machine Learning ,
7
Everything Is in the Name – A URL Based Approach for Phishi..:
, In:
?
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security ,
8
Force vs. Nudge : Comparing Users' Pattern Choices on Sy..:
, In:
?
Serious Games; Lecture Notes in Computer Science ,
9
GAP: A Game for Improving Awareness About Passwords:
, In:
?
Proceedings of the 2018 Annual Symposium on Computer-Human Interaction in Play Companion Extended Abstracts ,
10
PHISHY - A Serious Game to Train Enterprise Users on Phishi..:
, In:
?
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security ,
11
Pass-O : A Proposal to Improve the Security of Pattern U..:
, In:
?
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security ,
12