Search

Your search keyword '"Browsers"' showing total 61 results

Search Constraints

Start Over You searched for: Descriptor "Browsers" Remove constraint Descriptor: "Browsers" Topic security Remove constraint Topic: security
61 results on '"Browsers"'

Search Results

2. Quantifying Information Exposure by Web Browsers

3. Machine Learning for Web Vulnerability Detection: The Case of Cross-Site Request Forgery.

4. Botnet in the Browser: Understanding Threats Caused by Malicious Browser Extensions.

5. A New User Front End for EAST Remote Participation.

6. Managing Potentially Intrusive Practices in the Browser: A User-Centered Perspective

7. Detecting Mobile Malicious Webpages in Real Time.

8. The Market's Law of Privacy: Case Studies in Privacy and Security Adoption.

10. Designing Application Permission Models that Meet User Expectations.

11. Neural Markers of Cybersecurity: An fMRI Study of Phishing and Malware Warnings.

12. A Taxonomy of Domain-Generation Algorithms.

13. Using Passive Measurements to Demystify Online Trackers.

14. Mitigating Cross-Site Scripting Attacks with a Content Security Policy.

15. Analysis and Mitigation of NoSQL Injections.

16. Stickler: Defending against Malicious Content Distribution Networks in an Unmodified Browser.

17. Protected Web Components: Hiding Sensitive Information in the Shadows.

18. It's All in the Cloud: Reviewing Cloud Security.

19. On Detection and Prevention of Clickjacking Attack for OSNs.

20. Automated detection of session management vulnerabilities in web applications.

21. Improve security of web Browser with stand-alone e-Learning awareness application.

22. Study and Application of a Migrating Instance.

23. Don't work. Can't work? Why it's time to rethink security warnings.

24. Towards a Semantics of Phish.

25. A Novel Security Scheme for Online Banking Based on Virtual Machine.

26. Integrated detection of anomalous behavior of computer infrastructures.

27. Sensor based home automation and security system.

28. A leaky bucket called smartphone.

29. Solving Some Modeling Challenges when Testing Rich Internet Applications for Security.

30. MANTICORE: Masking All Network Traffic via IP Concealment with OpenVPN Relaying to EC2.

31. The design and implementation of Cloud Terminal Operating System Kernel.

32. Practical clickjacking with BeEF.

33. Audit based privacy preservation for the OpenID authentication protocol.

34. Secure web referral service.

35. Discovering security vulnerabilities and leaks in ASP.NET websites.

36. Design of web-based Smart Home with 3D virtural reality interface.

37. Analysis and Detection of Modern Spam Techniques on Social Networking Sites.

38. On Remote Attestation for Google Chrome OS.

39. Filtering malicious routines in web browsers using dynamic binary instrumentation.

40. Technical Issues of Forensic Investigations in Cloud Computing Environments.

41. On the Workings and Current Practices of Web-Based Device Fingerprinting.

42. Machine Learning for Web Vulnerability Detection: The Case of Cross-Site Request Forgery

43. Towards Comprehensible and Effective Permission Systems

44. Improved Blacklisting: Inspecting the Structural Neighborhood of Malicious URLs.

45. The Compleat Story of Phish.

46. Have Java's Security Issues Gotten out of Hand?

47. Accelerating Multipattern Matching on Compressed HTTP Traffic.

48. Framework Approach for WebSockets.

49. Security Evolution of the Webkit browser engine.

50. Mobile Applications for Agriculture and Rural Development

Catalog

Books, media, physical & digital resources