受强制性开放获取政策约束的文章 - Penghui Zhang了解详情
可在其他位置公开访问的文章:6 篇
Sunrise to sunset: Analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale
A Oest, P Zhang, B Wardman, E Nunes, J Burgis, A Zand, K Thomas, ...
29th {USENIX} Security Symposium ({USENIX} Security 20), 2020
强制性开放获取政策: US National Science Foundation
{PhishTime}: Continuous longitudinal measurement of the effectiveness of anti-phishing blacklists
A Oest, Y Safaei, P Zhang, B Wardman, K Tyers, Y Shoshitaishvili, ...
29th USENIX Security Symposium (USENIX Security 20), 379-396, 2020
强制性开放获取政策: US National Science Foundation
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing
P Zhang, A Oest, H Cho, Z Sun, RC Johnson, B Wardman, S Sarker, ...
Proceedings of the IEEE Symposium on Security and Privacy, 2021
强制性开放获取政策: US National Science Foundation, US Department of Defense
Prime+ count: Novel cross-world covert channels on arm trustzone
H Cho, P Zhang, D Kim, J Park, CH Lee, Z Zhao, A Doupé, GJ Ahn
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
强制性开放获取政策: US National Science Foundation, US Department of Defense
I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior
P Zhang, Z Sun, S Kyung, HW Behrens, ZL Basque, H Cho, A Oest, ...
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
强制性开放获取政策: US Department of Defense
iCore continuous and proactive extrospection on multi-core IoT devices
P Zhang, H Cho, Z Zhao, A Doupé, GJ Ahn
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 851-860, 2019
强制性开放获取政策: US National Science Foundation
出版信息和资助信息由计算机程序自动确定