Cited By
View all- Lim KPark JKim DChua TNgo CKa-Wei Lee RKumar RLauw H(2024)Phishing Vs. Legit: Comparative Analysis of Client-Side Resources of Phishing and Target Brand WebsitesProceedings of the ACM on Web Conference 202410.1145/3589334.3645535(1756-1767)Online publication date: 13-May-2024
- Hantke FCalzavara SWilhelm MRabitti AStock BMeng WJensen CCremers CKirda E(2023)You Call This Archaeology? Evaluating Web Archives for Reproducible Web Security MeasurementsProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3616688(3168-3182)Online publication date: 15-Nov-2023
- Su ZHelles RAl-Laith AVeilahti ASaxena ASimonsen J(2023)Privacy Lost in Online Education: Analysis of Web Tracking EvolutionAdvanced Data Mining and Applications10.1007/978-3-031-46664-9_30(440-455)Online publication date: 27-Aug-2023