Cited By
View all- Bae H(2024)Evaluation of Malware Classification Models for Heterogeneous DataSensors10.3390/s2401028824:1(288)Online publication date: 3-Jan-2024
- Carboneri AGhasemisharif MKarami SPolakis J(2023)When Push Comes to Shove: Empirical Analysis of Web Push Implementations in the WildProceedings of the 39th Annual Computer Security Applications Conference10.1145/3627106.3627186(44-55)Online publication date: 4-Dec-2023
- Noß DKnittel LMainka CNiemietz MSchwenk JMeng WJensen CCremers CKirda E(2023)Finding All Cross-Site Needles in the DOM Stack: A Comprehensive Methodology for the Automatic XS-Leak Detection in Web BrowsersProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3616598(2456-2470)Online publication date: 15-Nov-2023
- Show More Cited By