Cited By
View all- Kontogeorgopoulos KKritikos K(2024)Overview of Social Engineering Protection and Prevention MethodsComputer Security. ESORICS 2023 International Workshops10.1007/978-3-031-54204-6_4(64-83)Online publication date: 1-Mar-2024
- Van Goethem TSanchez-Rola IJoosen W(2023)Scripted Henchmen: Leveraging XS-Leaks for Cross-Site Vulnerability Detection2023 IEEE Security and Privacy Workshops (SPW)10.1109/SPW59333.2023.00038(371-383)Online publication date: May-2023
- Ibraheem M(2023)Green Computing and Security Practices for Optimizing Crawler Efficiency2023 International Telecommunications Conference (ITC-Egypt)10.1109/ITC-Egypt58155.2023.10206217(151-156)Online publication date: 18-Jul-2023
- Show More Cited By