[HTML][HTML] A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

Bad characters: Imperceptible nlp attacks

N Boucher, I Shumailov, R Anderson… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Several years of research have shown that machine-learning systems are vulnerable to
adversarial examples, both in theory and in practice. Until now, such attacks have primarily …

[HTML][HTML] Addressing the challenges of modern DNS a comprehensive tutorial

O Van Der Toorn, M Müller, S Dickinson… - Computer Science …, 2022 - Elsevier
Abstract The Domain Name System (DNS) plays a crucial role in connecting services and
users on the Internet. Since its first specification, DNS has been extended in numerous …

Cross-certification towards distributed authentication infrastructure: A case of hyperledger fabric

S Kakei, Y Shiraishi, M Mohri, T Nakamura… - IEEE …, 2020 - ieeexplore.ieee.org
In Internet of Things ecosystems, where various entities trade data and data analysis results,
public key infrastructure plays an important role in establishing trust relationships between …

Trojan source: Invisible vulnerabilities

N Boucher, R Anderson - 32nd USENIX Security Symposium (USENIX …, 2023 - usenix.org
We present a new type of attack in which source code is maliciously encoded so that it
appears different to a compiler and to the human eye. This attack exploits subtleties in text …

Assessing browser-level defense against {IDN-based} phishing

H Hu, STK Jan, Y Wang, G Wang - 30th USENIX Security Symposium …, 2021 - usenix.org
Internationalized Domain Names (IDN) allow people around the world to use their native
languages for domain names. Unfortunately, because characters from different languages …

[PDF][PDF] A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security

M Safaei Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - par.nsf.gov
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …

[HTML][HTML] Homoglyph attack detection model using machine learning and hash function

AM Almuhaideb, N Aslam, A Alabdullatif… - Journal of Sensor and …, 2022 - mdpi.com
Phishing is still a major security threat in cyberspace. In phishing, attackers steal critical
information from victims by presenting a spoofing/fake site that appears to be a visual clone …

Mis-shapes, mistakes, misfits: An analysis of domain classification services

P Vallina, V Le Pochat, Á Feal, M Paraschiv… - Proceedings of the …, 2020 - dl.acm.org
Domain classification services have applications in multiple areas, including cybersecurity,
content blocking, and targeted advertising. Yet, these services are often a black box in terms …

[HTML][HTML] Synthetized Multilanguage OCR Using CRNN and SVTR Models for Realtime Collaborative Tools

A Biró, AI Cuesta-Vargas, J Martín-Martín, L Szilágyi… - Applied Sciences, 2023 - mdpi.com
Background: Remote diagnosis using collaborative tools have led to multilingual joint
working sessions in various domains, including comprehensive health care, and resulting in …