W Li, S Manickam, SUA Laghari, YW Chong - IEEE Access, 2023 - ieeexplore.ieee.org
Phishing represents a cybersecurity attack strategy commonly employed by cybercriminals to unlawfully acquire sensitive user information, including passwords, account details, credit …
Popular messaging applications now enable end-to-end-encryption (E2EE) by default, and E2EE data storage is becoming common. These important advances for security and privacy …
DJ Leith - IEEE Access, 2021 - ieeexplore.ieee.org
We measure the data sent to their back-end servers by five browsers: Google Chrome, Mozilla Firefox, Apple Safari, Brave Browser and Microsoft Edge, during normal web …
To keep web users away from unsafe websites, modern web browsers enable the embedded feature of safe browsing (SB) by default. In this work, through theoretical analysis …
Y Du, A Zhou, C Wang - 2022 IEEE 42nd International …, 2022 - ieeexplore.ieee.org
The flourishing development of blockchain and cryptocurrency has made it a hotbed for cyber-criminals to implement virtually untraceable scams. Consequently, the blockchain …
Users have personal or business need to share most private and confidential documents; however, often at the expense of privacy and security. A sought after feature in the trending …
S Zhang, H Xing, X Yi, H Li - arXiv preprint arXiv:2406.18100, 2024 - arxiv.org
LLMs driven products were increasingly prevalent in our daily lives, With a natural language based interaction style, people may potentially leak their personal private information. Thus …
C Tan, R Yu, S Xiong, Z Zhou, S Liu, S Wu - ISA transactions, 2023 - Elsevier
There are many papers and tools regarding the detection of unsafe contracts, but few ways for detection results to practically benefit contract users and owners. This paper presents a …