An analysis of anomalous user agent strings in network traffic

J Chen, G Gou, G Xiong - … Conference on Smart City; IEEE 5th …, 2019 - ieeexplore.ieee.org
In a high-speed network traffic environment, it is essential to deeply analyze network
protocols and extract key fields from network traffic for network mapping and traffic attribute …

Analyzing and Mitigating Potential Risks of Third-party Resource Inclusions

S Indela - 2021 - search.proquest.com
In today's computer services, developers commonly use third-party resources like libraries,
hosting infrastructure and advertisements. Using third-party components improves the …

[PDF][PDF] LEMMINGS: Preventing data leaks at TLD scale (Tech Report)

M Wullink, M Müller, G Moura - sidnlabs.nl
Email is one of the most important means of communication on the Internet. On a daily basis,
countless emails are sent and received, of which some may contain sensitive information …