Zobrazeno 1 - 10
of 45
pro vyhledávání: '"Minaxi Gupta"'
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783319788128
SecureComm
SecureComm
Over the last several years, there have been a number of high profile and well-publicized data breaches. These breaches led to the theft of personal, financial, and health information from users who are often only notified of such breaches well after
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::74331367100e980880be8de7db3df382
https://doi.org/10.1007/978-3-319-78813-5_13
https://doi.org/10.1007/978-3-319-78813-5_13
Publikováno v:
Security and Communication Networks. 8:176-188
Web spammers have taken note of the popularity of public forums such as blogs, wikis, webboards, and guestbooks. They are now exploiting them with the purpose of driving traffic to their malicious or fraudulent websites, such as those used for phishi
Autor:
Andrew J. Kaizer, Minaxi Gupta
Publikováno v:
Internet Measurement Conference
Users on today's Internet are subjected to a barrage of advertising and privacy concerning practices. However there is a gap in understanding the treatment of not-logged-in and logged-in users on websites. To address this gap in understanding, we cre
Publikováno v:
ACM SIGMETRICS Performance Evaluation Review. 40:96-100
The privacy of hundreds of millions of people today could be compromised due to people databases which claim to store many personal details about individuals, often without their knowledge. While the paid versions of these databases may be prohibitiv
Autor:
Minaxi Gupta, Vlad Bulakh
Publikováno v:
IWSPA@CODASPY
Most anti-phishing solutions that exist today require scanning a large portion of the web, which is vast and equivalent to finding a needle in a haystack. In addition, such solutions are not very efficient. We propose a different approach. Our soluti
Autor:
Minaxi Gupta, Andrew J. Kaizer
Publikováno v:
IWSPA@CODASPY
Machine-based tracking is a type of behavior that extracts information on a user's machine, which can then be used for fingerprinting, tracking, or profiling purposes. In this paper, we focus on JavaScript-oriented machine-based tracking as JavaScrip
Publikováno v:
Passive and Active Measurement ISBN: 9783319305042
PAM
PAM
In spite of being detrimental to user experiences, the problem of automated messages on online classified websites is widespread due to a low barrier of entry and limited enforcement-of-rules against such messages. Many of these messages may appear l
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c67706b6542fcc40e3763914dbc87efb
https://doi.org/10.1007/978-3-319-30505-9_19
https://doi.org/10.1007/978-3-319-30505-9_19
Publikováno v:
IEEE/ACM Transactions on Networking. 20:220-230
While many attacks are distributed across botnets, investigators and network operators have recently identified malicious networks through high profile autonomous system (AS) depeerings and network shutdowns. In this paper, we explore whether some AS
Publikováno v:
IEEE/ACM Transactions on Networking. 19:1666-1675
The Domain Name System (DNS) is a critical component of the Internet. It maps domain names to IP addresses and serves as a distributed database for various other applications, including mail, Web, and spam filtering. This paper examines DNS zones in
Autor:
Craig A. Shue, Minaxi Gupta
Publikováno v:
Computer Networks. 54:3232-3245
The growth of the Internet has brought about many challenges for its critical infrastructure. The DNS infrastructure, which translates mnemonic host names into IP addresses understood by the routers, is frequently the target of cache poisoning attack