Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Artificial Intelligence
OpenAI
Divide and Conquer, Sorting and Searching, and Randomized Algorithms
Introduction to Graphic Illustration
The Science of Gastronomy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore secure distributed ECDSA signing, its challenges, and innovative solutions for threshold signing in cryptography and blockchain applications.
Explore advanced website fingerprinting attacks using deep learning, challenging existing defenses and analyzing their effectiveness against Tor and other protective measures.
Learn about DeepCorr, a machine learning approach to enhance flow correlation attacks on Tor, exploring its architecture, effectiveness, and potential countermeasures.
Explore website fingerprinting attacks on Tor, analyzing information leakage, defense mechanisms, and the trade-offs between anonymity and usability in low-latency anonymous networks.
Explore strategies for safeguarding data subject to retention laws, including encryption techniques and compliance proofs, to mitigate risks while meeting legal obligations.
Explore password-based threshold authentication with PASTA, a novel framework distributing identity verification among servers for enhanced security against token forgery and offline attacks.
Explore speculative execution security risks, focusing on return stack buffer vulnerabilities and potential countermeasures in modern CPUs.
Explore a novel key exchange protocol offering opportunistic encryption benefits and protection against active attackers, without relying on trusted third parties or pre-established secrets.
Explore techniques for evaluating fuzz testing effectiveness, including experimental setups, benchmark programs, and metrics for assessing fuzzer performance and bug discovery.
Automatic detection of flaws in iOS sandbox profiles using SandScout tool. Explores iOS architecture, sandbox profile language, and presents proof of concept for identifying security vulnerabilities.
Explore game theory's application to optimal decoy routing strategies, enhancing internet censorship circumvention through strategic placement and deployment of decoy routers.
Proactive system for identifying and preventing domain abuse at registration time, using machine learning to analyze registration patterns and historical data.
Explore techniques to identify infrastructure behind amplification DDoS attacks, including scanning, honeypots, and trilateration methods for improved cybersecurity defenses.
Explore Tor network measurement techniques, challenges, and privacy-preserving solutions using PrivCount. Learn about exit policies and user statistics in this cybersecurity research presentation.
Explore innovative DDoS defense strategies with MiddlePolice, a novel approach to enforcing destination-defined policies in the internet's core, addressing challenges and evaluating its effectiveness.
Get personalized course recommendations, track subjects and courses with reminders, and more.