Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Artificial Intelligence
OpenAI
Divide and Conquer, Sorting and Searching, and Randomized Algorithms
Introduction to Graphic Illustration
The Science of Gastronomy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Automated evasion attacks and fingerprinting techniques using blackbox differential automata learning for evaluating web security products and analyzing TCP/IP implementations.
Explore Android ION's memory management vulnerabilities, including DoS attacks and information leaks, with insights on discovery, defense, and industry impact.
Explores HTTP host ambiguities in implementations, revealing vulnerabilities in caching, firewalls, and WAFs. Presents attacks exploiting these issues and discusses prevalence and mitigation strategies.
Comprehensive analysis of online tracking techniques, revealing vulnerabilities and proposing solutions for enhanced web privacy and security.
Explore techniques for detecting malicious cloud repositories, analyzing their characteristics, and understanding their impact on cybersecurity. Learn about innovative approaches to identify and mitigate cloud-based threats.
Explores stealthy attacks on face recognition systems using adversarial machine learning techniques, demonstrating vulnerabilities in state-of-the-art facial recognition technology through impersonation experiments.
Explore the evolution and challenges of Content Security Policy, analyzing its effectiveness, vulnerabilities, and future directions in web security.
Explore security vulnerabilities in password vaults, analyzing cracking techniques, experimental results, and potential mitigations for improved password protection strategies.
Evaluación de la efectividad de la PolÃtica de Seguridad de Contenido en la práctica, analizando su adopción, configuración y debilidades frente a ataques XSS.
Explore targeted online password guessing, its underestimated threat, and innovative approaches to enhance cybersecurity through advanced attack modeling and defense strategies.
Empirical analysis of mnemonic sentence-based password generation strategies, examining effectiveness, weaknesses, and user behavior in creating memorable yet secure passwords.
Explores vulnerabilities in web applications using encrypted data, focusing on multi-key searchable encryption. Analyzes attacks against Mylar, discussing metadata risks and active threat models.
Explore physical side-channel attacks on ECDSA key extraction from mobile devices, covering analysis methods, results, equipment, and potential countermeasures.
Explore inference attacks on searchable encryption, focusing on Bloom filters and graph matching techniques to compromise data confidentiality in encrypted databases.
Comprehensive formal security analysis of OAuth 2.0, examining authorization, authentication, and session integrity properties, and discussing potential attacks and mitigations.
Get personalized course recommendations, track subjects and courses with reminders, and more.