Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Online Education
Marketing
Digital Marketing
Understanding Multiple Sclerosis (MS)
Psychology of Personal Growth
Introducción a la Regulación Emocional basada en Mindfulness
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the importance of high-quality reliability measurements in SRE, learn tips for effective implementation, and understand why it's crucial for engineering work in SRE organizations.
Learn how to overhaul and centralize a complex monitoring system, creating a user-friendly solution that encourages developer engagement and continuous improvement.
Explore effective methods for implementing Latency Service Level Objectives (SLOs), addressing common pitfalls in latency measurement and aggregation for improved service quality tracking.
Explores users' perceptions of security and privacy in smart home assistants, revealing incomplete mental models and limited understanding of data handling, leading to inadequate threat models and coping strategies.
Explores vulnerabilities in AMD's Secure Encrypted Virtualization, demonstrating attacks on I/O operations and constructing primitives to breach VM memory encryption, highlighting security risks in emerging technology.
Explores limitations of location privacy mechanisms in mobile crowdsourcing, revealing inadequate protection and significant utility impact. Proposes new research directions for privacy-preserving solutions.
Explores bandwidth denial-of-service attacks against Tor, demonstrating feasibility and impact on network performance through experimentation and simulation. Analyzes costs and effects of various attack strategies.
Explores utility-optimized local differential privacy mechanisms for distribution estimation, enhancing data utility while maintaining privacy for sensitive information.
Explores Internet-based child exploitation crimes, their long-term impact on victims, and forensic tools for proactive rescue. Discusses privacy technology's role in both protection and potential misuse.
Explore the alarming rise of commercial spyware tools used by nation-states for covert surveillance and sabotage. Learn about Citizen Lab's methodology for uncovering abuses and the challenges posed by zero-click attacks.
Reverse engineering neural networks through electromagnetic side channels, revealing architecture details like activation functions, layers, neurons, and weights using non-invasive techniques on ARM Cortex-M3 microcontrollers.
Explore how embracing "hacky" solutions in cybersecurity can enhance enterprise defense. Learn innovative strategies and custom detection techniques to gain an advantage over attackers.
Investigates vulnerabilities in aircraft instrument landing systems to wireless attacks using software-defined radio, demonstrating potential for spoofing signals and causing off-runway landings in low-visibility conditions.
Unveils TESSERACT framework to eliminate spatial and temporal biases in Android malware classification, improving real-world robustness and revealing counterintuitive performance insights.
Get personalized course recommendations, track subjects and courses with reminders, and more.