Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Marketing
Cybersecurity
Machine Learning
Circuits and Electronics 1: Basic Circuit Analysis
Academic Writing Made Easy
Nutrition, Exercise and Sports
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explores IoT demand attacks on power grids, analyzing cascading outages and system vulnerabilities. Presents findings from a large-scale North American grid study, discussing protective measures and future challenges.
Exploring security vulnerabilities in smart home platforms through reverse engineering and phantom device testing, revealing unexpected state transitions and potential attacks.
Explores a novel LTE signal injection attack, demonstrating higher success rates than fake base station attacks. Discusses implications and potential countermeasures for this physical signal overshadowing vulnerability.
Discover input validation vulnerabilities in robotic vehicle control systems using RVFuzzer, a testing tool that leverages control models to improve bug detection accuracy and efficiency.
Explore lessons from evaluating adversarial example defenses, common pitfalls, and recommendations for thorough defense assessments in machine learning security research.
Unveils a novel privacy attack exploiting shared images on popular websites, allowing attackers to track user visits and link identities across platforms without using scripts.
Explore FastKitten, a framework for executing complex smart contracts on Bitcoin using trusted computing environments, offering efficiency and low costs for multi-round applications.
Explore techniques to evaluate and mitigate unintended memorization in neural networks, focusing on privacy risks and practical strategies for deep learning practitioners.
Explore techniques to protect binary executables against automated bug-finding tools, focusing on impeding fuzzing, symbolic execution, and hybrid fuzzing approaches while maintaining performance.
Explore JEDI, a novel end-to-end encryption protocol for IoT systems, addressing security challenges in smart buildings and cities through key delegation and fine-grained access control.
Explore security and privacy challenges in multi-user smart homes, examining design principles and a prototype solution for respectful usage and user agency.
Empirical study on Bullet-Proof Hosting provider Maxided, analyzing business model, supply chain, customers, and finances. Reveals shifts in BPH landscape and potential intervention points for disrupting cybercrime-supporting services.
Innovative TLS vulnerability scanning methodology reveals widespread CBC padding oracle vulnerabilities, challenging assumptions about their exploitability and highlighting significant security risks in web infrastructure.
Explores honeypot smart contracts in Ethereum, their prevalence, and impact. Presents HoneyBadger tool for detecting honeypots, analyzing 2M+ contracts and identifying 690 honeypots with 240 victims.
Introduces MQFQ, a fair and efficient scheduler for multi-queue systems, addressing fairness issues in high-speed devices while maintaining scalability and performance.
Get personalized course recommendations, track subjects and courses with reminders, and more.