Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Towards Human-Centric Endpoint Security

    In a survey of six widely used end-to-end encrypted messaging applications, we consider the post-compromise recovery process from the perspective of what security audit functions, if any, are in place to detec...

    Jenny Blessing, Partha Das Chowdhury, Maria Sameen in Security Protocols XXVIII (2023)

  2. No Access

    Chapter and Conference Paper

    On the Reliability of Network Measurement Techniques Used for Malware Traffic Analysis

    Malware attacks are increasingly popular attack vectors in online crime. As trends and anecdotal evidence show, preventing these attacks, regardless of their opportunistic or targeted nature, has proven diffic...

    Joseph Gardiner, Shishir Nagaraja in Security Protocols XXII (2014)