Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Web Development
Software Development
Graphic Design
Functional Programming Principles in Scala
Mountains 101
Industrial Pharmacy-I
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore Tor network measurement techniques, challenges, and privacy-preserving solutions using PrivCount. Learn about exit policies and user statistics in this cybersecurity research presentation.
Explore innovative DDoS defense strategies with MiddlePolice, a novel approach to enforcing destination-defined policies in the internet's core, addressing challenges and evaluating its effectiveness.
Automated evasion attacks and fingerprinting techniques using blackbox differential automata learning for evaluating web security products and analyzing TCP/IP implementations.
Explore Android ION's memory management vulnerabilities, including DoS attacks and information leaks, with insights on discovery, defense, and industry impact.
Explores HTTP host ambiguities in implementations, revealing vulnerabilities in caching, firewalls, and WAFs. Presents attacks exploiting these issues and discusses prevalence and mitigation strategies.
Comprehensive analysis of online tracking techniques, revealing vulnerabilities and proposing solutions for enhanced web privacy and security.
Explore techniques for detecting malicious cloud repositories, analyzing their characteristics, and understanding their impact on cybersecurity. Learn about innovative approaches to identify and mitigate cloud-based threats.
Explores stealthy attacks on face recognition systems using adversarial machine learning techniques, demonstrating vulnerabilities in state-of-the-art facial recognition technology through impersonation experiments.
Explore the evolution and challenges of Content Security Policy, analyzing its effectiveness, vulnerabilities, and future directions in web security.
Explore security vulnerabilities in password vaults, analyzing cracking techniques, experimental results, and potential mitigations for improved password protection strategies.
Evaluación de la efectividad de la PolÃtica de Seguridad de Contenido en la práctica, analizando su adopción, configuración y debilidades frente a ataques XSS.
Explore targeted online password guessing, its underestimated threat, and innovative approaches to enhance cybersecurity through advanced attack modeling and defense strategies.
Empirical analysis of mnemonic sentence-based password generation strategies, examining effectiveness, weaknesses, and user behavior in creating memorable yet secure passwords.
Explores vulnerabilities in web applications using encrypted data, focusing on multi-key searchable encryption. Analyzes attacks against Mylar, discussing metadata risks and active threat models.
Explore physical side-channel attacks on ECDSA key extraction from mobile devices, covering analysis methods, results, equipment, and potential countermeasures.
Get personalized course recommendations, track subjects and courses with reminders, and more.