Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Software Development
Cybersecurity
Transforming Digital Learning: Learning Design Meets Service Design
Matrix Algebra for Engineers
Anatomy: Know Your Abdomen
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from USENIX Security. Dive deep into the latest insights, research, and trends from the world's leading experts.
Investigates security practices of vendors on dark web markets, revealing surprising vulnerabilities among digital item sellers compared to drug vendors. Analyzes password strength, 2FA usage, and PGP adoption.
Unveils vulnerabilities in automotive remote keyless entry systems, demonstrating how attackers can exploit flaws to gain unauthorized access to vehicles from major manufacturers.
Explore zxcvbn, an innovative password strength estimator that outperforms traditional methods. Learn its efficient design, accuracy, and easy implementation for enhanced online security.
Explore software-based TPM implementation using ARM TrustZone, overcoming hardware limitations to provide robust security features for trusted computing in mobile devices.
Neural networks for modeling password guessability: faster, smaller, and more accurate than existing methods. Enables real-time, client-side password strength evaluation with sub-second latency.
Analyzes security risks in npm ecosystem, revealing vulnerabilities due to dependencies, maintainer influence, and lack of maintenance. Discusses potential mitigations for the JavaScript community.
Exploring challenges in building safe, trustworthy tech products for billions globally, drawing from past mistakes and suggesting ways forward in this complex, multidisciplinary issue.
Explore a privacy-preserving protocol for detecting exposed credentials, its implementation as a cloud service, and its effectiveness in prompting users to update compromised passwords.
Explore WAVE, a decentralized authorization framework offering autonomous delegation, enhanced security, and scalability without central trust, as applied to IoT device control.
Explore in-toto, a framework ensuring software supply chain integrity from inception to deployment, addressing vulnerabilities and protecting millions of users across various cloud environments.
Comparative analysis of threat intelligence sources, evaluating metrics, coverage, and effectiveness for cybersecurity defense. Highlights limitations and challenges in using existing data.
Exploring challenges of implementing Data Protection by Design under GDPR, including legal obligations, assessment criteria, and the role of privacy engineering in meeting comprehensive demands.
Comprehensive study on cryptojacking campaigns, revealing underestimated scale, infection methods, and prevalence across the internet. Insights on mining services, attack vectors, and compromised third-party software.
Explores IoT demand attacks on power grids, analyzing cascading outages and system vulnerabilities. Presents findings from a large-scale North American grid study, discussing protective measures and future challenges.
Exploring security vulnerabilities in smart home platforms through reverse engineering and phantom device testing, revealing unexpected state transitions and potential attacks.
Get personalized course recommendations, track subjects and courses with reminders, and more.