0 | -- | 0 | Fatima M. Anwar, Mani B. Srivastava. A Case for Feedforward Control with Feedback Trim to Mitigate Time Transfer Attacks |
0 | -- | 0 | James Parker, Michael Hicks 0001, Andrew Ruef, Michelle L. Mazurek, Dave Levin, Daniel Votipka, Piotr Mardziel, Kelsey R. Fulton. Build It, Break It, Fix It: Contesting Secure Development |
0 | -- | 0 | Moni Naor, Lior Rotem, Gil Segev 0001. The Security of Lazy Users in Out-of-Band Authentication |
0 | -- | 0 | Muhammad Ikram, Rahat Masood, Gareth Tyson, Mohamed Ali Kâafar, Noha Loizon, Roya Ensafi. Measuring and Analysing the Chain of Implicit Trust: A Study of Third-party Resources Loading |
0 | -- | 0 | Guixin Ye, Zhanyong Tang, Dingyi Fang, Zhanxing Zhu, Yansong Feng, Pengfei Xu 0003, XiaoJiang Chen, Jungong Han, Zheng Wang 0001. Using Generative Adversarial Networks to Break and Protect Text Captchas |