A Study on the Use of 3rd Party DNS Resolvers for Malware Filtering or Censorship Circumvention

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:SEC (37. : 2022 : Kopenhagen; Online) ICT systems security and privacy protection
1. Verfasser: Fejrskov, Martin (VerfasserIn)
Weitere Verfasser: Vasilomanolakis, Emmanouil (VerfasserIn), Pedersen, Jens Myrup (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Robust PDF Files Forensics Using Coding Style 2022 Adhatarao, Supriya
FOCUS: Frequency Based Detection of Covert Ultrasonic Signals 2022 Hellemans, Wouter
Novel Approaches for the Development of Trusted IoT Entities 2022 Ferraris, Davide
Towards Supporting Attribute-Based Access Control in Hyperledger Fabric Blockchain 2022 Pericherla, Amshumaan
Deriving and Using Synthetic Consequences for Privacy Risk Modeling 2022 Shapiro, Stuart S.
RAAM: A Restricted Adversarial Attack Model with Adding Perturbations to Traffic Features 2022 Sun, Peishuai
Enhanced Privacy in Smart Workplaces: Employees’ Preferences for Transparency Indicators and Control Interactions in the Case of Data Collection with Smart Watches 2022 Richter, Alexander
Post-Quantum Cheating Detectable Private Information Retrieval 2022 Zhu, Lin
Greedy Networking in Cryptocurrency Blockchain 2022 Wuthier, Simeon
Usability of Antivirus Tools in a Threat Detection Scenario 2022 Körber, Michael
UP-MLE: Efficient and Practical Updatable Block-Level Message-Locked Encryption Scheme Based on Update Properties 2022 Wu, Shaoqiang
Light-Weight File Fragments Classification Using Depthwise Separable Convolutions 2022 Saaim, Kunwar Muhammed
Evaluation of Circuit Lifetimes in Tor 2022 Köster, Kevin
Requirements and Secure Serialization for Selective Disclosure Verifiable Credentials 2022 Kalos, Vasilis
A Study on the Use of 3rd Party DNS Resolvers for Malware Filtering or Censorship Circumvention 2022 Fejrskov, Martin
Data Minimisation Potential for Timestamps in Git: An Empirical Analysis of User Configurations 2022 Burkert, Christian
Upside Down: Exploring the Ecosystem of Dark Web Data Markets 2022 Covrig, Bogdan
Efficient Volume-Hiding Encrypted Multi-Maps with Support for Conjunctive Queries 2022 Li, Tianci
An Efficient Use-after-Free Mitigation Approach via Static Dangling Pointer Nullification 2022 Yu, Yue
D-Cloud-Collector: Admissible Forensic Evidence from Mobile Cloud Storage 2022 Vella, Mark
Alle Artikel auflisten