Page Cache Attacks
|
Alternative (ab)uses for HTTP Alternative Services
|
Framework for Real time monitoring of power data from MGHPCC datacenter
|
Location Leakage from Network Access Patterns
|
Distributed Web Mining of Ethereum
|
User-profile-based analytics for detecting cloud security breaches
|
Case Study: Disclosure of Indirect Device Fingerprinting in Privacy Policies
|
Cashing in on the File-System Cache
|
Detecting Anomalies in User Profiles in the Cloud via Machine Learning
|