Toggle navigation
WebCMS3
Search Courses
Login
COMP9337
20T1
Home
Course Outline
Forums
Timetable
Groups
Activities
Wikis
Video Recordings
Special considerations for online assessment
Course Work
Lectures
Labs
Research Report
Submissions
Research Project Forum
Practical Project
Toggle Menu
Resources
Research Project Forum
Research Project Forum
Stealthy Tracking of Autonomous Vehicles with Cache Side Channels
Firewall Fingerprinting and Denial of Firewalling Attacks
Let’s Encrypt: An Automated Certificate Authority to Encrypt the Entire Web
Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures
You Are Who You Appear to Be: A Longitudinal Study of Domain Impersonation in TLS Certificates
Your Cache Has Fallen: Cache-Poisoned Denial-of-Service Attack
Privacy-Preserving Dynamic Learning of Tor Network Traffic
Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet
Virtual network function deployment and service automation to provide end-to-end quantum encryption
Security Analysis of Emerging Smart Home Applications
When Match Fields Do Not Need to Match: Buffered Packet Hijacking in SDN
A Practical Approach for Taking Down Avalanche Botnets Under Real-World Constraints
Pinto: enabling video privacy for commodity IoT cameras
Zero-delay Lightweight Defenses against Website Fingerprinting
The DUSTER Attack: Tor Onion Service Attribution Based on Flow Watermarking with Track Hiding
The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR
DeepCorr: Strong Flow correlation attacks on ToR using Deep learning
RAPTOR: routing attacks on privacy in tor
The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network
Just the Tip of the Iceberg: Internet-Scale Exploitation of Routers for Cryptojacking
DNSRadar: Outsourcing Malicious Domain Detection Based on Distributed Cache-Footprints
Tor Bridge Discovery: Extensive Analysis and Large-scale Empirical Evaluation
Automatic fingerprinting of vulnerable BLE IoT devices with static uuids from mobile apps
A billion open inter-faces for eve and mallory: Mitm, dos, and tracking attacks on ios and macos through apple wireless direct link
Plug-n-pwned: Comprehensive vulnerability analysis of obd-ii dongles as a new over-the-air attack surface in automotive IoT
Charting the attack surface of trigger-action IoT platforms
Discovering and understanding the security hazards in the interactions between IoT devices, mobile apps, and clouds on smart home platforms
JEDI: Many-to-many end-to-end encryption and key delegation for iot
Smartauth: User-centered authorization for the internet of things
The art of the scam: Demystifying honeypots in ethereum smart contracts
The Wolf of Name Street: Hijacking Domains Through Their Nameservers
OpenSec: Policy-Based Security Using Software-Defined Networking
Security for 5G Mobile Wireless Networks
WADAC: Privacy- Preserving Anomaly Detection and Attack Classification on Wireless Traffic
Back to top
COMP4337/COMP9337 20T1 (Securing Fixed and Wireless Networks)
is powered by
WebCMS3
CRICOS Provider No. 00098G