×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents of cybersecurity-education-and-research-centre
Broker Bots: Analyzing automated activity during High Impact Events on Twitter
154 views
Securing the Digital Enterprise
92 views
Exploration of gaps in Bitly's spam detection and relevant countermeasures
543 views
Analyzing Social and Stylometric Features to Identify Spear phishing Emails
89 views
bit.ly/malicious: Deep Dive into Short URL based e-Crime Detection
206 views
Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page
176 views
The future of interaction & its security challenges
126 views
Web Application Security 101
244 views
Twitter and Polls: What Do 140 Characters Say About India General Elections 2014
368 views
National Critical Information Infrastructure Protection Centre (NCIIPC): Role and Responisbilities
341 views
Identification and Analysis of Malicious Content on Facebook: A Survey
57 views
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating Cyber Risk
121 views
A Strategy for Addressing Cyber Security Challenges
546 views
Video Inpainting detection using inconsistencies in optical Flow
157 views
TASVEER : Tomography of India’s Internet Infrastructure
46 views
Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Implementations
16 views