×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents of cybersecurity-education-and-research-centre
Broker Bots: Analyzing automated activity during High Impact Events on Twitter
149 views
Securing the Digital Enterprise
82 views
Exploration of gaps in Bitly's spam detection and relevant countermeasures
541 views
Analyzing Social and Stylometric Features to Identify Spear phishing Emails
88 views
bit.ly/malicious: Deep Dive into Short URL based e-Crime Detection
204 views
Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page
172 views
The future of interaction & its security challenges
125 views
Web Application Security 101
238 views
Twitter and Polls: What Do 140 Characters Say About India General Elections 2014
367 views
National Critical Information Infrastructure Protection Centre (NCIIPC): Role and Responisbilities
339 views
Identification and Analysis of Malicious Content on Facebook: A Survey
54 views
A Strategy for Addressing Cyber Security Challenges
546 views
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating Cyber Risk
119 views
Video Inpainting detection using inconsistencies in optical Flow
155 views
TASVEER : Tomography of India’s Internet Infrastructure
45 views
Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Implementations
16 views