ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1806.01156
  4. Cited By
Tranco: A Research-Oriented Top Sites Ranking Hardened Against
  Manipulation
v1v2v3 (latest)

Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation

4 June 2018
Victor Le Pochat
Tom van Goethem
Samaneh Tajalizadehkhoob
Maciej Korczyński
Wouter Joosen
ArXiv (abs)PDFHTML

Papers citing "Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation"

50 / 69 papers shown
Title
PhishDebate: An LLM-Based Multi-Agent Framework for Phishing Website Detection
PhishDebate: An LLM-Based Multi-Agent Framework for Phishing Website Detection
Wenhao Li
S. Manickam
Yung-wey Chong
Shankar Karuppayah
LLMAG
40
0
0
18 Jun 2025
SoK: Advances and Open Problems in Web Tracking
SoK: Advances and Open Problems in Web Tracking
Yash Vekaria
Yohan Beugin
Shaoor Munir
Gunes Acar
Nataliia Bielova
...
Nick Nikiforakis
Jason Polakis
Franziska Roesner
Zubair Shafiq
Sebastian Zimmeck
OffRL
22
0
0
16 Jun 2025
Navigating Cookie Consent Violations Across the Globe
Brian Tang
D. Bui
Kang G. Shin
18
0
0
10 Jun 2025
Scoring the Unscorables: Cyber Risk Assessment Beyond Internet Scans
Scoring the Unscorables: Cyber Risk Assessment Beyond Internet Scans
Armin Sarabi
Manish Karir
Mingyan Liu
27
0
0
07 Jun 2025
Fingerprinting Implementations of Cryptographic Primitives and Protocols that Use Post-Quantum Algorithms
Fingerprinting Implementations of Cryptographic Primitives and Protocols that Use Post-Quantum Algorithms
Tushin Mallick
Ramana Rao Kompella
Ashish Kundu
Cristina Nita-Rotaru
64
0
0
22 Mar 2025
DomainDynamics: Lifecycle-Aware Risk Timeline Construction for Domain Names
DomainDynamics: Lifecycle-Aware Risk Timeline Construction for Domain Names
Daiki Chiba
Hiroki Nakano
Takashi Koide
219
0
0
24 Feb 2025
Detecting Phishing Sites Using ChatGPT
Detecting Phishing Sites Using ChatGPT
Takashi Koide
Naoki Fukushi
Hiroki Nakano
Daiki Chiba
170
31
0
17 Feb 2025
MANTIS: Detection of Zero-Day Malicious Domains Leveraging Low Reputed Hosting Infrastructure
MANTIS: Detection of Zero-Day Malicious Domains Leveraging Low Reputed Hosting Infrastructure
Fatih Deniz
Mohamed Nabeel
Ting Yu
Issa M. Khalil
65
1
0
17 Feb 2025
Explorer: Scaling Exploration-driven Web Trajectory Synthesis for Multimodal Web Agents
Explorer: Scaling Exploration-driven Web Trajectory Synthesis for Multimodal Web Agents
Vardaan Pahuja
Yadong Lu
Corby Rosset
Boyu Gou
Arindam Mitra
Spencer Whitehead
Yu Su
Ahmed Awadallah
LLMAGLM&Ro
Presented at ResearchTrend Connect | LLMAG on 14 Mar 2025
259
7
1
17 Feb 2025
PixLift: Accelerating Web Browsing via AI Upscaling
Yonas Atinafu
Sarthak Malla
HyunSeok Daniel Jang
Nouar Aldahoul
Matteo Varvello
Yasir Zaki
123
0
0
13 Feb 2025
Dancer in the Dark: Synthesizing and Evaluating Polyglots for Blind Cross-Site Scripting
Dancer in the Dark: Synthesizing and Evaluating Polyglots for Blind Cross-Site Scripting
Robin Kirchner
Jonas Moller
Marius Musch
David Klein
Konrad Rieck
Martin Johns
110
4
0
12 Feb 2025
Lazy Gatekeepers: A Large-Scale Study on SPF Configuration in the Wild
Lazy Gatekeepers: A Large-Scale Study on SPF Configuration in the Wild
Stefan Czybik
Micha Horlboge
Konrad Rieck
132
8
0
12 Feb 2025
Harmful Terms and Where to Find Them: Measuring and Modeling Unfavorable Financial Terms and Conditions in Shopping Websites at Scale
Harmful Terms and Where to Find Them: Measuring and Modeling Unfavorable Financial Terms and Conditions in Shopping Websites at Scale
Elisa Tsai
Neal Mangaokar
Boyuan Zheng
Haizhong Zheng
A. Prakash
87
0
0
03 Feb 2025
Exploring QUIC Dynamics: A Large-Scale Dataset for Encrypted Traffic Analysis
Exploring QUIC Dynamics: A Large-Scale Dataset for Encrypted Traffic Analysis
Barak Gahtan
Robert J. Sahala
A. Bronstein
R. Cohen
98
0
0
30 Sep 2024
Understanding Privacy Norms through Web Forms
Understanding Privacy Norms through Web Forms
Hao Cui
R. Trimananda
A. Markopoulou
AILaw
63
1
0
29 Aug 2024
PhishAgent: A Robust Multimodal Agent for Phishing Webpage Detection
PhishAgent: A Robust Multimodal Agent for Phishing Webpage Detection
Tri Cao
Chengyu Huang
Yuexin Li
Huilin Wang
Amy He
Nay Oo
Bryan Hooi
LLMAGOffRL
166
7
0
20 Aug 2024
From ML to LLM: Evaluating the Robustness of Phishing Webpage Detection Models against Adversarial Attacks
From ML to LLM: Evaluating the Robustness of Phishing Webpage Detection Models against Adversarial Attacks
Aditya Kulkarni
Vivek Balachandran
D. Divakaran
Tamal Das
AAML
123
5
0
29 Jul 2024
Automatically Generating UI Code from Screenshot: A Divide-and-Conquer-Based Approach
Automatically Generating UI Code from Screenshot: A Divide-and-Conquer-Based Approach
Yuxuan Wan
Chaozheng Wang
Yi Dong
Wenxuan Wang
Shuqing Li
Yintong Huo
Michael R. Lyu
3DV
172
14
0
24 Jun 2024
COOKIEGUARD: Characterizing and Isolating the First-Party Cookie Jar
COOKIEGUARD: Characterizing and Isolating the First-Party Cookie Jar
Pouneh Nikkhah Bahrami
Aurore Fass
Zubair Shafiq
142
1
0
08 Jun 2024
A Public and Reproducible Assessment of the Topics API on Real Data
A Public and Reproducible Assessment of the Topics API on Real Data
Yohan Beugin
Patrick McDaniel
97
0
0
28 Mar 2024
An Extended View on Measuring Tor AS-level Adversaries
An Extended View on Measuring Tor AS-level Adversaries
G. K. Gegenhuber
Markus Maier
Florian Holzbauer
Wilfried Mayer
Georg Merzdovnik
Edgar Weippl
Johanna Ullrich
48
4
0
13 Mar 2024
MobileAtlas: Geographically Decoupled Measurements in Cellular Networks
  for Security and Privacy Research
MobileAtlas: Geographically Decoupled Measurements in Cellular Networks for Security and Privacy Research
G. K. Gegenhuber
Wilfried Mayer
Edgar Weippl
Adrian Dabrowski
28
5
0
13 Mar 2024
Duumviri: Detecting Trackers and Mixed Trackers with a Breakage Detector
Duumviri: Detecting Trackers and Mixed Trackers with a Breakage Detector
Shuang He
Lianying Zhao
David Lie
151
0
0
12 Feb 2024
Targeted and Troublesome: Tracking and Advertising on Children's
  Websites
Targeted and Troublesome: Tracking and Advertising on Children's Websites
Zahra Moti
Asuman Senol
Hamid Bostani
F. Z. Borgesius
Veelasha Moonsamy
Arunesh Mathur
Gunes Acar
89
2
0
09 Aug 2023
False Sense of Security: Leveraging XAI to Analyze the Reasoning and
  True Performance of Context-less DGA Classifiers
False Sense of Security: Leveraging XAI to Analyze the Reasoning and True Performance of Context-less DGA Classifiers
Arthur Drichel
Ulrike Meyer
50
7
0
10 Jul 2023
Information-Based Heavy Hitters for Real-Time DNS Data Exfiltration
  Detection and Prevention
Information-Based Heavy Hitters for Real-Time DNS Data Exfiltration Detection and Prevention
Yarin Ozery
Asaf Nadler
A. Shabtai
123
6
0
05 Jul 2023
Is Your Wallet Snitching On You? An Analysis on the Privacy Implications
  of Web3
Is Your Wallet Snitching On You? An Analysis on the Privacy Implications of Web3
C. F. Torres
Fiona Willi
Shweta Shinde
44
8
0
13 Jun 2023
JABBERWOCK: A Tool for WebAssembly Dataset Generation and Its
  Application to Malicious Website Detection
JABBERWOCK: A Tool for WebAssembly Dataset Generation and Its Application to Malicious Website Detection
Chika Komiya
Naoto Yanai
Kyosuke Yamashita
Shingo Okamura
29
1
0
09 Jun 2023
A Survey on Malware Detection with Graph Representation Learning
A Survey on Malware Detection with Graph Representation Learning
Tristan Bilot
Nour El Madhoun
Khaldoun Al Agha
Anis Zouaoui
AAML
94
28
0
28 Mar 2023
Exploiting Input Sanitization for Regex Denial of Service
Exploiting Input Sanitization for Regex Denial of Service
Efe Barlas
Xin Du
James C. Davis
AAMLSILMOnRL
61
16
0
03 Mar 2023
A Transcontinental Analysis of Account Remediation Protocols of Popular
  Websites
A Transcontinental Analysis of Account Remediation Protocols of Popular Websites
Philipp Markert
Andrick Adhikari
Sanchari Das
44
6
0
02 Feb 2023
SSO-Monitor: Fully-Automatic Large-Scale Landscape, Security, and
  Privacy Analyses of Single Sign-On in the Wild
SSO-Monitor: Fully-Automatic Large-Scale Landscape, Security, and Privacy Analyses of Single Sign-On in the Wild
M.R.M. Westers
Tobias Wich
Louis Jannett
Vladislav Mladenov
Christian Mainka
Andreas Mayer
38
6
0
02 Feb 2023
Open SESAME: Fighting Botnets with Seed Reconstructions of Domain
  Generation Algorithms
Open SESAME: Fighting Botnets with Seed Reconstructions of Domain Generation Algorithms
N. Weissgerber
Thorsten Jenke
Elmar Padilla
Lilli Bruckschen
20
0
0
12 Jan 2023
Stealthy Peers: Understanding Security Risks of WebRTC-Based
  Peer-Assisted Video Streaming
Stealthy Peers: Understanding Security Risks of WebRTC-Based Peer-Assisted Video Streaming
Siyuan Tang
Eihal Alowaisheq
Xianghang Mi
Yi Chen
Wenyuan Xu
Yanzhi Dou
15
1
0
06 Dec 2022
A Systematic Study of the Consistency of Two-Factor Authentication User
  Journeys on Top-Ranked Websites (Extended Version)
A Systematic Study of the Consistency of Two-Factor Authentication User Journeys on Top-Ranked Websites (Extended Version)
Sanam Ghorbani Lyastani
Michael Backes
Sven Bugiel
24
12
0
17 Oct 2022
"Sign in with ... Privacy'': Timely Disclosure of Privacy Differences
  among Web SSO Login Options
"Sign in with ... Privacy'': Timely Disclosure of Privacy Differences among Web SSO Login Options
Srivathsan G. Morkonda
Sonia Chiasson
P. V. Oorschot
148
5
0
09 Sep 2022
The Rise of GoodFATR: A Novel Accuracy Comparison Methodology for
  Indicator Extraction Tools
The Rise of GoodFATR: A Novel Accuracy Comparison Methodology for Indicator Extraction Tools
Juan Caballero
Gibran Gómez
S. Matic
Gustavo Sánchez
Silvia Sebastián
Arturo Villacañas
57
17
0
29 Jul 2022
PhishSim: Aiding Phishing Website Detection with a Feature-Free Tool
PhishSim: Aiding Phishing Website Detection with a Feature-Free Tool
R. Purwanto
Arindam Pal
Alan Blair
S. Jha
31
18
0
13 Jul 2022
PLAtE: A Large-scale Dataset for List Page Web Extraction
PLAtE: A Large-scale Dataset for List Page Web Extraction
Aidan San
Yuan Zhuang
J. Bakus
Colin Lockard
David M. Ciemiewicz
Sandeep Atluri
Yangfeng Ji
Kevin Small
Heba Elfardy
75
5
0
24 May 2022
Analysing and strengthening OpenWPM's reliability
Analysing and strengthening OpenWPM's reliability
Benjamin Krumnow
H. Jonker
S. Karsch
56
0
0
18 May 2022
Tracking, Profiling, and Ad Targeting in the Alexa Echo Smart Speaker
  Ecosystem
Tracking, Profiling, and Ad Targeting in the Alexa Echo Smart Speaker Ecosystem
Umar Iqbal
Pouneh Nikkhah Bahrami
R. Trimananda
Hao Cui
Alexander Gamero-Garrido
Daniel Dubois
David Choffnes
A. Markopoulou
Franziska Roesner
Zubair Shafiq
MLAU
117
26
0
22 Apr 2022
Trackers Bounce Back: Measuring Evasion of Partitioned Storage in the
  Wild
Trackers Bounce Back: Measuring Evasion of Partitioned Storage in the Wild
A. Randall
Peter Snyder
Alisha Ukani
A. Snoeren
Geoff Voelker
Stefan Savage
Aaron Schulman
18
2
0
18 Mar 2022
AutoFR: Automated Filter Rule Generation for Adblocking
AutoFR: Automated Filter Rule Generation for Adblocking
Hieu Le
Salma Elmalaki
A. Markopoulou
Zubair Shafiq
135
12
0
25 Feb 2022
Towards Understanding First-Party Cookie Tracking in the Field
Towards Understanding First-Party Cookie Tracking in the Field
Nurullah Demir
Daniel Theis
Tobias Urban
N. Pohlmann
49
8
0
03 Feb 2022
Measuring the Accessibility of Domain Name Encryption and Its Impact on
  Internet Filtering
Measuring the Accessibility of Domain Name Encryption and Its Impact on Internet Filtering
Nguyen Phong Hoang
M. Polychronakis
Phillipa Gill
58
14
0
01 Feb 2022
Cookie Banners, What's the Purpose? Analyzing Cookie Banner Text Through
  a Legal Lens
Cookie Banners, What's the Purpose? Analyzing Cookie Banner Text Through a Legal Lens
Cristiana Santos
Arianna Rossi
Lorena Sánchez Chamorro
Kerstin Bongard-Blanchy
Ruba Abu-Salma
123
46
0
06 Oct 2021
Unsupervised Detection and Clustering of Malicious TLS Flows
Unsupervised Detection and Clustering of Malicious TLS Flows
Gibran Gómez
Platon Kotzias
Matteo DellÁmico
Leyla Bilge
Juan Caballero
36
11
0
08 Sep 2021
Feature Importance Guided Attack: A Model Agnostic Adversarial Attack
Feature Importance Guided Attack: A Model Agnostic Adversarial Attack
Gilad Gressel
Niranjan Hegde
A. Sreekumar
Rishikumar Radhakrishnan
Kalyani Harikumar
Michael C. Darling
Krishnashree Achuthan
AAML
158
18
0
28 Jun 2021
Finding Phish in a Haystack: A Pipeline for Phishing Classification on
  Certificate Transparency Logs
Finding Phish in a Haystack: A Pipeline for Phishing Classification on Certificate Transparency Logs
Arthur Drichel
Vincent Drury
Justus von Brandt
Ulrike Meyer
87
22
0
23 Jun 2021
Best Practices for Notification Studies for Security and Privacy Issues
  on the Internet
Best Practices for Notification Studies for Security and Privacy Issues on the Internet
Max Maass
H. Pridöhl
Dominik Herrmann
M. Hollick
44
13
0
15 Jun 2021
12
Next