1. Akhawe, D., Felt, A.P.: Alice in warningland: a large-scale field study of browser security warning effectiveness. In: Proceedings of USENIX Security Symposium (2013)
2. Alashwali, E.S.: Cryptographic vulnerabilities in real-life web servers. In: Proceedings of International Conference on Communications and Information Technology (ICCIT), pp. 6–11 (2013)
3. Alashwali, E.S., Rasmussen, K.: What’s in a downgrade? a taxonomy of downgrade attacks in the TLS protocol and application protocols using TLS. In: Proceedings of Applications and Techniques in Cyber Security (ATCS), pp. 468–487 (2018)
4. Alashwali, E.S., Szalachowski, P., Martin, A.: Does “www." mean better transport layer security? In: Proceedings of Availability, Reliability and Security (ARES), pp. 23:1–23:7 (2019)
5. Alexa Internet Inc.: Alexa Top Sites (2018).
http://s3.amazonaws.com/alexa-static/top-1m.csv.zip
. Accessed 22 August (2018)