Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Google Chrome

Known as: Google Chrome 12, RLZ, Chrome (software) 
Google Chrome is a freeware web browser developed by Google. It was first released in 2008, for Microsoft Windows, and was later ported to Linux, OS… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Mobile devices are increasingly the dominant Internet access technology. Nevertheless, high costs, data caps, and throttling are… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2014
Highly Cited
2014
Web browsers show HTTPS authentication warnings (i.e., SSL warnings) when the integrity and confidentiality of users… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2014
Highly Cited
2014
Phishing is an online identity theft, which aims to steal confidential information such as username, password and online banking… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2014
Highly Cited
2014
We contribute 5-gram counts and language models trained on the Common Crawl corpus, a collection over 9 billion web pages. This… Expand
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
2013
2013
NVD is one of the most popular databases used by researchers to conduct empirical research on data sets of vulnerabilities. Our… Expand
  • figure 1
  • figure 4
  • figure 2
  • figure 3
  • figure 6
Is this relevant?
Highly Cited
2013
Highly Cited
2013
We perform an empirical study to better understand two well-known vulnerability rewards programs, or VRPs, which software vendors… Expand
  • table 1
  • figure 1
  • figure 2
  • table 2
  • figure 3
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Third-party applications (apps) drive the attractiveness of web and mobile application platforms. Many of these platforms adopt a… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 4
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Developers frequently use inefficient code sequences that could be fixed by simple patches. These inefficient code sequences can… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2012
Highly Cited
2012
With the advent of online social media, phishers have started using social networks like Twitter, Facebook, and Foursquare to… Expand
  • figure 1.1
  • figure 5.1
  • figure 5.2
  • figure 5.3
  • table 5.1
Is this relevant?
2009
2009
To shield the browser from attacks, Google Chrome developers eyed three key problems. 
Is this relevant?