Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analyzing Target-Based Cryptocurrency Pump and Dump Schemes., , , , , and . DeFi@CCS, page 21-27. ACM, (2021)Analyzing the Bitcoin Ponzi Scheme Ecosystem., and . Financial Cryptography Workshops, volume 10958 of Lecture Notes in Computer Science, page 101-112. Springer, (2018)Longitudinal Study of Internet-Facing OpenSSH Update Patterns., and . PAM, volume 13210 of Lecture Notes in Computer Science, page 675-689. Springer, (2022)An examination of the cryptocurrency pump-and-dump ecosystem., , , , , , and . Inf. Process. Manag., 58 (4): 102506 (2021)SoK: A Framework for Asset Discovery: Systematizing Advances in Network Measurements for Protecting Organizations., , , , , , , , and . EuroS&P, page 440-456. IEEE, (2021)How Cryptocurrency Exchange Interruptions Create Arbitrage Opportunities., and . EuroS&P Workshops, page 207-215. IEEE, (2023)Economic Analyses of Security Investments on Cryptocurrency Exchanges., , , and . iThings/GreenCom/CPSCom/SmartData, page 1253-1262. IEEE, (2018)The Phish-Market Protocol: Secure Sharing Between Competitors., and . IEEE Secur. Priv., 8 (4): 40-45 (2010)Does Insurance Have a Future in Governing Cybersecurity?, and . IEEE Secur. Priv., 18 (1): 21-27 (2020)Identifying Subdomain Doppelganger Attacks against Companies., and . HICSS, page 7387-7396. ScholarSpace, (2024)