Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Framing Dependencies Introduced by Underground Commoditization., , , , , , , , , and . WEIS, (2015)Five Years of the Right to be Forgotten., , , , , , , , , and 10 other author(s). ACM Conference on Computer and Communications Security, page 959-972. ACM, (2019)Picasso: Lightweight Device Class Fingerprinting for Web Clients., , , and . SPSM@CCS, page 93-102. ACM, (2016)unFriendly: Multi-party Privacy Risks in Social Networks., , and . Privacy Enhancing Technologies, volume 6205 of Lecture Notes in Computer Science, page 236-252. Springer, (2010)Rethinking the Detection of Child Sexual Abuse Imagery on the Internet., , , , , , , , , and . WWW, page 2601-2607. ACM, (2019)Poisoning Web-Scale Training Datasets is Practical., , , , , , , , and . CoRR, (2023)The Role of the Underground Economy in Social Network Spam and Abuse.. University of California, Berkeley, USA, (2013)Data Breaches, Phishing, or Malware?: Understanding the Risks of Stolen Credentials., , , , , , , , , and 3 other author(s). CCS, page 1421-1434. ACM, (2017)Protecting accounts from credential stuffing with password breach alerting., , , , , , , , , and 1 other author(s). USENIX Security Symposium, page 1556-1571. USENIX Association, (2019)Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse., , , , and . USENIX Security Symposium, page 195-210. USENIX Association, (2013)