Author of the publication

Examining the Adoption and Abandonment of Security, Privacy, and Identity Theft Protection Practices.

, , , , , and . CHI, page 1-15. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Large-Scale Identification of Malicious Singleton Files., , , and . CODASPY, page 227-238. ACM, (2017)The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence., , , , , , , and . USENIX Security Symposium, page 429-446. USENIX Association, (2021)Efficient, sensitivity resistant binary instrumentation., , and . ISSTA, page 89-99. ACM, (2011)Examining the Adoption and Abandonment of Security, Privacy, and Identity Theft Protection Practices., , , , , and . CHI, page 1-15. ACM, (2020)Scamdog Millionaire: Detecting E-commerce Scams in the Wild., , , , and . ACSAC, page 29-43. ACM, (2023)Binary-code obfuscations in prevalent packer tools., and . ACM Comput. Surv., 46 (1): 4:1-4:32 (2013)Automatic Application Identification from Billions of Files., , , and . KDD, page 2021-2030. ACM, (2017)Hybrid Analysis and Control of Malware., and . RAID, volume 6307 of Lecture Notes in Computer Science, page 317-338. Springer, (2010)Making Machine Learning Forget., , and . APF, volume 11498 of Lecture Notes in Computer Science, page 72-83. Springer, (2019)Collaborative and Privacy-Preserving Machine Teaching via Consensus Optimization., , , , and . IJCNN, page 1-8. IEEE, (2019)