From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Dialing Back Abuse on Phone Verified Accounts., , , , , и . ACM Conference on Computer and Communications Security, стр. 465-476. ACM, (2014)Constructing and Analyzing Criminal Networks., , , и . IEEE Symposium on Security and Privacy Workshops, стр. 84-91. IEEE Computer Society, (2014)Priceless: the role of payments in abuse-advertised goods., , , , и . CCS, стр. 845-856. ACM, (2012)Reading the Tea leaves: A Comparative Analysis of Threat Intelligence., , , , , и . USENIX Security Symposium, стр. 851-867. USENIX Association, (2019)Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting., и . USENIX Security Symposium, USENIX Association, (2006)Propaganda Política Pagada: Exploring U.S. Political Facebook Ads en Español., , , , и . WWW, стр. 2742-2753. ACM, (2023)Fifteen minutes of unwanted fame: detecting and characterizing doxing., , , и . Internet Measurement Conference, стр. 432-444. ACM, (2017)A large-scale characterization of online incitements to harassment across platforms., , , , , , , , , и . Internet Measurement Conference, стр. 621-638. ACM, (2021)Evaluating Login Challenges as aDefense Against Account Takeover., , , , , , и . WWW, стр. 372-382. ACM, (2019)Ad Injection at Scale: Assessing Deceptive Advertisement Modifications., , , , , , , , , и 2 other автор(ы). IEEE Symposium on Security and Privacy, стр. 151-167. IEEE Computer Society, (2015)