Author of the publication

Finding Phish in a Haystack: A Pipeline for Phishing Classification on Certificate Transparency Logs.

, , , and . ARES, page 59:1-59:12. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Interpretable Visualizations of Deep Neural Networks for Domain Generation Algorithm Detection., , , and . VizSec, page 25-29. IEEE, (2020)How to Securely Prune Bitcoin's Blockchain., , , , , and . CoRR, (2020)Finding Phish in a Haystack: A Pipeline for Phishing Classification on Certificate Transparency Logs., , , and . ARES, page 59:1-59:12. ACM, (2021)CloudAnalyzer: Uncovering the Cloud Usage of Mobile Apps., , , , , , and . MobiQuitous, page 262-271. ACM, (2017)CoinPrune: Shrinking Bitcoin's Blockchain Retrospectively., , , , , and . CoRR, (2021)Towards Privacy-Preserving Classification-as-a-Service for DGA Detection., , , and . PST, page 1-10. IEEE, (2021)Making use of NXt to nothing: the effect of class imbalances on DGA detection classifiers., , , and . ARES, page 85:1-85:9. ACM, (2020)Detecting Unknown DGAs without Context Information., , and . ARES, page 29:1-29:12. ACM, (2022)Sharing FANCI Features: A Privacy Analysis of Feature Extraction for DGA Detection., , and . CoRR, (2021)The More, the Better: A Study on Collaborative Machine Learning for DGA Detection., , , and . CYSARM@CCS, page 1-12. ACM, (2021)