Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Audit of Facebook's Political Ad Policy Enforcement., , , , , and . USENIX Security Symposium, page 607-624. USENIX Association, (2022)Large-Scale Analysis of Style Injection by Relative Path Overwrite., , , , , and . WWW, page 237-246. ACM, (2018)Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement in User Uploads to One-Click File Hosters., , , , , and . RAID, volume 8145 of Lecture Notes in Computer Science, page 369-389. Springer, (2013)Getting Under Alexa's Umbrella: Infiltration Attacks Against Internet Top Domain Lists., , , , and . ISC, volume 11723 of Lecture Notes in Computer Science, page 255-276. Springer, (2019)Propaganda Política Pagada: Exploring U.S. Political Facebook Ads en Español., , , , and . WWW, page 2742-2753. ACM, (2023)Honeybot, Your Man in the Middle for Automated Social Engineering., , , and . LEET, USENIX Association, (2010)A large-scale characterization of online incitements to harassment across platforms., , , , , , , , , and . Internet Measurement Conference, page 621-638. ACM, (2021)Paying for Piracy? An Analysis of One-Click Hosters' Controversial Reward Schemes., , and . RAID, volume 7462 of Lecture Notes in Computer Science, page 169-189. Springer, (2012)Why Is CSP Failing? Trends and Challenges in CSP Adoption., , and . RAID, volume 8688 of Lecture Notes in Computer Science, page 212-233. Springer, (2014)Clustering and the Weekend Effect: Recommendations for the Use of Top Domain Lists in Security Research., , , , and . PAM, volume 11419 of Lecture Notes in Computer Science, page 161-177. Springer, (2019)