From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Case Study: Rental Scams., , , и . Understanding Social Engineering Based Scams, Springer, (2016)Evaluating Login Challenges as aDefense Against Account Takeover., , , , , , и . WWW, стр. 372-382. ACM, (2019)Fifteen minutes of unwanted fame: detecting and characterizing doxing., , , и . Internet Measurement Conference, стр. 432-444. ACM, (2017)Dialing Back Abuse on Phone Verified Accounts., , , , , и . ACM Conference on Computer and Communications Security, стр. 465-476. ACM, (2014)Constructing and Analyzing Criminal Networks., , , и . IEEE Symposium on Security and Privacy Workshops, стр. 84-91. IEEE Computer Society, (2014)Propaganda Política Pagada: Exploring U.S. Political Facebook Ads en Español., , , , и . WWW, стр. 2742-2753. ACM, (2023)Priceless: the role of payments in abuse-advertised goods., , , , и . CCS, стр. 845-856. ACM, (2012)Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting., и . USENIX Security Symposium, USENIX Association, (2006)Reading the Tea leaves: A Comparative Analysis of Threat Intelligence., , , , , и . USENIX Security Symposium, стр. 851-867. USENIX Association, (2019)A large-scale characterization of online incitements to harassment across platforms., , , , , , , , , и . Internet Measurement Conference, стр. 621-638. ACM, (2021)