Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deanonymizing Tor hidden service users through Bitcoin transactions analysis., , , and . Comput. Secur., (2020)Design and analysis of a social botnet., , , and . Comput. Networks, 57 (2): 556-578 (2013)Dizzy: Large-Scale Crawling and Analysis of Onion Services., and . CoRR, (2022)Source Attribution of Cryptographic API Misuse in Android Applications., , and . AsiaCCS, page 133-146. ACM, (2018)To Befriend Or Not? A Model of Friend Request Acceptance on Facebook., , , and . SOUPS, page 285-300. USENIX Association, (2014)When A Small Leak Sinks A Great Ship: Deanonymizing Tor Hidden Service Users Through Bitcoin Transactions Analysis., , , and . CoRR, (2018)Understanding Users' Requirements for Data Protection in Smartphones., , , , and . ICDE Workshops, page 228-235. IEEE Computer Society, (2012)BlockTag: Design and applications of a tagging system for blockchain analysis., , and . CoRR, (2018)Key Challenges in Defending Against Malicious Socialbots., , , and . LEET, USENIX Association, (2012)Harvesting the low-hanging fruits: defending against automated large-scale cyber-intrusions by focusing on the vulnerable population., , , , , and . NSPW, page 11-22. ACM, (2016)