Author of the publication

It's Not what It Looks Like: Measuring Attacks and Defensive Registrations of Homograph Domains.

, , , , and . CNS, page 259-267. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Audit of Facebook's Political Ad Policy Enforcement., , , , , and . USENIX Security Symposium, page 607-624. USENIX Association, (2022)Large-Scale Analysis of Style Injection by Relative Path Overwrite., , , , , and . WWW, page 237-246. ACM, (2018)Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement in User Uploads to One-Click File Hosters., , , , , and . RAID, volume 8145 of Lecture Notes in Computer Science, page 369-389. Springer, (2013)Getting Under Alexa's Umbrella: Infiltration Attacks Against Internet Top Domain Lists., , , , and . ISC, volume 11723 of Lecture Notes in Computer Science, page 255-276. Springer, (2019)Propaganda Política Pagada: Exploring U.S. Political Facebook Ads en Español., , , , and . WWW, page 2742-2753. ACM, (2023)Honeybot, Your Man in the Middle for Automated Social Engineering., , , and . LEET, USENIX Association, (2010)A large-scale characterization of online incitements to harassment across platforms., , , , , , , , , and . Internet Measurement Conference, page 621-638. ACM, (2021)Clustering and the Weekend Effect: Recommendations for the Use of Top Domain Lists in Security Research., , , , and . PAM, volume 11419 of Lecture Notes in Computer Science, page 161-177. Springer, (2019)From Deletion to Re-Registration in Zero Seconds: Domain Registrar Behaviour During the Drop., , , , and . Internet Measurement Conference, page 322-328. ACM, (2018)Paying for Piracy? An Analysis of One-Click Hosters' Controversial Reward Schemes., , and . RAID, volume 7462 of Lecture Notes in Computer Science, page 169-189. Springer, (2012)