Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Golden Age: Conspiracy Theories' Relationship with Misinformation Outlets, News Media, and the Wider Internet., , and . CoRR, (2023)You've Got Vulnerability: Exploring Effective Vulnerability Notifications., , , , , , , and . USENIX Security Symposium, page 1033-1050. USENIX Association, (2016)The Danger of USB Drives., , , and . IEEE Secur. Priv., 15 (2): 62-69 (2017)The Matter of Heartbleed., , , , , , , , , and 1 other author(s). Internet Measurement Conference, page 475-488. ACM, (2014)Ä Special Operation": A Quantitative Approach to Dissecting and Comparing Different Media Ecosystems' Coverage of the Russo-Ukrainian War., , and . ICWSM, page 339-350. AAAI Press, (2023)Stale TLS Certificates: Investigating Precarious Third-Party Access to Valid TLS Keys., , , , , , , and . IMC, page 222-235. ACM, (2023)A Search Engine Backed by Internet-Wide Scanning., , , , and . CCS, page 542-553. ACM, (2015)Users Really Do Plug in USB Drives They Find., , , , , , and . IEEE Symposium on Security and Privacy, page 306-319. IEEE Computer Society, (2016)Measuring the Security Harm of TLS Crypto Shortcuts., , and . Internet Measurement Conference, page 33-47. ACM, (2016)Partial Mobilization: Tracking Multilingual Information Flows Amongst Russian Media Outlets and Telegram., and . CoRR, (2023)