From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Golden Age: Conspiracy Theories' Relationship with Misinformation Outlets, News Media, and the Wider Internet., , и . CoRR, (2023)You've Got Vulnerability: Exploring Effective Vulnerability Notifications., , , , , , , и . USENIX Security Symposium, стр. 1033-1050. USENIX Association, (2016)The Danger of USB Drives., , , и . IEEE Secur. Priv., 15 (2): 62-69 (2017)Ä Special Operation": A Quantitative Approach to Dissecting and Comparing Different Media Ecosystems' Coverage of the Russo-Ukrainian War., , и . ICWSM, стр. 339-350. AAAI Press, (2023)Stale TLS Certificates: Investigating Precarious Third-Party Access to Valid TLS Keys., , , , , , , и . IMC, стр. 222-235. ACM, (2023)The Matter of Heartbleed., , , , , , , , , и 1 other автор(ы). Internet Measurement Conference, стр. 475-488. ACM, (2014)A Search Engine Backed by Internet-Wide Scanning., , , , и . CCS, стр. 542-553. ACM, (2015)Users Really Do Plug in USB Drives They Find., , , , , , и . IEEE Symposium on Security and Privacy, стр. 306-319. IEEE Computer Society, (2016)Measuring the Security Harm of TLS Crypto Shortcuts., , и . Internet Measurement Conference, стр. 33-47. ACM, (2016)No Calm in The Storm: Investigating QAnon Website Relationships., , и . CoRR, (2021)