Author of the publication

On recruiting and retaining users for security-sensitive longitudinal measurement panels.

, , , , , , and . SOUPS @ USENIX Security Symposium, page 347-366. USENIX Association, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Host Name Resolution Infrastructure for Overlay Networks., , and . IEICE Trans. Commun., 89-B (9): 2434-2439 (2006)Hunting Brand Domain Forgery: A Scalable Classification for Homograph Attack., , , , , and . SEC, volume 562 of IFIP Advances in Information and Communication Technology, page 3-18. Springer, (2019)Quantifying and Managing Impacts of Concept Drifts on IoT Traffic Inference in Residential ISP Networks., , , , , and . CoRR, (2023)Identification of an IoT Device Model in the Home Domain Using IPFIX Records., , , and . COMPSAC, page 583-592. IEEE, (2022)On recruiting and retaining users for security-sensitive longitudinal measurement panels., , , , , , and . SOUPS @ USENIX Security Symposium, page 347-366. USENIX Association, (2022)Kernel-based Behavior Analysis for Android Malware Detection., , and . CIS, page 1011-1015. IEEE Computer Society, (2011)Anonymous and analysable web browsing., , and . IPCCC, page 1-8. IEEE Computer Society, (2017)Robust ORAM: Enhancing Availability, Confidentiality and Integrity., , , , and . PRDC, page 30-39. IEEE Computer Society, (2017)Human Factors in Homograph Attack Recognition., , , , , , and . ACNS (2), volume 12147 of Lecture Notes in Computer Science, page 408-435. Springer, (2020)L2VPN over Chord: Hosting Millions of Small Zeroconf Networks over DHT Nodes., , and . GLOBECOM, IEEE, (2006)