Author of the publication

A Two-Decade Retrospective Analysis of a University's Vulnerability to Attacks Exploiting Reused Passwords.

, , , , , , , , , and . USENIX Security Symposium, page 5127-5144. USENIX Association, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Smart, useful, scary, creepy: perceptions of online behavioral advertising., , , , and . SOUPS, page 4. ACM, (2012)Helping Users Debug Trigger-Action Programs., , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 6 (4): 196:1-196:32 (2022)SoK: Context Sensing for Access Control in the Adversarial Home IoT., , , , , , and . EuroS&P, page 37-53. IEEE, (2021)Trigger-Action Programming in the Wild: An Analysis of 200, 000 IFTTT Recipes., , , , , , , and . CHI, page 3227-3231. ACM, (2016)Unpacking Perceptions of Data-Driven Inferences Underlying Online Targeting and Personalization., , , , , , and . CHI, page 493. ACM, (2018)Visualizing Differences to Improve End-User Understanding of Trigger-Action Programs., , , , and . CHI Extended Abstracts, page 1-10. ACM, (2020)Understanding the Security and Privacy Advice Given to Black Lives Matter Protesters., , , and . CHI, page 549:1-549:18. ACM, (2021)Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks., , , , , , and . USENIX Security Symposium, page 175-191. USENIX Association, (2016)Summarizing Sets of Related ML-Driven Recommendations for Improving File Management in Cloud Storage., , , and . UIST, page 95:1-95:11. ACM, (2022)Moving Beyond Set-It-And-Forget-It Privacy Settings on Social Media., , , , , , , , and . CCS, page 991-1008. ACM, (2019)