From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The post anachronism: the temporal dimension of facebook privacy., , , , , , и . WPES, стр. 1-12. ACM, (2013)An Observational Investigation of Reverse Engineers' Processes., , , , и . CoRR, (2019)An Observational Investigation of Reverse Engineers' Process and Mental Models., , , , и . CHI Extended Abstracts, ACM, (2019)We Are the Experts, and We Are the Problem: The Security Advice Fiasco.. CCS, стр. 7. ACM, (2022)Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It., , , , , и . USENIX Security Symposium, стр. 109-126. USENIX Association, (2020)What Twitter Knows: Characterizing Ad Targeting Practices, User Perceptions, and Ad Explanations Through Users' Own Twitter Data., , , , , , , , , и . USENIX Security Symposium, стр. 145-162. USENIX Association, (2020)Bug Hunters' Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem., , , , , , , и . USENIX Security Symposium, стр. 2275-2291. USENIX Association, (2023)Compliance Cautions: Investigating Security Issues Associated with U.S. Digital-Security Standards., , , , , , , и . NDSS, The Internet Society, (2020)Exploring reactive access control., , , , , и . CHI, стр. 2085-2094. ACM, (2011)Tag, you can see it!: using tags for access control in photo sharing., , , , , , , , и . CHI, стр. 377-386. ACM, (2012)