Author of the publication

PYTHIA: a Framework for the Automated Analysis of Web Hosting Environments.

, , and . WWW, page 3072-3078. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the threats to Cloud-based online service users (and what we can do about them).. HPCS, page 96-97. IEEE, (2015)Disinformation Warfare: Understanding State-Sponsored Trolls on Twitter and Their Influence on the Web., , , , , and . CoRR, (2018)Hit 'em where it hurts: a live security exercise on cyber situational awareness., , , , , , , and . ACSAC, page 51-61. ACM, (2011)What Happens After You Are Pwnd: Understanding the Use of Leaked Webmail Credentials in the Wild., , and . Internet Measurement Conference, page 65-79. ACM, (2016)Understanding the Use of Fauxtography on Social Media., , , , , , , and . CoRR, (2020)Shady paths: leveraging surfing crowds to detect malicious web pages., , and . ACM Conference on Computer and Communications Security, page 133-144. ACM, (2013)Pseudoscientific Content on YouTube: Assessing the Effects of Watch History on the Recommendation Algorithm., , , , , and . CoRR, (2020)Master of Sheets: A Tale of Compromised Cloud Documents., , and . EuroS&P Workshops, page 414-422. IEEE, (2019)Permissions snapshots: Assessing users' adaptation to the Android runtime permission model., , and . WIFS, page 1-6. IEEE, (2016)From Pick-Up Artists to Incels: A Data-Driven Sketch of the Manosphere., , , , , , , and . CoRR, (2020)