Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Keystroke Timing Analysis of on-the-fly Web Apps., , , and . ACNS, volume 7954 of Lecture Notes in Computer Science, page 405-413. Springer, (2013)MobiPot: Understanding Mobile Telephony Threats with Honeycards., , , , and . AsiaCCS, page 723-734. ACM, (2016)Under the Shadow of Sunshine: Characterizing Spam Campaigns Abusing Phone Numbers Across Online Social Networks., , , , , and . WebSci, page 67-76. ACM, (2018)Towards Measuring the Role of Phone Numbers in Twitter-Advertised Spam., , and . AsiaCCS, page 285-296. ACM, (2018)I can be You: Questioning the use of Keystroke Dynamics as Biometrics., , and . NDSS, The Internet Society, (2013)Towards Measuring the Effectiveness of Telephony Blacklists., , , and . NDSS, The Internet Society, (2018)SS-IDS: Statistical Signature Based IDS., , , , and . ICIW, page 407-412. IEEE Computer Society, (2009)Exploiting Phone Numbers and Cross-Application Features in Targeted Mobile Attacks., , , and . SPSM@CCS, page 73-82. ACM, (2016)Phoneypot: Data-driven Understanding of Telephony Threats., , , and . NDSS, The Internet Society, (2015)Understanding Cross-Channel Abuse with SMS-Spam Support Infrastructure Attribution., , , and . ESORICS (1), volume 9878 of Lecture Notes in Computer Science, page 3-26. Springer, (2016)