Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GoodFATR: A Platform for Automated Threat Report Collection and IOC Extraction., , , , , and . CoRR, (2022)PYTHIA: a Framework for the Automated Analysis of Web Hosting Environments., , and . WWW, page 3072-3078. ACM, (2019)Deep dive into the IoT backend ecosystem., , , , and . IMC, page 488-503. ACM, (2022)CARONTE: Detecting Location Leaks for Deanonymizing Tor Hidden Services., , and . CCS, page 1455-1466. ACM, (2015)Your Code is 0000: An Analysis of the Disposable Phone Numbers Ecosystem., , , and . TMA, page 1-10. IEEE, (2023)Peering into the Muddy Waters of Pastebin., , , and . ERCIM News, (2012)The Rise of GoodFATR: A Novel Accuracy Comparison Methodology for Indicator Extraction Tools., , , , , and . Future Gener. Comput. Syst., (July 2023)Measuring Web Cookies in Governmental Websites., , , , and . WebSci, page 44-54. ACM, (2022)Identifying Sensitive URLs atWeb-Scale., , , and . Internet Measurement Conference, page 619-633. ACM, (2020)In the Room Where It Happens: Characterizing Local Communication and Threats in Smart Homes., , , , , , , , , and 1 other author(s). IMC, page 437-456. ACM, (2023)