Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bulma: a modern CSS framework. (2016)Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes., , , , , , , , and . SOUPS, page 97-111. USENIX Association, (2016)Let's Go in for a Closer Look: Observing Passwords in Their Natural Habitat., , , , , , , , and . CCS, page 295-310. ACM, (2017)Replication: Challenges in Using Data Logs to Validate Phishing Detection Ability Metrics., , , , , and . SOUPS, page 271-284. USENIX Association, (2017)Enterprise 2.0 Implementation: Integrate Web 2.0 Services into Your Enterprise, and . Mcgraw-Hill Professional, (2008)Away From Prying Eyes: Analyzing Usage and Understanding of Private Browsing., , , , , , , and . SOUPS @ USENIX Security Symposium, page 159-175. USENIX Association, (2018)Enterprise 2.0 Implementation, and . McGraw-Hill, New York et al., (2009)Unexpected benefit of a social parasite for a key fitness component of its ant host, , , , and . American Naturalist, 179 (1): 110--123 (January 2012)WOS:000298379200012.Multiple host use and the dynamics of host switching in host–parasite systems, , , and . Insect Conservation and Diversity, 12 (6): 511–522 (August 2019)Unexpected benefit of a social parasite for a key fitness component of its ant host, , , , and . The American Naturalist, 179 (1): 110–123 (January 2012)