Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Email Babel: Does Language Affect Criminal Activity in Compromised Webmail Accounts?, , and . CoRR, (2017)e-Game of FAME: Automatic Detection of FAke MEmes., , , and . TTO, page 1-11. Hacks Hackers, (2021)Stick It to The Man: Correcting for Non-Cooperative Behavior of Subjects in Experiments on Social Networks., , , and . USENIX Security Symposium, page 3771-3788. USENIX Association, (2022)The Cause of All Evils: Assessing Causality Between User Actions and Malware Activity., , , and . CSET @ USENIX Security Symposium, USENIX Association, (2017)Honey Sheets: What Happens to Leaked Google Spreadsheets?, , and . CoRR, (2016)Lifelikeness is in the eye of the beholder: demographics of deepfake detection and their impacts on online social networks., , , , , , , and . LIFELIKE, volume 3461 of CEUR Workshop Proceedings, CEUR-WS.org, (2022)BABELTOWER: How Language Affects Criminal Activity in Stolen Webmail Accounts., , and . WWW (Companion Volume), page 991-999. ACM, (2018)Why allowing profile name reuse is a bad idea., , , , , , and . EUROSEC, page 3:1-3:6. ACM, (2016)What's Your Major Threat? On the Differences between the Network Behavior of Targeted and Commodity Malware., , , and . ARES, page 599-608. IEEE Computer Society, (2016)All your cards are belong to us: Understanding online carding forums., , and . eCrime, page 41-51. IEEE, (2017)