Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

All your cards are belong to us: Understanding online carding forums., , and . eCrime, page 41-51. IEEE, (2017)BorderPatrol: Securing BYOD using Fine-Grained Contextual Information., , , and . DSN, page 460-472. IEEE, (2019)Understanding the Incel Community on YouTube., , , , , and . CoRR, (2020)PYTHIA: a Framework for the Automated Analysis of Web Hosting Environments., , and . WWW, page 3072-3078. ACM, (2019)Does Platform Migration Compromise Content Moderation? Evidence from r/The_Donald and r/Incels., , , , , , and . CoRR, (2020)A First Look at Zoombombing., , , and . CoRR, (2020)MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version)., , , , , and . ACM Trans. Priv. Secur., 22 (2): 14:1-14:34 (2019)A Human-Centered Systematic Literature Review of Cyberbullying Detection Algorithms., , , , and . Proc. ACM Hum. Comput. Interact., 5 (CSCW2): 325:1-325:34 (2021)TROLLMAGNIFIER: Detecting State-Sponsored Troll Accounts on Reddit., , , , , and . CoRR, (2021)Dissecting the Meme Magic: Understanding Indicators of Virality in Image Memes., , , , , and . CoRR, (2021)