From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

You Want Me To Do What? A Design Study of Two-Factor Authentication Messages., , и . SOUPS, USENIX Association, (2017)An Observational Investigation of Reverse Engineers' Processes., , , , и . CoRR, (2019)Applied Digital Threat Modeling: It Works., , , , и . IEEE Secur. Priv., 17 (4): 35-42 (2019)The post anachronism: the temporal dimension of facebook privacy., , , , , , и . WPES, стр. 1-12. ACM, (2013)We Are the Experts, and We Are the Problem: The Security Advice Fiasco.. CCS, стр. 7. ACM, (2022)Compliance Cautions: Investigating Security Issues Associated with U.S. Digital-Security Standards., , , , , , , и . NDSS, The Internet Society, (2020)Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It., , , , , и . USENIX Security Symposium, стр. 109-126. USENIX Association, (2020)What Twitter Knows: Characterizing Ad Targeting Practices, User Perceptions, and Ad Explanations Through Users' Own Twitter Data., , , , , , , , , и . USENIX Security Symposium, стр. 145-162. USENIX Association, (2020)Bug Hunters' Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem., , , , , , , и . USENIX Security Symposium, стр. 2275-2291. USENIX Association, (2023)SoK: Safer Digital-Safety Research Involving At-Risk Users., , , , , , , , , и 2 other автор(ы). CoRR, (2023)