Author of the publication

Understanding of Adversary Behavior and Security Threats in Public Key Infrastructures.

. University of Maryland, College Park, MD, USA, (2020)base-search.net (ftunivmaryland:oai:drum.lib.umd.edu:1903/26109).

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

fFTP: a fast file transfer protocol for home N-screen platform., , , and . Personal and Ubiquitous Computing, 22 (1): 143-152 (2018)Scam Pandemic: How Attackers Exploit Public Fear through Phishing., , , , , , , , , and 2 other author(s). CoRR, (2021)Adaptive video streaming over HTTP., , and . ACM Southeast Regional Conference, page 26:1-26:3. ACM, (2014)Analyzing Spatial Differences in the TLS Security of Delegated Web Services., , , , and . AsiaCCS, page 475-487. ACM, (2021)A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs., , , , , and . Proc. ACM Meas. Anal. Comput. Syst., 7 (3): 59:1-59:26 (December 2023)Poisoned ChatGPT Finds Work for Idle Hands: Exploring Developers' Coding Practices with Insecure Suggestions from Poisoned AI Models., , , , and . CoRR, (2023)Sinophobia, misogyny, facism, and many more: A multi-ethnic approach to identifying anti-Asian racism in social media., , , , , , and . CoRR, (2022)How Internet Resources Might Be Helping You Develop Faster but Less Securely., , , , , and . IEEE Secur. Priv., 15 (2): 50-60 (2017)TLS 1.3 in Practice: How TLS 1.3 Contributes to the Internet., , and . WWW, page 70-79. ACM / IW3C2, (2021)Pyfet: Forensically Equivalent Transformation for Python Binary Decompilation., , , , , and . SP, page 3296-3313. IEEE, (2023)