Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unearthing malicious campaigns and actors from the blockchain DNS ecosystem., , , and . Comput. Commun., (2021)Invoice #31415 attached: Automated analysis of malicious Microsoft Office documents., , , , , , , and . Comput. Secur., (2022)Large-scale analysis of grooming in modern social networks., and . Expert Syst. Appl., (2021)Sharing Emotions at Scale: The Vent Dataset., , , and . ICWSM, page 611-619. AAAI Press, (2019)Unravelling Ariadne's Thread: Exploring the Threats of Decentalised DNS., , , and . CoRR, (2019)The Cynicism of Modern Cybercrime: Automating the Analysis of Surface Web Marketplaces., , , and . CoRR, (2021)Unravelling Ariadne's Thread: Exploring the Threats of Decentralised DNS., , , and . IEEE Access, (2020)Adult Content in Social Live Streaming Services: Characterizing Deviant Users and Relationships., , and . ASONAM, page 375-382. IEEE Computer Society, (2018)Intercepting Hail Hydra: Real-Time Detection of Algorithmically Generated Domains., , , , and . CoRR, (2020)Intercepting Hail Hydra: Real-time detection of Algorithmically Generated Domains., , , , and . J. Netw. Comput. Appl., (2021)