From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

High-performance content-based phishing attack detection., , , и . eCrime Researchers Summit, стр. 1-9. IEEE, (2011)Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale., , , , , , , , и . USENIX Security Symposium, стр. 361-377. USENIX Association, (2020)Voice of the customer., , и . eCrime, стр. 1-7. IEEE, (2013)PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists., , , , , , и . USENIX Security Symposium, стр. 379-396. USENIX Association, (2020)Report Now. Report Effectively. Conceptualizing the Industry Practice for Cybercrime Reporting., , , и . eCrime, стр. 1-10. IEEE, (2019)Identifying vulnerable websites by analysis of common strings in phishing URLs., , и . eCrime, стр. 1-13. IEEE, (2009)PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques against Browser Phishing Blacklists., , , , , и . IEEE Symposium on Security and Privacy, стр. 1344-1361. IEEE, (2019)Managing the Crossroads of Academia and Industry.. CODASPY, стр. 1. ACM, (2018)Automating phishing website identification through deep MD5 matching., и . eCrime, стр. 1-7. IEEE, (2008)Clustering Potential Phishing Websites Using DeepMD5., , , и . LEET, USENIX Association, (2012)