Author of the publication

Scamming the Scammers: Towards Automatic Detection of Persuasion in Advance Fee Frauds.

, , and . WWW (Companion Volume), page 1291-1299. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Weaving Aspects in a Persistent Environment.. ACM SIGPLAN Notices, 37 (2): 36-44 (2002)Don't forget your classics: Systematizing 45 years of Ancestry for Security API Usability Recommendations., , , and . CoRR, (2021)SoK: A Taxonomy for Contrasting Industrial Control Systems Asset Discovery Tools., , and . ARES, page 28:1-28:12. ACM, (2022)Data, Data, Everywhere: Quantifying Software Developers' Privacy Attitudes., , , and . STAST, volume 11739 of Lecture Notes in Computer Science, page 47-65. Springer, (2019)The Internet of Insecure Cows - A Security Analysis of Wireless Smart Devices Used for Dairy Farming., , and . CPSIOTSEC@CCS, page 67-73. ACM, (2023)A Digital Forensic Taxonomy For Programmable Logic Controller Data Artefacts., , , and . EuroS&P Workshops, page 320-328. IEEE, (2023)Early Report: How to Improve Programmers' Expertise at App Security?, , and . IMPS@ESSoS, volume 1575 of CEUR Workshop Proceedings, page 49-50. CEUR-WS.org, (2016)"Do this! Do that!, And nothing will happen" Do specifications lead to securely stored passwords?, , , and . ICSE, page 486-498. IEEE, (2021)Analysing The Activities Of Far-Right Extremists On The Parler Social Network., , and . ASONAM, page 392-399. ACM, (2023)DF-C2M2: A Capability Maturity Model for Digital Forensics Organisations., and . IEEE Symposium on Security and Privacy Workshops, page 57-60. IEEE Computer Society, (2014)