Author of the publication

Detecting and Characterizing Lateral Phishing at Scale.

, , , , , , , and . USENIX Security Symposium, page 1273-1290. USENIX Association, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Performance Cost of Shadow Stacks and Stack Canaries., , and . AsiaCCS, page 555-566. ACM, (2015)Security and Machine Learning.. CCS, page 1. ACM, (2017)Cool security trends., , , and . SACMAT, page 53. ACM, (2002)Somebody's Watching Me?: Assessing the Effectiveness of Webcam Indicator Lights., , , , , and . CHI, page 1649-1658. ACM, (2015)Clipped BagNet: Defending Against Sticker Attacks with Clipped Bag-of-features., , , and . SP (Workshops), page 55-61. IEEE, (2020)Practical Techniques for Searches on Encrypted Data., , and . S&P, page 44-55. IEEE Computer Society, (2000)Security considerations for IEEE 802.15.4 networks., and . Workshop on Wireless Security, page 32-42. ACM, (2004)Model Checking An Entire Linux Distribution for Security Violations., , , , , , and . ACSAC, page 13-22. IEEE Computer Society, (2005)Towards a privacy measurement criterion for voting systems., , , and . DG.O, volume 89 of ACM International Conference Proceeding Series, page 287-288. Digital Government Research Center, (2005)Fault Attacks on Dual-Rail Encoded Systems., and . ACSAC, page 483-494. IEEE Computer Society, (2005)