Author of the publication

Report Now. Report Effectively. Conceptualizing the Industry Practice for Cybercrime Reporting.

, , , and . eCrime, page 1-10. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High-performance content-based phishing attack detection., , , and . eCrime Researchers Summit, page 1-9. IEEE, (2011)Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale., , , , , , , , and . USENIX Security Symposium, page 361-377. USENIX Association, (2020)Voice of the customer., , and . eCrime, page 1-7. IEEE, (2013)PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists., , , , , , and . USENIX Security Symposium, page 379-396. USENIX Association, (2020)Report Now. Report Effectively. Conceptualizing the Industry Practice for Cybercrime Reporting., , , and . eCrime, page 1-10. IEEE, (2019)Identifying vulnerable websites by analysis of common strings in phishing URLs., , and . eCrime, page 1-13. IEEE, (2009)PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques against Browser Phishing Blacklists., , , , , and . IEEE Symposium on Security and Privacy, page 1344-1361. IEEE, (2019)Managing the Crossroads of Academia and Industry.. CODASPY, page 1. ACM, (2018)Automating phishing website identification through deep MD5 matching., and . eCrime, page 1-7. IEEE, (2008)Clustering Potential Phishing Websites Using DeepMD5., , , and . LEET, USENIX Association, (2012)