From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale., , , , , , , , и . USENIX Security Symposium, стр. 361-377. USENIX Association, (2020)Nothing Personal: Understanding the Spread and Use of Personally Identifiable Information in the Financial Ecosystem., , , , , , , , и . CODASPY, стр. 55-65. ACM, (2024)Scam Pandemic: How Attackers Exploit Public Fear through Phishing., , , , , , , , , и 2 other автор(ы). eCrime, стр. 1-10. IEEE, (2020)I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior., , , , , , , , , и 2 other автор(ы). CCS, стр. 3165-3179. ACM, (2022)Programming board-game strategies in the introductory CS sequence (abstract only)., , , , и . SIGCSE, стр. 669. ACM, (2012)Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases., , , , , , , , , и 1 other автор(ы). NDSS, The Internet Society, (2021)CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing., , , , , , , , , и 3 other автор(ы). SP, стр. 1109-1124. IEEE, (2021)Analysis of Payment Service Provider SDKs in Android., , , , , и . ACSAC, стр. 576-590. ACM, (2022)Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis., , , , , и . eCrime, стр. 1-12. IEEE, (2018)The Imitation Game: Exploring Brand Impersonation Attacks on Social Media Platforms., , , , , , , и . USENIX Security Symposium, USENIX Association, (2024)