Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated Generation of Behavioral Signatures for Malicious Web Campaigns., , , , and . ISC (2), volume 15258 of Lecture Notes in Computer Science, page 226-245. Springer, (2024)Short Paper - Taming the Shape Shifter: Detecting Anti-fingerprinting Browsers., , , and . DIMVA, volume 12223 of Lecture Notes in Computer Science, page 160-170. Springer, (2020)Catching Transparent Phish: Analyzing and Detecting MITM Phishing Toolkits., , , and . CCS, page 36-50. ACM, (2021)Measuring and mitigating AS-level adversaries against Tor., , , , and . CoRR, (2015)Innocent Until Proven Guilty (IUPG): Building Deep Learning Models with Embedded Robustness to Out-Of-Distribution Content., , , and . SP (Workshops), page 49-55. IEEE, (2021)Detecting Malicious Campaigns in Obfuscated JavaScript with Scalable Behavioral Analysis., , and . IEEE Symposium on Security and Privacy Workshops, page 218-223. IEEE, (2019)Dial One for Scam: A Large-Scale Analysis of Technical Support Scams., , and . NDSS, The Internet Society, (2017)Everyone is Different: Client-side Diversification for Defending Against Extension Fingerprinting., , , , and . USENIX Security Symposium, page 1679-1696. USENIX Association, (2019)Web Runner 2049: Evaluating Third-Party Anti-bot Services., , , and . DIMVA, volume 12223 of Lecture Notes in Computer Science, page 135-159. Springer, (2020)PrivacyMeter: Designing and Developing a Privacy-Preserving Browser Extension., and . ESSoS, volume 10953 of Lecture Notes in Computer Science, page 77-95. Springer, (2018)