Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Do you feel lucky?: a large-scale analysis of risk-rewards trade-offs in cyber security., , , and . SAC, page 1649-1656. ACM, (2014)Position Paper: Towards a Moving Target Defense Approach for Attribute-based Access Control., , , , , and . ABAC@CODASPY, page 68-71. ACM, (2016)Understanding and Predicting Private Interactions in Underground Forums., , , , , and . CODASPY, page 303-314. ACM, (2019)Shell We Play A Game? CTF-as-a-service for Security Education., , , , , , , , and . ASE @ USENIX Security Symposium, USENIX Association, (2017)Above and Beyond: Organizational Efforts to Complement U.S. Digital Security Compliance Mandates., , , and . NDSS, The Internet Society, (2022)PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists., , , , , , and . USENIX Security Symposium, page 379-396. USENIX Association, (2020)Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin., , , and . eCrime, page 1-13. IEEE, (2016)Challenges, Opportunities and a Framework for Web Environment Forensics., , , and . IFIP Int. Conf. Digital Forensics, volume 532 of IFIP Advances in Information and Communication Technology, page 11-33. Springer, (2018)Writing groups in computer science research labs., and . FIE, page 1359-1365. IEEE Computer Society, (2013)State-aware Network Access Management for Software-Defined Networks., , , , , , and . SACMAT, page 1-11. ACM, (2016)