Author of the publication

Who is targeted by email-based phishing and malware?: Measuring factors that differentiate risk.

, , , and . Internet Measurement Conference, page 567-576. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

unFriendly: Multi-party Privacy Risks in Social Networks., , and . Privacy Enhancing Technologies, volume 6205 of Lecture Notes in Computer Science, page 236-252. Springer, (2010)Framing Dependencies Introduced by Underground Commoditization., , , , , , , , , and . WEIS, (2015)Rethinking the Detection of Child Sexual Abuse Imagery on the Internet., , , , , , , , , and . WWW, page 2601-2607. ACM, (2019)Five Years of the Right to be Forgotten., , , , , , , , , and 10 other author(s). ACM Conference on Computer and Communications Security, page 959-972. ACM, (2019)Picasso: Lightweight Device Class Fingerprinting for Web Clients., , , and . SPSM@CCS, page 93-102. ACM, (2016)Poisoning Web-Scale Training Datasets is Practical., , , , , , , , and . CoRR, (2023)Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse., , , , and . USENIX Security Symposium, page 195-210. USENIX Association, (2013)Protecting accounts from credential stuffing with password breach alerting., , , , , , , , , and 1 other author(s). USENIX Security Symposium, page 1556-1571. USENIX Association, (2019)Data Breaches: User Comprehension, Expectations, and Concerns with Handling Exposed Data., , , and . SOUPS @ USENIX Security Symposium, page 217-234. USENIX Association, (2018)The Role of the Underground Economy in Social Network Spam and Abuse.. University of California, Berkeley, USA, (2013)