Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Alexa in Phishingland: Empirical Assessment of Susceptibility to Phishing Pretexting in Voice Assistant Environments., and . SP (Workshops), page 207-213. IEEE, (2021)User-targeted Denial-of-Service Attacks in LTE Mobile Networks., , and . WiMob, page 1-8. IEEE, (2018)To tweet or not to tweet: covertly manipulating a Twitter debate on vaccines using malware-induced misperceptions., , and . ARES, page 75:1-75:12. ACM, (2020)Beyond Trolling: Malware-Induced Misperception Attacks on Polarized Facebook Discourse., , , , , and . CoRR, (2020)Designing and Conducting Usability Research on Social Media Misinformation with Low Vision or Blind Users., and . CSET @ USENIX Security Symposium, page 75-81. ACM, (2023)Regulation TL;DR: Adversarial Text Summarization of Federal Register Articles., , and . CYSARM@CCS, page 37-42. ACM, (2021)My Boss is Really Cool: Malware-Induced Misperception in Workplace Communication Through Covert Linguistic Manipulation of Emails., , , , and . EuroS&P Workshops, page 463-470. IEEE, (2020)Manipulation of perceived politeness in a web-based email discourse through a malicious browser extension., , and . NSPW, page 31-41. ACM, (2019)Sorry: Ambient Tactical Deception Via Malware-Based Social Engineering., , and . CoRR, (2018)"I Just Didn't Notice It: " Experiences with Misinformation Warnings on Social Media amongst Users Who Are Low Vision or Blind., and . NSPW, page 17-33. ACM, (2023)