Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Shell We Play A Game? CTF-as-a-service for Security Education., , , , , , , , and . ASE @ USENIX Security Symposium, USENIX Association, (2017)PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists., , , , , , and . USENIX Security Symposium, page 379-396. USENIX Association, (2020)Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis., , , , , and . eCrime, page 1-12. IEEE, (2018)Deep Android Malware Detection., , , , , , , , , and 1 other author(s). CODASPY, page 301-308. ACM, (2017)Target Fragmentation in Android Apps., , , and . IEEE Symposium on Security and Privacy Workshops, page 204-213. IEEE Computer Society, (2016)PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques against Browser Phishing Blacklists., , , , , and . IEEE Symposium on Security and Privacy, page 1344-1361. IEEE, (2019)Browser Polygraph: Efficient Deployment of Coarse-Grained Browser Fingerprints for Web-Scale Detection of Fraud Browsers., , , , , , , and . IMC, page 681-703. ACM, (2024)