Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

VenueTrace: a privacy-by-design COVID-19 digital contact tracing solution: poster abstract., , , , and . SenSys, page 790-791. ACM, (2020)HorusEye: A Realtime IoT Malicious Traffic Detection Framework using Programmable Switches., , , , , , , , , and . USENIX Security Symposium, page 571-588. USENIX Association, (2023)Set in Stone: Analysis of an Immutable Web3 Social Media Platform., , , and . WWW, page 1865-1874. ACM, (2023)Will Admins Cope? Decentralized Moderation in the Fediverse., , , , , and . WWW, page 3109-3120. ACM, (2023)Design and evaluation of IPFS: a storage layer for the decentralized web., , , , , , , and . SIGCOMM, page 739-752. ACM, (2022)A Large-scale Behavioural Analysis of Bots and Humans on Twitter., , , and . TWEB, 13 (1): 7:1-7:23 (2019)Trollslayer: Crowdsourcing and Characterization of Abusive Birds in Twitter., , and . SNAMS, page 64-71. IEEE, (2018)PYTHIA: a Framework for the Automated Analysis of Web Hosting Environments., , and . WWW, page 3072-3078. ACM, (2019)Dissecting the Workload of a Major Adult Video Portal., , , , and . PAM, volume 12048 of Lecture Notes in Computer Science, page 267-279. Springer, (2020)Due to the global outbreak of COVID-19, the PAM 2020 conference was organized as a virtual meeting..Temporal Network Analysis of Email Communication Patterns in a Long Standing Hierarchy., , , , , , , and . CoRR, (2023)