Author of the publication

Identifying Relevant Information Cues for Vulnerability Assessment Using CVSS.

, , , and . CODASPY, page 119-126. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Diversity: A Poor Man's Solution to Drone Takeover., , and . PECCS, page 25-34. SciTePress, (2017)Then and Now: On the Maturity of the Cybercrime Markets The Lesson That Black-Hat Marketeers Learned., , and . IEEE Trans. Emerg. Top. Comput., 4 (1): 35-46 (2016)Combining Text and Visual Features to Improve the Identification of Cloned Webpages for Early Phishing Detection., , , and . ARES, page 60:1-60:10. ACM, (2021)Economic incentives on DNSSEC deployment: Time to move from quantity to quality., , , and . NOMS, page 1-9. IEEE, (2018)Productivity and Patterns of Activity in Bug Bounty Programs: Analysis of HackerOne and Google Vulnerability Research., , and . ARES, page 67:1-67:10. ACM, (2019)SAIBERSOC: Synthetic Attack Injection to Benchmark and Evaluate the Performance of Security Operation Centers., , , and . ACSAC, page 141-153. ACM, (2020)Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring Profile Sales on an Active, Leading Criminal Market for User Impersonation at Scale., and . USENIX Security Symposium, page 553-570. USENIX Association, (2023)A Decision-Support Tool for Experimentation on Zero-Hour Phishing Detection., , and . FPS, volume 13877 of Lecture Notes in Computer Science, page 443-452. Springer, (2022)Underground Economics for Vulnerability Risk.. login Usenix Mag., (2018)A Toolkit for Security Awareness Training Against Targeted Phishing., , and . ICISS, volume 12553 of Lecture Notes in Computer Science, page 137-159. Springer, (2020)