Author of the publication

Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale.

, , , , , , , , and . USENIX Security Symposium, page 361-377. USENIX Association, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hit 'em where it hurts: a live security exercise on cyber situational awareness., , , , , , , and . ACSAC, page 51-61. ACM, (2011)Who is targeted by email-based phishing and malware?: Measuring factors that differentiate risk., , , and . Internet Measurement Conference, page 567-576. ACM, (2020)Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale., , , , , , , , and . USENIX Security Symposium, page 361-377. USENIX Association, (2020)Targeted Attacks against Industrial Control Systems: Is the Power Industry Prepared?, , , and . SEGS@CCS, page 13-22. ACM, (2014)Extracting probable command and control signatures for detecting botnets., , , and . SAC, page 1657-1662. ACM, (2014)Nexat: a history-based approach to predict attacker actions., , , , and . ACSAC, page 383-392. ACM, (2011)POISED: Spotting Twitter Spam Off the Beaten Paths., , , , , , , and . CCS, page 1159-1174. ACM, (2017)Demystifying DDoS as a Service., , , , , and . IEEE Communications Magazine, 55 (7): 14-21 (2017)Rippler: Delay injection for service dependency detection., , , and . INFOCOM, page 2157-2165. IEEE, (2014)Data Breaches, Phishing, or Malware?: Understanding the Risks of Stolen Credentials., , , , , , , , , and 3 other author(s). CCS, page 1421-1434. ACM, (2017)