From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Data Breaches, Phishing, or Malware?: Understanding the Risks of Stolen Credentials., , , , , , , , , и 3 other автор(ы). CCS, стр. 1421-1434. ACM, (2017)Protecting accounts from credential stuffing with password breach alerting., , , , , , , , , и 1 other автор(ы). USENIX Security Symposium, стр. 1556-1571. USENIX Association, (2019)Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse., , , , и . USENIX Security Symposium, стр. 195-210. USENIX Association, (2013)Framing Dependencies Introduced by Underground Commoditization., , , , , , , , , и . WEIS, (2015)unFriendly: Multi-party Privacy Risks in Social Networks., , и . Privacy Enhancing Technologies, том 6205 из Lecture Notes in Computer Science, стр. 236-252. Springer, (2010)Rethinking the Detection of Child Sexual Abuse Imagery on the Internet., , , , , , , , , и . WWW, стр. 2601-2607. ACM, (2019)Five Years of the Right to be Forgotten., , , , , , , , , и 10 other автор(ы). ACM Conference on Computer and Communications Security, стр. 959-972. ACM, (2019)Picasso: Lightweight Device Class Fingerprinting for Web Clients., , , и . SPSM@CCS, стр. 93-102. ACM, (2016)Poisoning Web-Scale Training Datasets is Practical., , , , , , , , и . CoRR, (2023)The Role of the Underground Economy in Social Network Spam and Abuse.. University of California, Berkeley, USA, (2013)