Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rethinking the Detection of Child Sexual Abuse Imagery on the Internet., , , , , , , , , and . WWW, page 2601-2607. ACM, (2019)Data Breaches: User Comprehension, Expectations, and Concerns with Handling Exposed Data., , , and . SOUPS @ USENIX Security Symposium, page 217-234. USENIX Association, (2018)Design and Evaluation of a Real-Time URL Spam Filtering Service., , , , and . IEEE Symposium on Security and Privacy, page 447-462. IEEE Computer Society, (2011)Five Years of the Right to be Forgotten., , , , , , , , , and 10 other author(s). ACM Conference on Computer and Communications Security, page 959-972. ACM, (2019)Picasso: Lightweight Device Class Fingerprinting for Web Clients., , , and . SPSM@CCS, page 93-102. ACM, (2016)Data Breaches, Phishing, or Malware?: Understanding the Risks of Stolen Credentials., , , , , , , , , and 3 other author(s). CCS, page 1421-1434. ACM, (2017)The Role of the Underground Economy in Social Network Spam and Abuse.. University of California, Berkeley, USA, (2013)Protecting accounts from credential stuffing with password breach alerting., , , , , , , , , and 1 other author(s). USENIX Security Symposium, page 1556-1571. USENIX Association, (2019)Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse., , , , and . USENIX Security Symposium, page 195-210. USENIX Association, (2013)Poisoning Web-Scale Training Datasets is Practical., , , , , , , , and . CoRR, (2023)