Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dizzy: Large-Scale Crawling and Analysis of Onion Services., and . CoRR, (2022)Source Attribution of Cryptographic API Misuse in Android Applications., , and . AsiaCCS, page 133-146. ACM, (2018)When A Small Leak Sinks A Great Ship: Deanonymizing Tor Hidden Service Users Through Bitcoin Transactions Analysis., , , and . CoRR, (2018)To Befriend Or Not? A Model of Friend Request Acceptance on Facebook., , , and . SOUPS, page 285-300. USENIX Association, (2014)Understanding Users' Requirements for Data Protection in Smartphones., , , , and . ICDE Workshops, page 228-235. IEEE Computer Society, (2012)Thwarting Fake OSN Accounts by Predicting their Victims., , , and . AISec@CCS, page 81-89. ACM, (2015)Key Challenges in Defending Against Malicious Socialbots., , , and . LEET, USENIX Association, (2012)Dizzy: Large-Scale Crawling and Analysis of Onion Services., , , , and . ARES, page 9:1-9:11. ACM, (2023)Content-Agnostic Detection of Phishing Domains using Certificate Transparency and Passive DNS., , , and . RAID, page 446-459. ACM, (2022)Harvesting the low-hanging fruits: defending against automated large-scale cyber-intrusions by focusing on the vulnerable population., , , , , and . NSPW, page 11-22. ACM, (2016)