Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding Evasion Techniques that Abuse Differences Among JavaScript Implementations., , , , and . WISE (2), volume 10570 of Lecture Notes in Computer Science, page 278-294. Springer, (2017)Investigations of Top-Level Domain Name Collisions in Blockchain Naming Services., , , and . WWW, page 2926-2935. ACM, (2024)Fake News Detection via Biased User Profiles in Social Networking Sites., , , , , , and . WI/IAT, page 136-145. ACM, (2021)POSTER: Predicting Website Abuse Using Update Histories., , , , and . WWW (Companion Volume), page 9-10. ACM, (2018)Impact Analysis of Organizational Structure of Group Companies on Privacy Policies., , , , and . WPES@CCS, page 159-165. ACM, (2023)Analysis of Privacy Compliance by Classifying Multiple Policies on the Web., , , and . COMPSAC, page 1734-1741. IEEE, (2022)Detecting Malicious Websites by Integrating Malicious, Benign, and Compromised Redirection Subgraph Similarities., , , , and . COMPSAC (1), page 655-664. IEEE Computer Society, (2017)Money Talks: Detection of Disposable Phishing Websites by Analyzing Its Building Costs., , and . TPS-ISA, page 97-106. IEEE, (2022)MineSpider: Extracting URLs from Environment-Dependent Drive-by Download Attacks., , , , and . COMPSAC, page 444-449. IEEE Computer Society, (2015)Understanding the security management of global third-party Android marketplaces., , , , , , , , and . WAMA@ESEC/SIGSOFT FSE, page 12-18. ACM, (2017)