Author of the publication

Users Really Do Plug in USB Drives They Find.

, , , , , , and . IEEE Symposium on Security and Privacy, page 306-319. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

No Calm in the Storm: Investigating QAnon Website Relationships., , and . ICWSM, page 299-310. AAAI Press, (2022)ASdb: a system for classifying owners of autonomous systems., , , , and . Internet Measurement Conference, page 703-719. ACM, (2021)Fast Internet-Wide Scanning: A New Security Perspective.. University of Michigan, USA, (2017)What's in a Name? Exploring CA Certificate Control., , , , and . USENIX Security Symposium, page 4383-4400. USENIX Association, (2021)Predicting IPv4 services across all ports., , and . SIGCOMM, page 503-515. ACM, (2022)Partial Mobilization: Tracking Multilingual Information Flows Amongst Russian Media Outlets and Telegram., and . CoRR, (2023)No Calm in The Storm: Investigating QAnon Website Relationships., , and . CoRR, (2021)Measuring the Security Harm of TLS Crypto Shortcuts., , and . Internet Measurement Conference, page 33-47. ACM, (2016)Machine-Made Media: Monitoring the Mobilization of Machine-Generated Articles on Misinformation and Mainstream News Websites., and . ICWSM, page 542-556. AAAI Press, (2024)Partial Mobilization: Tracking Multilingual Information Flows amongst Russian Media Outlets and Telegram., and . ICWSM, page 528-541. AAAI Press, (2024)