Author of the publication

Ethical and Social Challenges with developing Automated Methods to Detect and Warn potential victims of Mass-marketing Fraud (MMF).

, , , , , , , and . WWW (Companion Volume), page 1311-1314. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version)., , , , , and . ACM Trans. Priv. Secur., 22 (2): 14:1-14:34 (2019)BorderPatrol: Securing BYOD using Fine-Grained Contextual Information., , , and . DSN, page 460-472. IEEE, (2019)Waves of Malice: A Longitudinal Measurement of the Malicious File Delivery Ecosystem on the Web., , , and . AsiaCCS, page 168-180. ACM, (2019)Who Let The Trolls Out?: Towards Understanding State-Sponsored Trolls., , , , , and . WebSci, page 353-362. ACM, (2019)PYTHIA: a Framework for the Automated Analysis of Web Hosting Environments., , and . WWW, page 3072-3078. ACM, (2019)What is Gab: A Bastion of Free Speech or an Alt-Right Echo Chamber., , , , , , and . WWW (Companion Volume), page 1007-1014. ACM, (2018)ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of Cyberattacks., and . USENIX Security Symposium, page 905-921. USENIX Association, (2019)"You Know What to Do": Proactive Detection of YouTube Videos Targeted by Coordinated Hate Attacks., , , , , , , and . CoRR, (2018)Quit Playing Games with My Heart: Understanding Online Dating Scams., , and . DIMVA, volume 9148 of Lecture Notes in Computer Science, page 216-236. Springer, (2015)LOBO: Evaluation of Generalization Deficiencies in Twitter Bot Classifiers., , , , , and . ACSAC, page 137-146. ACM, (2018)