Author of the publication

PYTHIA: a Framework for the Automated Analysis of Web Hosting Environments.

, , and . WWW, page 3072-3078. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version)., , , , , and . ACM Trans. Priv. Secur., 22 (2): 14:1-14:34 (2019)"You Know What to Do": Proactive Detection of YouTube Videos Targeted by Coordinated Hate Attacks., , , , , , , and . CoRR, (2018)Waves of Malice: A Longitudinal Measurement of the Malicious File Delivery Ecosystem on the Web., , , and . AsiaCCS, page 168-180. ACM, (2019)BorderPatrol: Securing BYOD using Fine-Grained Contextual Information., , , and . DSN, page 460-472. IEEE, (2019)PYTHIA: a Framework for the Automated Analysis of Web Hosting Environments., , and . WWW, page 3072-3078. ACM, (2019)What is Gab: A Bastion of Free Speech or an Alt-Right Echo Chamber., , , , , , and . WWW (Companion Volume), page 1007-1014. ACM, (2018)Who Let The Trolls Out?: Towards Understanding State-Sponsored Trolls., , , , , and . WebSci, page 353-362. ACM, (2019)ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of Cyberattacks., and . USENIX Security Symposium, page 905-921. USENIX Association, (2019)Quit Playing Games with My Heart: Understanding Online Dating Scams., , and . DIMVA, volume 9148 of Lecture Notes in Computer Science, page 216-236. Springer, (2015)LOBO: Evaluation of Generalization Deficiencies in Twitter Bot Classifiers., , , , , and . ACSAC, page 137-146. ACM, (2018)