Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CrimeBB: Enabling Cybercrime Research on Underground Forums at Scale., , , and . WWW, page 1845-1854. ACM, (2018)Are Payment Card Contracts Unfair? (Short Paper)., , , , , , , and . Financial Cryptography, volume 9603 of Lecture Notes in Computer Science, page 600-608. Springer, (2016)Understanding eWhoring., and . EuroS&P, page 201-214. IEEE, (2019)Inside out: Characterising Cybercrimes Committed Inside and Outside the Workplace., and . EuroS&P Workshops, page 481-490. IEEE, (2019)International comparison of bank fraud reimbursement: customer perceptions and contractual terms., , , , , , , and . J. Cybersecurity, 3 (2): 109-125 (2017)Scripting the crime commission process in the illicit online prescription drug trade., and . J. Cybersecurity, 1 (1): 81-92 (2015)Examining signals of trust in criminal markets online., , and . J. Cybersecurity, 2 (2): 137-145 (2016)Ethical issues in research using datasets of illicit origin., , , , and . IMC, page 445-462. ACM, (2017)Characterizing Eve: Analysing Cybercrime Actors in a Large Underground Forum., , , and . RAID, volume 11050 of Lecture Notes in Computer Science, page 207-227. Springer, (2018)Aggressive language in an online hacking forum., , , and . ALW, page 66-74. Association for Computational Linguistics, (2018)