Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Kurt Thomas
@inproceedings{DBLP:conf/chi/WeiCKKRT23, author = {Miranda Wei and Sunny Consolvo and Patrick Gage Kelley and Tadayoshi Kohno and Franziska Roesner and Kurt Thomas}, editor = {Albrecht Schmidt and Kaisa V{\"{a}}{\"{a}}n{\"{a}}nen and Tesh Goyal and Per Ola Kristensson and Anicia Peters and Stefanie Mueller and Julie R. Williamson and Max L. Wilson}, title = {"There's so much responsibility on users right now: " Expert Advice for Staying Safer From Hate and Harassment}, booktitle = {Proceedings of the 2023 {CHI} Conference on Human Factors in Computing Systems, {CHI} 2023, Hamburg, Germany, April 23-28, 2023}, pages = {190:1--190:17}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3544548.3581229}, doi = {10.1145/3544548.3581229}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/WeiCKKRT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/FreedBCHKTC23, author = {Diana Freed and Natalie N. Bazarova and Sunny Consolvo and Eunice J. Han and Patrick Gage Kelley and Kurt Thomas and Dan Cosley}, editor = {Albrecht Schmidt and Kaisa V{\"{a}}{\"{a}}n{\"{a}}nen and Tesh Goyal and Per Ola Kristensson and Anicia Peters and Stefanie Mueller and Julie R. Williamson and Max L. Wilson}, title = {Understanding Digital-Safety Experiences of Youth in the {U.S}}, booktitle = {Proceedings of the 2023 {CHI} Conference on Human Factors in Computing Systems, {CHI} 2023, Hamburg, Germany, April 23-28, 2023}, pages = {191:1--191:15}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3544548.3581128}, doi = {10.1145/3544548.3581128}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/FreedBCHKTC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/KelleyCHJSTYW23, author = {Patrick Gage Kelley and Celestina Cornejo and Lisa Hayes and Ellie Shuo Jin and Aaron Sedley and Kurt Thomas and Yongwei Yang and Allison Woodruff}, editor = {Patrick Gage Kelley and Apu Kapadia}, title = {"There will be less privacy, of course": How and why people in 10 countries expect {AI} will affect privacy in the future}, booktitle = {Nineteenth Symposium on Usable Privacy and Security, {SOUPS} 2023, Anaheim, CA, USA, August 5-7, 2023}, pages = {579--603}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/soups2023/presentation/kelley}, timestamp = {Wed, 09 Aug 2023 15:04:34 +0200}, biburl = {https://dblp.org/rec/conf/soups/KelleyCHJSTYW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SamermitTKMWCT23, author = {Patrawat Samermit and Anna Turner and Patrick Gage Kelley and Tara Matthews and Vanessia Wu and Sunny Consolvo and Kurt Thomas}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {"Millions of people are watching you": Understanding the Digital-Safety Needs and Practices of Creators}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {5629--5645}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/samermit}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/SamermitTKMWCT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/0006HTD23, author = {Deepak Kumar and Jeff T. Hancock and Kurt Thomas and Zakir Durumeric}, editor = {Ying Ding and Jie Tang and Juan F. Sequeda and Lora Aroyo and Carlos Castillo and Geert{-}Jan Houben}, title = {Understanding the Behaviors of Toxic Accounts on Reddit}, booktitle = {Proceedings of the {ACM} Web Conference 2023, {WWW} 2023, Austin, TX, USA, 30 April 2023 - 4 May 2023}, pages = {2797--2807}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3543507.3583522}, doi = {10.1145/3543507.3583522}, timestamp = {Mon, 28 Aug 2023 21:17:10 +0200}, biburl = {https://dblp.org/rec/conf/www/0006HTD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-08057, author = {Miranda Wei and Sunny Consolvo and Patrick Gage Kelley and Tadayoshi Kohno and Franziska Roesner and Kurt Thomas}, title = {"There's so much responsibility on users right now: " Expert Advice for Staying Safer From Hate and Harassment}, journal = {CoRR}, volume = {abs/2302.08057}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.08057}, doi = {10.48550/ARXIV.2302.08057}, eprinttype = {arXiv}, eprint = {2302.08057}, timestamp = {Mon, 20 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-08057.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-10149, author = {Nicholas Carlini and Matthew Jagielski and Christopher A. Choquette{-}Choo and Daniel Paleka and Will Pearce and Hyrum Anderson and Andreas Terzis and Kurt Thomas and Florian Tram{\`{e}}r}, title = {Poisoning Web-Scale Training Datasets is Practical}, journal = {CoRR}, volume = {abs/2302.10149}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.10149}, doi = {10.48550/ARXIV.2302.10149}, eprinttype = {arXiv}, eprint = {2302.10149}, timestamp = {Thu, 23 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-10149.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-02810, author = {Kurt Thomas and Sarah Meiklejohn and Michael A. Specter and Xiang Wang and Xavier Llor{\`{a}} and Stephan Somogyi and David Kleidermacher}, title = {Robust, privacy-preserving, transparent, and auditable on-device blocklisting}, journal = {CoRR}, volume = {abs/2304.02810}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.02810}, doi = {10.48550/ARXIV.2304.02810}, eprinttype = {arXiv}, eprint = {2304.02810}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-02810.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/ThomasKCSB22, author = {Kurt Thomas and Patrick Gage Kelley and Sunny Consolvo and Patrawat Samermit and Elie Bursztein}, editor = {Simone D. J. Barbosa and Cliff Lampe and Caroline Appert and David A. Shamma and Steven Mark Drucker and Julie R. Williamson and Koji Yatani}, title = {"It's common and a part of being a content creator": Understanding How Creators Experience and Cope with Hate and Harassment Online}, booktitle = {{CHI} '22: {CHI} Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022 - 5 May 2022}, pages = {121:1--121:15}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3491102.3501879}, doi = {10.1145/3491102.3501879}, timestamp = {Fri, 29 Apr 2022 13:37:13 +0200}, biburl = {https://dblp.org/rec/conf/chi/ThomasKCSB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/WarfordMYACKMMS22, author = {Noel Warford and Tara Matthews and Kaitlyn Yang and Omer Akgul and Sunny Consolvo and Patrick Gage Kelley and Nathan Malkin and Michelle L. Mazurek and Manya Sleeper and Kurt Thomas}, title = {SoK: {A} Framework for Unifying At-Risk User Research}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {2344--2360}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833643}, doi = {10.1109/SP46214.2022.9833643}, timestamp = {Thu, 21 Sep 2023 15:57:27 +0200}, biburl = {https://dblp.org/rec/conf/sp/WarfordMYACKMMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uss/2022, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22}, isbn = {978-1-939133-31-1}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-02533, author = {Deepak Kumar and Jeff T. Hancock and Kurt Thomas and Zakir Durumeric}, title = {Understanding Longitudinal Behaviors of Toxic Accounts on Reddit}, journal = {CoRR}, volume = {abs/2209.02533}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.02533}, doi = {10.48550/ARXIV.2209.02533}, eprinttype = {arXiv}, eprint = {2209.02533}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-02533.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/0006KCMBDTB21, author = {Deepak Kumar and Patrick Gage Kelley and Sunny Consolvo and Joshua Mason and Elie Bursztein and Zakir Durumeric and Kurt Thomas and Michael D. Bailey}, editor = {Sonia Chiasson}, title = {Designing Toxic Content Classification for a Diversity of Perspectives}, booktitle = {Seventeenth Symposium on Usable Privacy and Security, {SOUPS} 2021, August 8-10, 2021}, pages = {299--318}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/soups2021/presentation/kumar}, timestamp = {Thu, 26 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soups/0006KCMBDTB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ThomasABBBCDDKK21, author = {Kurt Thomas and Devdatta Akhawe and Michael D. Bailey and Dan Boneh and Elie Bursztein and Sunny Consolvo and Nicola Dell and Zakir Durumeric and Patrick Gage Kelley and Deepak Kumar and Damon McCoy and Sarah Meiklejohn and Thomas Ristenpart and Gianluca Stringhini}, title = {SoK: Hate, Harassment, and the Changing Landscape of Online Abuse}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {247--267}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00028}, doi = {10.1109/SP40001.2021.00028}, timestamp = {Thu, 26 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/ThomasABBBCDDKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ConsolvoKMTDB21, author = {Sunny Consolvo and Patrick Gage Kelley and Tara Matthews and Kurt Thomas and Lee Dunn and Elie Bursztein}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {"Why wouldn't someone think of democracy as a target?": Security practices {\&} challenges of people involved with {U.S.} political campaigns}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1181--1198}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/consolvo}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/ConsolvoKMTDB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-00236, author = {Sunny Consolvo and Patrick Gage Kelley and Tara Matthews and Kurt Thomas and Lee Dunn and Elie Bursztein}, title = {"Why wouldn't someone think of democracy as a target?": Security practices {\&} challenges of people involved with {U.S.} political campaigns}, journal = {CoRR}, volume = {abs/2106.00236}, year = {2021}, url = {https://arxiv.org/abs/2106.00236}, eprinttype = {arXiv}, eprint = {2106.00236}, timestamp = {Wed, 09 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-00236.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-04511, author = {Deepak Kumar and Patrick Gage Kelley and Sunny Consolvo and Joshua Mason and Elie Bursztein and Zakir Durumeric and Kurt Thomas and Michael D. Bailey}, title = {Designing Toxic Content Classification for a Diversity of Perspectives}, journal = {CoRR}, volume = {abs/2106.04511}, year = {2021}, url = {https://arxiv.org/abs/2106.04511}, eprinttype = {arXiv}, eprint = {2106.04511}, timestamp = {Thu, 26 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-04511.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-07047, author = {Noel Warford and Tara Matthews and Kaitlyn Yang and Omer Akgul and Sunny Consolvo and Patrick Gage Kelley and Nathan Malkin and Michelle L. Mazurek and Manya Sleeper and Kurt Thomas}, title = {SoK: {A} Framework for Unifying At-Risk User Research}, journal = {CoRR}, volume = {abs/2112.07047}, year = {2021}, url = {https://arxiv.org/abs/2112.07047}, eprinttype = {arXiv}, eprint = {2112.07047}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-07047.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/SimoiuZTB20, author = {Camelia Simoiu and Ali Zand and Kurt Thomas and Elie Bursztein}, title = {Who is targeted by email-based phishing and malware?: Measuring factors that differentiate risk}, booktitle = {{IMC} '20: {ACM} Internet Measurement Conference, Virtual Event, USA, October 27-29, 2020}, pages = {567--576}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3419394.3423617}, doi = {10.1145/3419394.3423617}, timestamp = {Tue, 27 Oct 2020 07:41:23 +0100}, biburl = {https://dblp.org/rec/conf/imc/SimoiuZTB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/OestZWNBZTDA20, author = {Adam Oest and Penghui Zhang and Brad Wardman and Eric Nunes and Jakub Burgis and Ali Zand and Kurt Thomas and Adam Doup{\'{e}} and Gail{-}Joon Ahn}, editor = {Srdjan Capkun and Franziska Roesner}, title = {Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {361--377}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/oest-sunrise}, timestamp = {Fri, 29 Jan 2021 22:08:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/OestZWNBZTDA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/SambasivanABBCG19, author = {Nithya Sambasivan and Nova Ahmed and Amna Batool and Elie Bursztein and Elizabeth F. Churchill and Laura Sanely Gayt{\'{a}}n{-}Lugo and Tara Matthews and David Nemer and Kurt Thomas and Sunny Consolvo}, title = {Toward Gender-Equitable Privacy and Security in South Asia}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {4}, pages = {71--77}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2912727}, doi = {10.1109/MSEC.2019.2912727}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/SambasivanABBCG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BertramBCCFFGHH19, author = {Theo Bertram and Elie Bursztein and Stephanie Caro and Hubert Chao and Rutledge Chin Feman and Peter Fleischer and Albin Gustafsson and Jess Hemerly and Chris Hibbert and Luca Invernizzi and Lanah Kammourieh Donnelly and Jason Ketover and Jay Laefer and Paul Nicholas and Yuan Niu and Harjinder Obhi and David Price and Andrew Strait and Kurt Thomas and Al Verney}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Five Years of the Right to be Forgotten}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {959--972}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3354208}, doi = {10.1145/3319535.3354208}, timestamp = {Tue, 10 Nov 2020 20:00:36 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BertramBCCFFGHH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/SambasivanBAMTG19, author = {Nithya Sambasivan and Amna Batool and Nova Ahmed and Tara Matthews and Kurt Thomas and Laura Sanely Gayt{\'{a}}n{-}Lugo and David Nemer and Elie Bursztein and Elizabeth F. Churchill and Sunny Consolvo}, editor = {Stephen A. Brewster and Geraldine Fitzpatrick and Anna L. Cox and Vassilis Kostakos}, title = {"They Don't Leave Us Alone Anywhere We Go": Gender and Digital Abuse in South Asia}, booktitle = {Proceedings of the 2019 {CHI} Conference on Human Factors in Computing Systems, {CHI} 2019, Glasgow, Scotland, UK, May 04-09, 2019}, pages = {2}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3290605.3300232}, doi = {10.1145/3290605.3300232}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chi/SambasivanBAMTG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ThomasPYRKIBPPB19, author = {Kurt Thomas and Jennifer Pullman and Kevin Yeo and Ananth Raghunathan and Patrick Gage Kelley and Luca Invernizzi and Borbala Benko and Tadek Pietraszek and Sarvar Patel and Dan Boneh and Elie Bursztein}, editor = {Nadia Heninger and Patrick Traynor}, title = {Protecting accounts from credential stuffing with password breach alerting}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {1556--1571}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/thomas}, timestamp = {Mon, 01 Feb 2021 08:43:12 +0100}, biburl = {https://dblp.org/rec/conf/uss/ThomasPYRKIBPPB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/DoerflerTMRJMM19, author = {Periwinkle Doerfler and Kurt Thomas and Maija Marincenko and Juri Ranieri and Yu Jiang and Angelika Moscicki and Damon McCoy}, editor = {Ling Liu and Ryen W. White and Amin Mantrach and Fabrizio Silvestri and Julian J. McAuley and Ricardo Baeza{-}Yates and Leila Zia}, title = {Evaluating Login Challenges as aDefense Against Account Takeover}, booktitle = {The World Wide Web Conference, {WWW} 2019, San Francisco, CA, USA, May 13-17, 2019}, pages = {372--382}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3308558.3313481}, doi = {10.1145/3308558.3313481}, timestamp = {Sun, 22 Sep 2019 18:12:47 +0200}, biburl = {https://dblp.org/rec/conf/www/DoerflerTMRJMM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/MirianDSVT19, author = {Ariana Mirian and Joe DeBlasio and Stefan Savage and Geoffrey M. Voelker and Kurt Thomas}, editor = {Ling Liu and Ryen W. White and Amin Mantrach and Fabrizio Silvestri and Julian J. McAuley and Ricardo Baeza{-}Yates and Leila Zia}, title = {Hack for Hire: Exploring the Emerging Market for Account Hijacking}, booktitle = {The World Wide Web Conference, {WWW} 2019, San Francisco, CA, USA, May 13-17, 2019}, pages = {1279--1289}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3308558.3313489}, doi = {10.1145/3308558.3313489}, timestamp = {Thu, 16 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/MirianDSVT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/BurszteinCDEHOS19, author = {Elie Bursztein and Einat Clarke and Michelle DeLaune and David M. Elifff and Nick Hsu and Lindsey Olson and John Shehan and Madhukar Thakur and Kurt Thomas and Travis Bright}, editor = {Ling Liu and Ryen W. White and Amin Mantrach and Fabrizio Silvestri and Julian J. McAuley and Ricardo Baeza{-}Yates and Leila Zia}, title = {Rethinking the Detection of Child Sexual Abuse Imagery on the Internet}, booktitle = {The World Wide Web Conference, {WWW} 2019, San Francisco, CA, USA, May 13-17, 2019}, pages = {2601--2607}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3308558.3313482}, doi = {10.1145/3308558.3313482}, timestamp = {Thu, 16 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/BurszteinCDEHOS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GaoWGKTM18, author = {Peng Gao and Binghui Wang and Neil Zhenqiang Gong and Sanjeev R. Kulkarni and Kurt Thomas and Prateek Mittal}, title = {{SYBILFUSE:} Combining Local Attributes with Global Structure to Perform Robust Sybil Detection}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433147}, doi = {10.1109/CNS.2018.8433147}, timestamp = {Wed, 08 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/GaoWGKTM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/KarunakaranTBC18, author = {Sowmya Karunakaran and Kurt Thomas and Elie Bursztein and Oxana Comanescu}, editor = {Mary Ellen Zurko and Heather Richter Lipford}, title = {Data Breaches: User Comprehension, Expectations, and Concerns with Handling Exposed Data}, booktitle = {Fourteenth Symposium on Usable Privacy and Security, {SOUPS} 2018, Baltimore, MD, USA, August 12-14, 2018}, pages = {217--234}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/soups2018/presentation/karunakaran}, timestamp = {Mon, 01 Feb 2021 08:41:57 +0100}, biburl = {https://dblp.org/rec/conf/soups/KarunakaranTBC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1803-06772, author = {Peng Gao and Binghui Wang and Neil Zhenqiang Gong and Sanjeev R. Kulkarni and Kurt Thomas and Prateek Mittal}, title = {SybilFuse: Combining Local Attributes with Global Structure to Perform Robust Sybil Detection}, journal = {CoRR}, volume = {abs/1803.06772}, year = {2018}, url = {http://arxiv.org/abs/1803.06772}, eprinttype = {arXiv}, eprint = {1803.06772}, timestamp = {Wed, 08 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1803-06772.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ThomasLZBRIMCEM17, author = {Kurt Thomas and Frank Li and Ali Zand and Jacob Barrett and Juri Ranieri and Luca Invernizzi and Yarik Markov and Oxana Comanescu and Vijay Eranti and Angelika Moscicki and Daniel Margolis and Vern Paxson and Elie Bursztein}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Data Breaches, Phishing, or Malware?: Understanding the Risks of Stolen Credentials}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1421--1434}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134067}, doi = {10.1145/3133956.3134067}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ThomasLZBRIMCEM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AntonakakisABBB17, author = {Manos Antonakakis and Tim April and Michael D. Bailey and Matt Bernhard and Elie Bursztein and Jaime Cochran and Zakir Durumeric and J. Alex Halderman and Luca Invernizzi and Michalis Kallitsis and Deepak Kumar and Chaz Lever and Zane Ma and Joshua Mason and Damian Menscher and Chad Seaman and Nick Sullivan and Kurt Thomas and Yi Zhou}, editor = {Engin Kirda and Thomas Ristenpart}, title = {Understanding the Mirai Botnet}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {1093--1110}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/antonakakis}, timestamp = {Thu, 26 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/AntonakakisABBB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/HuangGTKBLS17, author = {Danny Yuxing Huang and Doug Grundman and Kurt Thomas and Abhishek Kumar and Elie Bursztein and Kirill Levchenko and Alex C. Snoeren}, editor = {Rick Barrett and Rick Cummings and Eugene Agichtein and Evgeniy Gabrilovich}, title = {Pinning Down Abuse on Google Maps}, booktitle = {Proceedings of the 26th International Conference on World Wide Web, {WWW} 2017, Perth, Australia, April 3-7, 2017}, pages = {1471--1479}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3038912.3052590}, doi = {10.1145/3038912.3052590}, timestamp = {Tue, 06 Nov 2018 16:57:07 +0100}, biburl = {https://dblp.org/rec/conf/www/HuangGTKBLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BurszteinMPT16, author = {Elie Bursztein and Artem Malyshev and Tadek Pietraszek and Kurt Thomas}, editor = {Long Lu and Mohammad Mannan}, title = {Picasso: Lightweight Device Class Fingerprinting for Web Clients}, booktitle = {Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM@CCS 2016, Vienna, Austria, October 24, 2016}, pages = {93--102}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2994467}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BurszteinMPT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ThomasABFHBBB16, author = {Kurt Thomas and Rony Amira and Adi Ben{-}Yoash and Ori Folger and Amir Hardon and Ari Berger and Elie Bursztein and Michael D. Bailey}, editor = {Fabian Monrose and Marc Dacier and Gregory Blanc and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges}, booktitle = {Research in Attacks, Intrusions, and Defenses - 19th International Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9854}, pages = {143--164}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45719-2\_7}, doi = {10.1007/978-3-319-45719-2\_7}, timestamp = {Mon, 20 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/ThomasABFHBBB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/InvernizziTKCPB16, author = {Luca Invernizzi and Kurt Thomas and Alexandros Kapravelos and Oxana Comanescu and Jean Michel Picod and Elie Bursztein}, title = {Cloak of Visibility: Detecting When Machines Browse a Different Web}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {743--758}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SP.2016.50}, doi = {10.1109/SP.2016.50}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/InvernizziTKCPB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ThomasCRPPDSTTC16, author = {Kurt Thomas and Juan A. Elices Crespo and Ryan Rasti and Jean Michel Picod and Cait Phillips and Marc{-}Andr{\'{e}} Decoste and Chris Sharp and Fabio Tirelo and Ali Tofigh and Marc{-}Antoine Courteau and Lucas Ballard and Robert Shield and Nav Jagpal and Moheeb Abu Rajab and Panayiotis Mavrommatis and Niels Provos and Elie Bursztein and Damon McCoy}, editor = {Thorsten Holz and Stefan Savage}, title = {Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {721--739}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/thomas}, timestamp = {Mon, 01 Feb 2021 08:43:18 +0100}, biburl = {https://dblp.org/rec/conf/uss/ThomasCRPPDSTTC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/LiHKNBTBP16, author = {Frank Li and Grant Ho and Eric Kuan and Yuan Niu and Lucas Ballard and Kurt Thomas and Elie Bursztein and Vern Paxson}, editor = {Jacqueline Bourdeau and Jim Hendler and Roger Nkambou and Ian Horrocks and Ben Y. Zhao}, title = {Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension}, booktitle = {Proceedings of the 25th International Conference on World Wide Web, {WWW} 2016, Montreal, Canada, April 11 - 15, 2016}, pages = {1009--1019}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2872427.2883039}, doi = {10.1145/2872427.2883039}, timestamp = {Tue, 12 Apr 2022 14:46:29 +0200}, biburl = {https://dblp.org/rec/conf/www/LiHKNBTBP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/DurumericAMKBLT15, author = {Zakir Durumeric and David Adrian and Ariana Mirian and James Kasten and Elie Bursztein and Nicolas Lidzborski and Kurt Thomas and Vijay Eranti and Michael D. Bailey and J. Alex Halderman}, editor = {Kenjiro Cho and Kensuke Fukuda and Vivek S. Pai and Neil Spring}, title = {Neither Snow Nor Rain Nor {MITM...:} An Empirical Analysis of Email Delivery Security}, booktitle = {Proceedings of the 2015 {ACM} Internet Measurement Conference, {IMC} 2015, Tokyo, Japan, October 28-30, 2015}, pages = {27--39}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2815675.2815695}, doi = {10.1145/2815675.2815695}, timestamp = {Thu, 26 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/DurumericAMKBLT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ThomasBGHJKMNPP15, author = {Kurt Thomas and Elie Bursztein and Chris Grier and Grant Ho and Nav Jagpal and Alexandros Kapravelos and Damon McCoy and Antonio Nappa and Vern Paxson and Paul Pearce and Niels Provos and Moheeb Abu Rajab}, title = {Ad Injection at Scale: Assessing Deceptive Advertisement Modifications}, booktitle = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose, CA, USA, May 17-21, 2015}, pages = {151--167}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SP.2015.17}, doi = {10.1109/SP.2015.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ThomasBGHJKMNPP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JagpalDGMPRT15, author = {Nav Jagpal and Eric Dingle and Jean{-}Philippe Gravel and Panayiotis Mavrommatis and Niels Provos and Moheeb Abu Rajab and Kurt Thomas}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Trends and Lessons from Three Years Fighting Malicious Extensions}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {579--593}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/jagpal}, timestamp = {Mon, 01 Feb 2021 08:42:57 +0100}, biburl = {https://dblp.org/rec/conf/uss/JagpalDGMPRT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/ThomasHWBGHKMSV15, author = {Kurt Thomas and Danny Yuxing Huang and David Y. Wang and Elie Bursztein and Chris Grier and Tom Holt and Christopher Kruegel and Damon McCoy and Stefan Savage and Giovanni Vigna}, title = {Framing Dependencies Introduced by Underground Commoditization}, booktitle = {14th Annual Workshop on the Economics of Information Security, {WEIS} 2015, Delft, The Netherlands, 22-23 June, 2015}, year = {2015}, url = {http://www.econinfosec.org/archive/weis2015/papers/WEIS\_2015\_thomas.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/weis/ThomasHWBGHKMSV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GaoGKTM15, author = {Peng Gao and Neil Zhenqiang Gong and Sanjeev R. Kulkarni and Kurt Thomas and Prateek Mittal}, title = {SybilFrame: {A} Defense-in-Depth Framework for Structure-Based Sybil Detection}, journal = {CoRR}, volume = {abs/1503.02985}, year = {2015}, url = {http://arxiv.org/abs/1503.02985}, eprinttype = {arXiv}, eprint = {1503.02985}, timestamp = {Wed, 08 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GaoGKTM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ThomasIBPGM14, author = {Kurt Thomas and Dmytro Iatskiv and Elie Bursztein and Tadek Pietraszek and Chris Grier and Damon McCoy}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Dialing Back Abuse on Phone Verified Accounts}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {465--476}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660321}, doi = {10.1145/2660267.2660321}, timestamp = {Tue, 10 Nov 2020 20:00:23 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ThomasIBPGM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ThomasLGP14, author = {Kurt Thomas and Frank Li and Chris Grier and Vern Paxson}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Consequences of Connectivity: Characterizing Account Hijacking on Twitter}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {489--500}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660282}, doi = {10.1145/2660267.2660282}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ThomasLGP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/Thomas13, author = {Kurt Thomas}, title = {The Role of the Underground Economy in Social Network Spam and Abuse}, school = {University of California, Berkeley, {USA}}, year = {2013}, url = {https://www.escholarship.org/uc/item/1cs1x8pw}, timestamp = {Wed, 22 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Thomas13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/PaxsonCJRSSSTVW13, author = {Vern Paxson and Mihai Christodorescu and Mobin Javed and Josyula R. Rao and Reiner Sailer and Douglas Lee Schales and Marc Ph. Stoecklin and Kurt Thomas and Wietse Z. Venema and Nicholas Weaver}, editor = {Samuel T. King}, title = {Practical Comprehensive Bounds on Surreptitious Communication over {DNS}}, booktitle = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC, USA, August 14-16, 2013}, pages = {17--32}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/paxson}, timestamp = {Mon, 01 Feb 2021 08:42:56 +0100}, biburl = {https://dblp.org/rec/conf/uss/PaxsonCJRSSSTVW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ThomasMGKP13, author = {Kurt Thomas and Damon McCoy and Chris Grier and Alek Kolcz and Vern Paxson}, editor = {Samuel T. King}, title = {Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse}, booktitle = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC, USA, August 14-16, 2013}, pages = {195--210}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/paper/thomas}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ThomasMGKP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GrierBCCDLMMNPPRRRTPSV12, author = {Chris Grier and Lucas Ballard and Juan Caballero and Neha Chachra and Christian J. Dietrich and Kirill Levchenko and Panayiotis Mavrommatis and Damon McCoy and Antonio Nappa and Andreas Pitsillidis and Niels Provos and M. Zubair Rafique and Moheeb Abu Rajab and Christian Rossow and Kurt Thomas and Vern Paxson and Stefan Savage and Geoffrey M. Voelker}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Manufacturing compromise: the emergence of exploit-as-a-service}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {821--832}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382283}, doi = {10.1145/2382196.2382283}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GrierBCCDLMMNPPRRRTPSV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/leet/ThomasGP12, author = {Kurt Thomas and Chris Grier and Vern Paxson}, editor = {Engin Kirda}, title = {Adapting Social Spam Infrastructure for Political Censorship}, booktitle = {5th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats, {LEET} '12, San Jose, CA, USA, April 24, 2012}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/leet12/workshop-program/presentation/thomas}, timestamp = {Wed, 04 Jul 2018 13:06:34 +0200}, biburl = {https://dblp.org/rec/conf/leet/ThomasGP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/ThomasGSP11, author = {Kurt Thomas and Chris Grier and Dawn Song and Vern Paxson}, editor = {Patrick Thiran and Walter Willinger}, title = {Suspended accounts in retrospect: an analysis of twitter spam}, booktitle = {Proceedings of the 11th {ACM} {SIGCOMM} Internet Measurement Conference, {IMC} '11, Berlin, Germany, November 2-, 2011}, pages = {243--258}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2068816.2068840}, doi = {10.1145/2068816.2068840}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/ThomasGSP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ThomasGMPS11, author = {Kurt Thomas and Chris Grier and Justin Ma and Vern Paxson and Dawn Song}, title = {Design and Evaluation of a Real-Time {URL} Spam Filtering Service}, booktitle = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May 2011, Berkeley, California, {USA}}, pages = {447--462}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SP.2011.25}, doi = {10.1109/SP.2011.25}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/ThomasGMPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GrierTPZ10, author = {Chris Grier and Kurt Thomas and Vern Paxson and Chao Michael Zhang}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {@spam: the underground on 140 characters or less}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {27--37}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866311}, doi = {10.1145/1866307.1866311}, timestamp = {Tue, 10 Nov 2020 20:00:21 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GrierTPZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/ThomasN10, author = {Kurt Thomas and David M. Nicol}, title = {The Koobface botnet and the rise of social malware}, booktitle = {5th International Conference on Malicious and Unwanted Software, {MALWARE} 2010, Nancy, France, October 19-20, 2010}, pages = {63--70}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/MALWARE.2010.5665793}, doi = {10.1109/MALWARE.2010.5665793}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/ThomasN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/ThomasGN10, author = {Kurt Thomas and Chris Grier and David M. Nicol}, editor = {Mikhail J. Atallah and Nicholas J. Hopper}, title = {unFriendly: Multi-party Privacy Risks in Social Networks}, booktitle = {Privacy Enhancing Technologies, 10th International Symposium, {PETS} 2010, Berlin, Germany, July 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6205}, pages = {236--252}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14527-8\_14}, doi = {10.1007/978-3-642-14527-8\_14}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/ThomasGN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.