Kurt Thomas [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale 29thUSENIXSecuritySymposium-2020 - Berkeley, USA
Data Breaches: User Comprehension, Expectations, and Concerns with Handling Exposed Data SOUPS2018-2018 - Baltimore, USA
Understanding the Mirai Botnet usenixsecurity-2017 - vancouver,canada
Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software USENIX-2016 - austin,usa
Trends and Lessons from Three Years Fighting Malicious Extensions SecuritySymposium-2015 - washington,USA
Consequences of Connectivity: Characterizing Account Hijacking on Twitter CCS-2014 - Scottsdale,USA
Traf?cking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse USENIX-2013 - Washington, D.C.
Practical Comprehensive Bounds on Surreptitious Communication over DNS USENIX-2013 - Washington, D.C.
Adapting Social Spam Infrastructure for Political Censorship 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats-2012 - San Francisco, USA Socialbots Big Data