USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 13 results:
Filters: Author is Kurt Thomas [Clear All Filters]
“Millions of people are watching you”: Understanding the Digital-Safety Needs and Practices of Creators. 32nd USENIX Security Symposium (USENIX Security 23). :5629--5645.
.
2023. "There will be less privacy, of course": How and why people in 10 countries expect AI will affect privacy in the future. Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023). :579--603.
.
2023. Designing Toxic Content Classification for a Diversity of Perspectives. Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). :299--318.
.
2021. "Why wouldn't someone think of democracy as a target?": Security practices & challenges of people involved with U.S. political campaigns 30th USENIX Security Symposium (USENIX Security 21). :1181--1198.
.
2021. Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale. 29th USENIX Security Symposium (USENIX Security 20). :361--377.
.
2020. Protecting accounts from credential stuffing with password breach alerting. 28th USENIX Security Symposium (USENIX Security 19). :1556--1571.
.
2019. Data Breaches: User Comprehension, Expectations, and Concerns with Handling Exposed Data. Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). :217--234.
.
2018. Understanding the Mirai Botnet. 26th USENIX Security Symposium (USENIX Security 17). :1093--1110.
.
2017. Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software. 25th USENIX Security Symposium (USENIX Security 16). :721--739.
.
2016. Trends and Lessons from Three Years Fighting Malicious Extensions. 24th USENIX Security Symposium (USENIX Security 15). :579--593.
.
2015. Practical Comprehensive Bounds on Surreptitious Communication over DNS. 22nd USENIX Security Symposium (USENIX Security 13). :17--32.
.
2013. Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse. 22nd USENIX Security Symposium (USENIX Security 13). :195--210.
.
2013. Adapting Social Spam Infrastructure for Political Censorship. 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 12).
.
2012.