Daniel R. Thomas

Orcid: 0000-0001-8936-0683

According to our database1, Daniel R. Thomas authored at least 16 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Curbing Ghost Worker Fraud In Developing Countries Using Consortium Blockchain.
Proceedings of the 9th ACM International Workshop on Security and Privacy Analytics, 2023

2022
Influence government: Exploring practices, ethics, and power in the use of targeted advertising by the UK state.
Big Data Soc., January, 2022

Getting Bored of Cyberwar: Exploring the Role of the Cybercrime Underground in the Russia-Ukraine Conflict.
CoRR, 2022

2020
When will my PLC support Mirai? The security economics of large-scale attacks against Internet-connected ICS devices.
Proceedings of the APWG Symposium on Electronic Crime Research, 2020

2019
Ghost Trace on the Wire? Using Key Evidence for Informed Decisions.
Proceedings of the Security Protocols XXVII, 2019

Measuring eWhoring.
Proceedings of the Internet Measurement Conference, 2019

Booting the Booters: Evaluating the Effects of Police Interventions in the Market for Denial-of-Service Attacks.
Proceedings of the Internet Measurement Conference, 2019

2018
CrimeBB: Enabling Cybercrime Research on Underground Forums at Scale.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

2017
Ethical issues in research using datasets of illicit origin.
Proceedings of the 2017 Internet Measurement Conference, 2017

1000 days of UDP amplification DDoS attacks.
Proceedings of the 2017 APWG Symposium on Electronic Crime Research, 2017

2015
Device analyzer: a privacy-aware platform to support research on the Android ecosystem.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

The Lifetime of Android API Vulnerabilities: Case Study on the JavaScript-to-Java Interface.
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

The Lifetime of Android API Vulnerabilities: Case Study on the JavaScript-to-Java Interface (Transcript of Discussion).
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

Security Metrics for the Android Ecosystem.
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, 2015

2014
Better Authentication: Password Revolution by Evolution.
Proceedings of the Security Protocols XXII, 2014

Better Authentication Password Revolution by Evolution (Transcript of Discussion).
Proceedings of the Security Protocols XXII, 2014


  Loading...