" There will be less privacy, of course": How and why people in 10 countries expect {AI} will affect privacy in the future PG Kelley, C Cornejo, L Hayes, ES Jin, A Sedley, K Thomas, Y Yang, ... Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023), 579-603, 2023 | 2 | 2023 |
" They Don't Leave Us Alone Anywhere We Go" Gender and Digital Abuse in South Asia N Sambasivan, A Batool, N Ahmed, T Matthews, K Thomas, ... proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019 | 149 | 2019 |
" Why wouldn't someone think of democracy as a target?": Security practices & challenges of people involved with {US}. political campaigns S Consolvo, PG Kelley, T Matthews, K Thomas, L Dunn, E Bursztein 30th USENIX Security Symposium (USENIX Security 21), 1181-1198, 2021 | 13 | 2021 |
“it’s common and a part of being a content creator”: Understanding how creators experience and cope with hate and harassment online K Thomas, PG Kelley, S Consolvo, P Samermit, E Bursztein Proceedings of the 2022 CHI conference on human factors in computing systems …, 2022 | 47 | 2022 |
“There’s so much responsibility on users right now:” Expert Advice for Staying Safer From Hate and Harassment M Wei, S Consolvo, PG Kelley, T Kohno, F Roesner, K Thomas Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems …, 2023 | 4 | 2023 |
{“Millions} of people are watching {you”}: Understanding the {Digital-Safety} Needs and Practices of Creators P Samermit, A Turner, PG Kelley, T Matthews, V Wu, S Consolvo, ... 32nd USENIX Security Symposium (USENIX Security 23), 5629-5645, 2023 | 5 | 2023 |
{Trafficking} Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse K Thomas, D McCoy, C Grier, A Kolcz, V Paxson 22nd USENIX Security Symposium (USENIX Security 13), 195-210, 2013 | 360 | 2013 |
@ spam C Grier, K Thomas, V Paxson, M Zhang Proceedings of the 17th ACM conference on Computer and communications security, 2010 | | 2010 |
@ spam: the underground on 140 characters or less C Grier, K Thomas, V Paxson, M Zhang Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 821 | 2010 |
Ad injection at scale: Assessing deceptive advertisement modifications K Thomas, E Bursztein, C Grier, G Ho, N Jagpal, A Kapravelos, D McCoy, ... 2015 IEEE Symposium on Security and Privacy, 151-167, 2015 | 155 | 2015 |
Adapting social spam infrastructure for political censorship K Thomas, C Grier, V Paxson Proceedings of 5th USENIX conf. on LEET 12, 13, 2012 | 127 | 2012 |
Barriers to Security and Privacy Research in the Web Era C Grier, K Thomas, DM Nicol Workshop on Ethics in Computer Security Research, 2010 | | 2010 |
Cloak of visibility: Detecting when machines browse a different web L Invernizzi, K Thomas, A Kapravelos, O Comanescu, JM Picod, ... 2016 IEEE Symposium on Security and Privacy (SP), 743-758, 2016 | 107 | 2016 |
Consequences of Connectivity: Characterizing Account Hijacking on Twitter K Thomas, F Li, C Grier, V Paxson Proceedings of the 21st Annual Conference on Computer and Communications …, 2014 | 92 | 2014 |
Data breaches, phishing, or malware? Understanding the risks of stolen credentials K Thomas, F Li, A Zand, J Barrett, J Ranieri, L Invernizzi, Y Markov, ... Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017 | 234 | 2017 |
Data breaches: User comprehension, expectations, and concerns with handling exposed data S Karunakaran, K Thomas, E Bursztein, O Comanescu Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), 217-234, 2018 | 41 | 2018 |
Design and Evaluation of a Real-Time URL Spam Filtering Service K Thomas, C Grier, J Ma, V Paxson, D Song Proceedings of the IEEE Symposium on Security and Privacy, Los Alamitos, CA, USA, 2011 | 677 | 2011 |
Designing toxic content classification for a diversity of perspectives D Kumar, PG Kelley, S Consolvo, J Mason, E Bursztein, Z Durumeric, ... Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), 299-318, 2021 | 82 | 2021 |
Dialing Back Abuse on Phone Verified Accounts K Thomas, D Iatskiv, E Bursztein, T Pietraszek, C Grier, D McCoy Proceedings of the 21st Annual Conference on Computer and Communications …, 2014 | 48 | 2014 |
Evaluating Login Challenges as a Defense Against Account Takeover P Doerfler, K Thomas, M Marincenko, J Ranieri, Y Jiang, A Moscicki, ... The World Wide Web Conference, 372-382, 2019 | 57 | 2019 |