Follow
Kurt Thomas
Title
Cited by
Year
" There will be less privacy, of course": How and why people in 10 countries expect {AI} will affect privacy in the future
PG Kelley, C Cornejo, L Hayes, ES Jin, A Sedley, K Thomas, Y Yang, ...
Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023), 579-603, 2023
22023
" They Don't Leave Us Alone Anywhere We Go" Gender and Digital Abuse in South Asia
N Sambasivan, A Batool, N Ahmed, T Matthews, K Thomas, ...
proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
1492019
" Why wouldn't someone think of democracy as a target?": Security practices & challenges of people involved with {US}. political campaigns
S Consolvo, PG Kelley, T Matthews, K Thomas, L Dunn, E Bursztein
30th USENIX Security Symposium (USENIX Security 21), 1181-1198, 2021
132021
“it’s common and a part of being a content creator”: Understanding how creators experience and cope with hate and harassment online
K Thomas, PG Kelley, S Consolvo, P Samermit, E Bursztein
Proceedings of the 2022 CHI conference on human factors in computing systems …, 2022
472022
“There’s so much responsibility on users right now:” Expert Advice for Staying Safer From Hate and Harassment
M Wei, S Consolvo, PG Kelley, T Kohno, F Roesner, K Thomas
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems …, 2023
42023
{“Millions} of people are watching {you”}: Understanding the {Digital-Safety} Needs and Practices of Creators
P Samermit, A Turner, PG Kelley, T Matthews, V Wu, S Consolvo, ...
32nd USENIX Security Symposium (USENIX Security 23), 5629-5645, 2023
52023
{Trafficking} Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse
K Thomas, D McCoy, C Grier, A Kolcz, V Paxson
22nd USENIX Security Symposium (USENIX Security 13), 195-210, 2013
3602013
@ spam
C Grier, K Thomas, V Paxson, M Zhang
Proceedings of the 17th ACM conference on Computer and communications security, 2010
2010
@ spam: the underground on 140 characters or less
C Grier, K Thomas, V Paxson, M Zhang
Proceedings of the 17th ACM conference on Computer and communications …, 2010
8212010
Ad injection at scale: Assessing deceptive advertisement modifications
K Thomas, E Bursztein, C Grier, G Ho, N Jagpal, A Kapravelos, D McCoy, ...
2015 IEEE Symposium on Security and Privacy, 151-167, 2015
1552015
Adapting social spam infrastructure for political censorship
K Thomas, C Grier, V Paxson
Proceedings of 5th USENIX conf. on LEET 12, 13, 2012
1272012
Barriers to Security and Privacy Research in the Web Era
C Grier, K Thomas, DM Nicol
Workshop on Ethics in Computer Security Research, 2010
2010
Cloak of visibility: Detecting when machines browse a different web
L Invernizzi, K Thomas, A Kapravelos, O Comanescu, JM Picod, ...
2016 IEEE Symposium on Security and Privacy (SP), 743-758, 2016
1072016
Consequences of Connectivity: Characterizing Account Hijacking on Twitter
K Thomas, F Li, C Grier, V Paxson
Proceedings of the 21st Annual Conference on Computer and Communications …, 2014
922014
Data breaches, phishing, or malware? Understanding the risks of stolen credentials
K Thomas, F Li, A Zand, J Barrett, J Ranieri, L Invernizzi, Y Markov, ...
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
2342017
Data breaches: User comprehension, expectations, and concerns with handling exposed data
S Karunakaran, K Thomas, E Bursztein, O Comanescu
Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), 217-234, 2018
412018
Design and Evaluation of a Real-Time URL Spam Filtering Service
K Thomas, C Grier, J Ma, V Paxson, D Song
Proceedings of the IEEE Symposium on Security and Privacy, Los Alamitos, CA, USA, 2011
6772011
Designing toxic content classification for a diversity of perspectives
D Kumar, PG Kelley, S Consolvo, J Mason, E Bursztein, Z Durumeric, ...
Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), 299-318, 2021
822021
Dialing Back Abuse on Phone Verified Accounts
K Thomas, D Iatskiv, E Bursztein, T Pietraszek, C Grier, D McCoy
Proceedings of the 21st Annual Conference on Computer and Communications …, 2014
482014
Evaluating Login Challenges as a Defense Against Account Takeover
P Doerfler, K Thomas, M Marincenko, J Ranieri, Y Jiang, A Moscicki, ...
The World Wide Web Conference, 372-382, 2019
572019
The system can't perform the operation now. Try again later.
Articles 1–20