Cited By
View all- Lepipas ABorovykh ADemetriou SQuek TGao DZhou JCardenas A(2024)Username Squatting on Online Social Networks: A Study on XProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3637637(621-637)Online publication date: 1-Jul-2024
- Kotzias PRoundy KPachilakis MSanchez-Rola IBilge L(2023)Scamdog Millionaire: Detecting E-commerce Scams in the WildProceedings of the 39th Annual Computer Security Applications Conference10.1145/3627106.3627184(29-43)Online publication date: 4-Dec-2023
- Koide TFukushi NNakano HChiba D(2023)PhishReplicant: A Language Model-based Approach to Detect Generated Squatting Domain NamesProceedings of the 39th Annual Computer Security Applications Conference10.1145/3627106.3627111(1-13)Online publication date: 4-Dec-2023
- Show More Cited By