Kurt Thomas
Orcid: 0000-0002-3762-5851
According to our database1,
Kurt Thomas
authored at least 54 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Privacy Risks of General-Purpose AI Systems: A Foundation for Investigating Practitioner Perspectives.
CoRR, 2024
Supporting Human Raters with the Detection of Harmful Content using Large Language Models.
CoRR, 2024
Understanding Help-Seeking and Help-Giving on Social Media for Image-Based Sexual Abuse.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 2024 ACM on Internet Measurement Conference, 2024
2023
CoRR, 2023
Proceedings of the ACM Web Conference 2023, 2023
"Millions of people are watching you": Understanding the Digital-Safety Needs and Practices of Creators.
Proceedings of the 32nd USENIX Security Symposium, 2023
"There will be less privacy, of course": How and why people in 10 countries expect AI will affect privacy in the future.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023
"There's so much responsibility on users right now: " Expert Advice for Staying Safer From Hate and Harassment.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
"It's common and a part of being a content creator": Understanding How Creators Experience and Cope with Hate and Harassment Online.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022
2021
"Why wouldn't someone think of democracy as a target?": Security practices & challenges of people involved with U.S. political campaigns.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021
2020
Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale.
Proceedings of the 29th USENIX Security Symposium, 2020
Who is targeted by email-based phishing and malware?: Measuring factors that differentiate risk.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020
2019
Proceedings of the World Wide Web Conference, 2019
Proceedings of the World Wide Web Conference, 2019
Proceedings of the World Wide Web Conference, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Data Breaches: User Comprehension, Expectations, and Concerns with Handling Exposed Data.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018
SYBILFUSE: Combining Local Attributes with Global Structure to Perform Robust Sybil Detection.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
2017
Proceedings of the 26th International Conference on World Wide Web, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Proceedings of the 25th International Conference on World Wide Web, 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016
2015
CoRR, 2015
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the 2015 ACM Internet Measurement Conference, 2015
2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
PhD thesis, 2013
Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
2012
Proceedings of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011
2010
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010
Proceedings of the 5th International Conference on Malicious and Unwanted Software, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010