Periwinkle Doerfler
Periwinkle Doerfler
Verified email at
Cited by
Cited by
The spyware used in intimate partner violence
R Chatterjee, P Doerfler, H Orgad, S Havron, J Palmer, D Freed, K Levy, ...
2018 IEEE Symposium on Security and Privacy (SP), 441-458, 2018
Backpage and bitcoin: Uncovering human traffickers
RS Portnoff, DY Huang, P Doerfler, S Afroz, D McCoy
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge …, 2017
Fifteen minutes of unwanted fame: Detecting and characterizing doxing
P Snyder, P Doerfler, C Kanich, D McCoy
Proceedings of the 2017 Internet Measurement Conference, 432-444, 2017
Evaluating Login Challenges as aDefense Against Account Takeover
P Doerfler, K Thomas, M Marincenko, J Ranieri, Y Jiang, A Moscicki, ...
The World Wide Web Conference, 372-382, 2019
Something You Have and Someone You Know—Designing for Interpersonal Security
P Doerfler
Enigma 2019 (Enigma 2019), 2019
The system can't perform the operation now. Try again later.
Articles 1–5