Old Web
English
Sign In
Acemap
>
authorDetail
>
Borbala Benko
Borbala Benko
Google
Computer science
Computer security
Internet privacy
Botnet
Workflow
4
Papers
98
Citations
0.00
KQI
Citation Trend
Filter By
Interval:
1900~2024
1900
2024
Author
Papers (4)
Sort By
Default
Most Recent
Most Early
Most Citation
No data
Journal
Conference
Others
Spotlight: Malware Lead Generation at Scale
2020
ACSAC | Annual Computer Security Applications Conference
Fabian Kaczmarczyck
Bernhard Grill
Luca Invernizzi
Jennifer Pullman
Cecilia M. Procopiuc
David Tao
Borbala Benko
Elie Bursztein
Show All
Source
Cite
Save
Citations (1)
Protecting accounts from credential stuffing with password breach alerting
2019
SECURITY | USENIX Security Symposium
Kurt Thomas
Jennifer Pullman
Kevin Yeo
Ananth Raghunathan
Patrick Gage Kelley
Luca Invernizzi
Borbala Benko
Tadek Pietraszek
Sarvar Patel
Dan Boneh
Elie Bursztein
Show All
Source
Cite
Save
Citations (0)
Protecting accounts from credential stuffing with password breach alerting
2019
SECURITY | USENIX Security Symposium
Kurt Thomas
Jennifer Pullman
Kevin Yeo
Ananth Raghunathan
Patrick Gage Kelley
Luca Invernizzi
Borbala Benko
Tadek Pietraszek
Sarvar Patel
Dan Boneh
Elie Bursztein
Show All
Source
Cite
Save
Citations (28)
Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild
2014
IMC | Internet Measurement Conference
Elie Bursztein
Borbala Benko
Daniel Margolis
Tadek Pietraszek
Andy Archer
Allan Aquino
Andreas Pitsillidis
Stefan Savage
Show All
Source
Cite
Save
Citations (69)
1