publications
publications by categories in reversed chronological order
2020
- STASTPrivacy, Security and Trust in the Internet of NeuronsIn Proceedings of the 10th Workshop on Socio-Technical Aspects in Security and Trust 2020
- EuroS&PX-Men: A Mutation-Based Approach for the Formal Analysis of Security CeremoniesIn Proceedings of the 5th IEEE European Symposium on Security and Privacy (EuroS&P) 2020
2019
- SECRYPTWhat Are the Threats?(Charting the Threat Models of Security Ceremonies)In Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, ICETE - Volume 2: SECRYPT 2019
- SECRYPTAn Investigation into the “Beautification” of Security CeremoniesIn Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, ICETE - Volume 2: SECRYPT 2019
- CPDPSmart Humans... WannaDie?In Proceedings of the 3rd Re-Coding Black Mirror workshop, Companion of the Data Protection and Artificial Intelligence (CPDP) 2019
- CPDPSchrödinger’s ManIn Proceedings of the 3rd Re-Coding Black Mirror workshop, Companion of the Data Protection and Artificial Intelligence (CPDP) 2019
2018
- WWWGnirut: The Trouble With Being Born Human In An Autonomous WorldIn Proceedings of the 2nd Re-Coding Black Mirror workshop, Companion of The Web Conference (WWW) 2018
- WWWMay I Mine Your Mind?In Proceedings of the 2nd Re-Coding Black Mirror workshop, Companion of The Web Conference (WWW) 2018