Daniel R. Thomas
Daniel R. Thomas
Home
Publications
Contact
Light
Dark
Automatic
Publications
Type
Uncategorized
Conference paper
Journal article
Report
Date
2022
2021
2020
2019
2018
2017
2016
2015
2014
Anh V. Vu
,
Daniel R. Thomas
,
Ben Collier
,
Alice Hutchings
,
Richard Clayton
,
Ross Anderson
(2022).
Getting bored of cyberwar: Exploring the role of civilian participation in the Russia-Ukraine cyber conflict
.
arXiv
.
Cite
DOI
URL
Ben Collier
,
Gemma Flynn
,
James Stewart
,
Daniel Thomas
(2022).
Influence government: Exploring practices, ethics, and power in the use of targeted advertising by the UK state
.
Cite
DOI
URL
Ben Collier
,
Gemma Flynn
,
James Stewart
,
Daniel R. Thomas
(2021).
Influence government: Exploring practices, ethics, and power in the use of targeted advertising by the UK state.
.
PDF
Cite
Ben Collier
,
Richard Clayton
,
Alice Hutchings
,
Daniel Thomas
(2021).
Cybercrime is (often) boring: Infrastructure and alienation in a deviant subculture
.
Cite
DOI
Ben Collier
,
Daniel R. Thomas
,
Richard Clayton
,
Alice Hutchings
,
Yi Ting Chua
(2021).
Influence, infrastructure, and recentering cybercrime policing: Evaluating emerging approaches to online law enforcement through a market for cybercrime services
.
Cite
DOI
Ben Collier
,
Richard Clayton
,
Alice Hutchings
,
Daniel R. Thomas
(2020).
Cybercrime is (often) boring: Maintaining the infrastructure of cybercrime economies
.
Workshop on the Economics of Information Security
.
PDF
Cite
Michael Dodson
,
Alastair R. Beresford
,
Daniel R. Thomas
(2020).
When will my PLC support Mirai? The security economics of large-scale attacks against ICS
.
Cite
Sergio Pastrana
,
Alice Hutchings
,
Daniel R. Thomas
,
Juan Tapiador
(2019).
Measuring eWhoring
.
Internet Measurement Conference
.
Cite
DOI
URL
Ben Collier
,
Daniel R. Thomas
,
Richard Clayton
,
Alice Hutchings
(2019).
Booting the booters: Evaluating the effects of police interventions in the market for Denial-of-Service attacks
.
Internet Measurement Conference
.
Cite
DOI
URL
Diana A. Vasile
,
Martin Kleppmann
,
Daniel R. Thomas
,
Alastair R. Beresford
(2019).
Ghost trace on the wire? Using key evidence for informed decisions
.
Twenty-seventh International Workshop on Security Protocols
.
Cite
URL
Sergio Pastrana
,
Daniel R. Thomas
,
Alice Hutchings
,
Richard Clayton
(2018).
CrimeBB: Enabling cybercrime research on underground forums at scale
.
Proceedings of the 2018 World Wide Web Conference
.
Cite
DOI
URL
Daniel R. Thomas
,
Sergio Pastrana
,
Alice Hutchings
,
Richard Clayton
,
Alastair R. Beresford
(2017).
Ethical issues in research using datasets of illicit origin
.
Internet Measurement Conference
.
Cite
DOI
URL
Daniel R. Thomas
,
Richard Clayton
,
Alastair R. Beresford
(2017).
1000 days of UDP amplification DDoS attacks
.
APWG Symposium on Electronic Crime Research
.
Cite
DOI
URL
Daniel R. Thomas
,
Alastair R. Beresford
(2016).
Incentivising software updates
.
Internet of Things Software Updates Workshop (IoTSU)
.
Cite
URL
Daniel R. Thomas
,
Alastair R. Beresford
,
Andrew Rice
(2015).
Security metrics for the Android ecosystem
.
ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices
.
Cite
DOI
URL
Daniel R. Thomas
(2015).
The lifetime of Android API vulnerabilities: Case study on the JavaScript-to-Java interface (Transcript of Discussion)
.
Security Protocols XXIII
.
Cite
DOI
Daniel R. Thomas
,
Alastair R. Beresford
,
Thomas Coudray
,
Tom Sutcliffe
,
Adrian Taylor
(2015).
The lifetime of Android API vulnerabilities: Case study on the JavaScript-to-Java interface
.
Security Protocols XXIII
.
PDF
Cite
DOI
Daniel T. Wagner
,
Daniel R. Thomas
,
Alastair R. Beresford
,
Andrew Rice
(2015).
Device Analyzer: A privacy-aware platform to support research on the Android ecosystem
.
Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks
.
PDF
Cite
DOI
Daniel R. Thomas
,
Alastair R. Beresford
(2014).
Better authentication: Password revolution by evolution
.
Security Protocols XXII
.
PDF
Cite
DOI
Daniel R. Thomas
(2014).
Better authentication: Password revolution by evolution (Transcript of discussion)
.
Security Protocols XXII
.
Cite
DOI
Cite
×