Periwinkle Doerfler
Periwinkle Doerfler
Verified email at
Cited by
Cited by
The spyware used in intimate partner violence
R Chatterjee, P Doerfler, H Orgad, S Havron, J Palmer, D Freed, K Levy, ...
2018 IEEE Symposium on Security and Privacy (SP), 441-458, 2018
Fifteen minutes of unwanted fame: Detecting and characterizing doxing
P Snyder, P Doerfler, C Kanich, D McCoy
Proceedings of the 2017 internet measurement conference, 432-444, 2017
Backpage and bitcoin: Uncovering human traffickers
RS Portnoff, DY Huang, P Doerfler, S Afroz, D McCoy
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge …, 2017
Evaluating login challenges as adefense against account takeover
P Doerfler, K Thomas, M Marincenko, J Ranieri, Y Jiang, A Moscicki, ...
The World Wide Web Conference, 372-382, 2019
this Conference
BK Chatterjee, P Doerfler, H Orgad, S Havron, J Palmer, D Freed, K Levy, ...
Chap, 1965
Something You Have and Someone You Know—Designing for Interpersonal Security
P Doerfler
Enigma 2019 (Enigma 2019), 2019
" I'm a Professor, which isn't usually a dangerous job": Internet-Facilitated Harassment and its Impact on Researchers
P Doerfler, A Forte, E De Cristofaro, G Stringhini, J Blackburn, D McCoy
arXiv preprint arXiv:2104.11145, 2021
Adversarial'Intended'Use of Technology and the Need for New Threat Models addressing Human Harms
P Doerfler
New York University Tandon School of Engineering, 2021
The system can't perform the operation now. Try again later.
Articles 1–8