Capturing tacit knowledge in security operation centers SY Cho, J Happa, S Creese IEEE Access 8, 42021-42041, 2020 | 25 | 2020 |
“They Look at Vulnerability and Use That to Abuse You”: Participatory Threat Modelling with Migrant Domestic Workers J Słupska, S Cho, M Begonia, R Abu-Salma, N Prakash, M Balakrishnan USENIX Security Symposium (USENIX Security), 2022 | 10 | 2022 |
Into the Dark: A Case Study of Banned Darknet Drug Forums SY Cho, J Wright International Conference on Social Informatics (SocInfo 2019), 109-127, 2019 | 5 | 2019 |
Cheating the Cheaters: A Look Inside the Toxic Culture of Game Cheating Communities S Cho, I Flechais DiGRA '22 - Proceedings of the 2022 Digital Games Research Association …, 2022 | 2 | 2022 |
A community-based investigation of competitive cheating S Cho CHI PLAY '22: Extended Abstracts of the 2022 Annual Symposium on Computer …, 2022 | 1 | 2022 |
Methodological Challenges, Risks, and Ethical Implications in Game Research A Boldi, S Cho, Y Kou, A Rapp, MV Birk Companion Proceedings of the Annual Symposium on Computer-Human Interaction …, 2023 | | 2023 |
The Slippery Slope: Exploring the Parallels Between Game Cheating and Cybercrime Through Routine Activity Theory S Cho, J Lusthaus, I Flechais 2023 APWG Symposium on Electronic Crime Research (eCrime), 2023 | | 2023 |
Data Study Group Final Report: Smart monitoring for conservation areas K Hosseini, M Coll Ardanuy, D Patterson, L Garcia-Velez, ... [""], 2020 | | 2020 |