Selected Publications
Click here to view the collaborations graph. Mohamed, M., Gao, S., Sachdeva, N., Saxena, S., Zhang, C., Kumaraguru, P., and van Oorschot, J. On the Security and Usability of Dynamic Cognitive Game CAPTCHAs. Accepted in Journal of Computer Security (JCS), 2017.

Dewan, P., Kumaraguru, P. Facebook Inspector (FbI): Towards Automatic Real Time Detection of Malicious Content on Facebook. Accepted at Journal of Social Network Analysis and Mining (SNAM), 2017.

Lamba, H., Bharadhwaj, V., Vachher, M., Agarwal, D., Arora, M., Sachdeva, N., Kumaraguru, P. From Camera to Deathbed: Understanding Dangerous Selfies on Social Media. Accepted as Poster at the 11th International Conference on Web and Social Media (ICWSM), 2017. Author's version (Poster).

Bagroy, S., Kumaraguru, P., and De Choudhury, M. A Social Media Based Index of Mental Well-Being in College Campuses. Accepted at the 34th Annual ACM Conference on Human Factors in Computing Systems (CHI), 2017 (Acceptance rate: 25%). Author's version.

Sachdeva, N., and Kumaraguru, P. Call for Service: Characterizing and Modeling Police Response to Serviceable Requests on Facebook. Accepted at the ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW), 2017. Author's version.

Halevi, T., Memon, N. D., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F. A., and Chen, J. Cultural and Psychological Factors in Cyber-Security. Accepted at 18th International Conference on Information Integration and Web-based Applications & Services (iiWAS2016). Author's version.

Gupta, S., Gupta, P., Ahamad, M., and Kumaraguru, P. Exploiting Phone Numbers and Cross-Application Features in Targeted Mobile Attacks. Accepted at the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), 2016. Author's version.

Kaushal, R., Saha, S., Bajaj, P., and Kumaraguru, P. KidsTube: Detection, Characterization and Analysis of Child Unsafe Content & Promoters on YouTube. Accepted at Privacy Security and Trust (PST), 2016. Author's version.

Jain, P., Kumaraguru, P., and Joshi, A. Other Times, Other Values: Leveraging Attribute History to Link User Profiles across Online Social Networks. Accepted at Journal of Social Network Analysis and Mining (SNAM), 2016. Author's version.

Goel, S., Sachdeva, N., Kumaraguru, P., Subramanyam, A., and Gupta, D. PicHunt: Social Media Image Retrieval for Improved Law Enforcement. Accepted at 8th International Conference on Social Informatics. 2016. #socinfo2016.

Bajaj, P., Kavidayal, M., Srivastava, P., Akthar M., and Kumaraguru, P. Disinformation in Multimedia Annotation: Misleading Metadata Detection on YouTube. Accepted at ACM Multimedia 2016 Workshop:Vision and Language Integration Meets Multimedia Fusion. 2016. Author's version

Gupta, S. Emerging Threats Abusing Phone Numbers Exploiting Cross-Platform Features. 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). Ph.D. Forum. Author's version.

Dewan, P., Bagroy, S., and Kumaraguru, P. Hiding in Plain Sight: Characterizing and Detecting Malicious Facebook Pages. Accepted at IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 2016 (Short Paper). Author's version.

Sachdeva, N., Kumaraguru, P. and Choudhury, M. - Social Media for Safety: Characterizing Online Interactions between Citizens and Police. Accepted at 30th British Human Computer Interaction Conference (BHCI) 2016. Author's version | Slides.

Sachdeva, N., and Kumaraguru, P. Online Social Media - New face of policing? A Survey Exploring Perceptions, Behavior, Challenges for Police Field Officers and Residents. Accepted at 18th International Conference on Human-Computer Interaction. Author's version.

Jain, P., and Kumaraguru, P. On the Dynamics of Username Changing Behavior on Twitter. Accepted at 3rd IKDD Conference on Data Science, 2016. Author's version.

Lerman, K., Arora, M., Marin, L., Kumaraguru, P., and Garcia, D. Emotions, Demographics and Sociability in Online Interactions. Accepted at ICWSM 2016. Author's version | Slides.

Jain, P., Kumaraguru, P., and Joshi, A. Other Times, Other Values: Leveraging Attribute History to Link User Profiles across Online Social Networks. Accepted at Hypertext 2015. Author's version.

Aggarwal, A., and Kumaraguru, P. What They Do in Shadows: Twitter Underground Follower Market. Accepted at the 13th Annual Conference on Privacy, Security and Trust (PST), 2015. Author's version.

Dewan, P., and Kumaraguru, P. Towards Automatic Real Time Identification of Malicious Posts on Facebook. Accepted at the 13th Annual Conference on Privacy, Security and Trust (PST), 2015. Author's version.

Sachdeva, N., and Kumaraguru, P. Online Social Networks and Police in India - Understanding the Perceptions, Behavior, Challenges. Accepted at the European conference on Computer-Supported Cooperative Work (ECSCW), 2015. Author's version

Sachdeva, N., and Kumaraguru, P. Social Networks for Police and Residents in India: Exploring Online Communication for Crime Prevention. Accepted at the 16th Annual International Conference on Digital Government Research (dg.o), 2015. Author's version | Best paper award

Gupta, A., Kumaraguru, P., Castillo, C., and Meier, P. TweetCred: A Real-time Web-based System for Assessing Credibility of Content on Twitter. Accepted at the 6th International Conference on Social Informatics (SocInfo), 2014. Author's version | Runner-up for best paper award

Gupta, N., Aggarwal A. and Kumaraguru, P. bit.ly/malicious: Deep Dive into Short URL based e-Crime Detection. Accepted at 9th APWG eCrime Research Symposium (eCRS), 2014. Author's version | Best paper award

Gupta, S., and Kumaraguru, P. Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page. Accepted at 9th APWG eCrime Research Symposium (eCRS), 2014. Author's version

Dewan, P., Kashyap, A., Kumaraguru, P. Analyzing Social and Stylometric Features to Identify Spear phishing Emails. Accepted at 9th APWG eCrime Research Symposium (eCRS), 2014. Author's version

Mittal, S., Gupta, N., Dewan, P., Kumaraguru, P. Pinned it! A large scale study of the Pinterest network. Accepted at the 1st ACM IKDD Conference on Data Sciences (CoDS), 2014. Acceptance rate: 15%. Author's version

Mohamed, M., Sachdeva, N., Georgescu, M., Gao, S., Saxena, N., Zhang, C., Kumaraguru, P., Van Oorschot, P., and Chen, W. A Three-Way Investigation of a Game-CAPTCHA: Automated Attacks, Relay Attacks and Usability. Accepted at 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2014. Acceptance rate: 20%.

Sachdeva, N., Saxena, N., and Kumaraguru, P. On the Viability of CAPTCHAs for Use in Telephony Systems: A Usability FieldStudy. 16th Information Security Conference November 13-15 in Dallas, Texas. Author's version | Slides

Dewan, P., Gupta, M., Goyal, K., and Kumaraguru, P. MultiOSN: Realtime Monitoring of Real World Events on Multiple Online Social Media". Accepted at I-CARE 2013. Acceptance rate: 26%. Author's version | Poster

Gupta, A., Lamba, H., and Kumaraguru, P. $1.00 per RT #BostonMarathon #PrayForBoston: Analyzing Fake Content on Twitter. Accepted at IEEE APWG eCrime Research Summit (eCRS), 2013. Author's version | Slides

Jain, P., Jain, P., and Kumaraguru, P. Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on Online Social Networks. Accepted at the Conference on Online Social Networks (COSN 2013). Author's version | Slides

Narang, K., Lerman, K., and Kumaraguru, P. Network Flows and the Link Prediction Problem. Accepted at the 7th workshop on Social Network Mining and Analysis (SNAKDD) 2013. Author's version

Panjwani, S., Ghosh, M., Singh, S., and Kumaraguru, P. The Paper Slip Should be There: Perceptions of Transaction Receipts in Branchless Banking. Accepted at Mobile HCI 2013. Author's version

Lerman, K., Jain, P., Ghosh, R., Kang, J., and Kumaraguru, P. Limited Attention and Centrality in Social Networks. In Proceedings of International Conference on Social Intelligence and Technology (SOCIETY). 2013. Author's version | Bibtex

Magalhães, T., Dewan, P., Kumaraguru, P., Melo-Minardi, R., and Almeida, V. uTrack: Track Yourself! Monitoring Information on Online Social Media. Accepted at the 22nd International World Wide Web Conference (WWW) (2013). Author's version | Slides | Poster | Demo track

Gupta, A., Lamba, H., Kumaraguru, P., and Joshi, A. Faking Sandy: Characterizing and Identifying Fake Images on Twitter during Hurricane Sandy. Accepted at the 2nd International Workshop on Privacy and Security in Online Social Media (PSOSM), in conjunction with the 22th International World Wide Web Conference (WWW) (2013). Author's version | Slides | Best Paper Award

Jain, P., Kumaraguru, P., and Joshi, A. @I seek 'fb.me': Identifying Users across Multiple Online Social Networks. Accepted at the 2nd International Workshop on Web of Linked Entities (WoLE), in conjunction with the 22th International World Wide Web Conference (WWW) (2013). Author's version | Slides | Bibtex | Honorable Mention for the Best Paper Award

Aggarwal, A., Almeida, J., and Kumaraguru, P. Detection of Spam Tipping Behaviour on Foursquare. Accepted at the 2nd International Workshop on Mining Social Network Dynamics (MSND), in conjunction with the 22th International World Wide Web Conference (WWW) (2013). Author's version | Slides

Ottoni, R., Pesce, J., Casas, D., Franciscani, G., Meira, W., Kumaraguru, P., and Almeida, V. Ladies First: Analyzing Gender Roles and Behaviors in Pinterest. Accepted at The International AAAI Conference on Weblogs and Social Media (ICWSM) 2013. Author's version

Gupta, A., Kumaraguru, P. Misinformation on Twitter during Crisis Events. Encyclopedia of Social Network Analysis and Mining (ESNAM). Springer publications. 2012. | Book Chapter

Yadav, K., Saha, S., Kumaraguru, P., Kumra, R. Take Control of Your SMSes: Designing an Usable Spam SMS Filtering System. Accepted at the 13th International Conference on Mobile Data Management (MDM) (2012). Author's version | Demo track

Aggarwal, A., Rajadesingan, A., and Kumaraguru, P. PhishAri: Automatic Realtime Phishing Detection on Twitter. In seventh IEEE APWG eCrime Research Summit (eCRS), 2012. Author's version | Best Paper Award

Pontes, T., Magno, G., Vasconcelos, M., Gupta, A., Almeida, J., Kumaraguru, P., and Almeida, V. Beware of What You Share: Inferring Home Location in Social Networks. Accepted at Privacy in Social Data (PinSoda), in conjunction with International Conference on Data Mining (ICDM) (2012). Author's version | Bibtex

Gupta, A., Joshi, A., and Kumaraguru, P. Identifying and Characterizing User Communities on Twitter during Crisis Events. Workshop on Data-driven User Behavioral Modelling and Mining from Social Media, Co-located with CIKM (2012). Author's version | BibTex

Pontes, T., Vasconcelos, M., Almeida, J., Kumaraguru, P., and Almeida, V. We Know Where You Live: Privacy Characterization of Foursquare Behavior. Accepted at 4th International Workshop on Location-Based Social Networks (LBSN 2012). Author's version | BibTex

Malhotra, A., Totti, L., Meira, W., Kumaraguru, P., and Almeida, V. Studying user footprints in different online social networks. Accepted at International Workshop on Cybersecurity of Online Social Network (CSOSN) (2012). Author's version | BibTex

Asthana, S., Singh,P., Kumaraguru, P., Singh, A., and Naik, V., Tring! Tring! - An Exploration and Analysis of Interactive Voice Response Systems, 4th International Conference on Human Computer Interaction (IndiaHCI), 2012. Author's version | BibTex

Gupta, A., and Kumaraguru, P. Credibility ranking of tweets during high impact events. In Proceedings of the 1st Workshop on Privacy and Security in Online Social Media (PSOSM), In conjunction with WWW'12. Author's version | BibTex

Jain, P., Rodrigues, T., Magno, G., Kumaraguru, P., and Almeida, V. Cross-pollination of information in online social media: A case study on popular social networks. In Third International Conference on Social Computing (Short paper) (2011). Author's version | BibTex

Rauber, G., Almeida, V., and Kumaraguru, P. Privacy Albeit Late. In Seventeenth edition of WebMedia, Brazilian Symposium on Multimedia and the Web (2011). Author's version | BibTex

Chhabra, S., Aggarwal, A., Benevenuto, F., and Kumaraguru, P. Phi.sh/$oCiaL: The Phishing Landscape through Short URLs. In 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS 2011). Author's version | BibTex | Best Paper Award

Ion, I., Sachdeva, N., Kumaraguru, P., and Capkun, S. Home is safer than the cloud! privacy concerns for consumer cloud storage. In Symposium on Usable Privacy and Security (SOUPS) (2011).  Author's version | BibTex

Agarwal, V., Desai, V., Kapoor, S., Kumaraguru, P., and Mittal, S. Enhancing the rural self help group – bank linkage program. In IEEE International Conference on Service Operations and Logistics, and Informatics (2011). BibTex

Gupta, A., Viswanathan, K. K., Joshi, A., Finin, T., and Kumaraguru, P. Integrating linked open data with unstructured text for intelligence gathering tasks. accepted at Information Integration on the Web (IIWeb), Co-located workshop at WWW (2011).  Author's version | BibTex

Khot, R., Kannan, S., and Kumaraguru, P. Marasim: A novel jigsaw based authentication scheme using tagging. In Proceedings of the 29th ACM International Conference on Human Factors in Computing Systems. CHI. (2011).  Author's version | BibTex

Adappa, S., Agarwal, V., Goyal, S., Kumaraguru, P., and Mittal, S. User Controllable Security and Privacy for Mobile Mashups. In HotMobile (2011).  Author's version | BibTex

Yadav, K., Kumaraguru, P., Goyal, A., Gupta, A., and Naik, V. Smsassassin : Crowdsourcing driven mobile-based system for sms spam filtering. In HotMobile (2011). Author's version | BibTex

Sureka, A., Kumaraguru, P., Goyal, A., and Chhabra, S. Mining YouTube to Discover Hate Videos, Users and Hidden Communities. In Sixth Asia Information Retrieval Societies Conference (2010). Author's version | BibTex

Yadav, K., Naik, V., Singh, A., Singh, P., Kumaraguru, P., and Chandra, U. Challenges and Novelties while using Mobile Phones as ICT Devices for Indian Masses. In ACM Workshop on Networked Systems for Developing Regions (2010). Author's version | BibTex

Ion, I., Langheinrich, M., Kumaraguru, P., and Capkun, S. Influence of User Perception, Security Needs, and Social Factors on Device Pairing Method Choices. In Symposium On Usable Privacy and Security (SOUPS) (2010). Author's version | BibTex

Sheng, S., Holbrook, M., Kumaraguru, P., Cranor, L., and Downs, J. Who Falls for Phish? A Demographic Analysis of Phishing Susceptibility and Effectiveness of Interventions. In CHI (2010). Author's version | BibTex

Rengamani, H., Kumaraguru, P., Chakraborty, R., and Rao, R. The Unique Identification Number Project: Challenges and Recommendations. In The Third International Conference on Ethics and Policy of Biometrics and International Data Sharing (ICEB) (2010). BibTex

Sheng, S., Kumaraguru, P., Acquisti, A., Cranor, L., and Hong, J. Improving Phishing Countermeasures: An Analysis of Expert Interviews. In e-Crime Researchers Summit, Anti-Phishing Working Group (2009). Author's version | BibTex

Kumaraguru, P., Cranor, L., and Mather, L. Anti-phishing landing page: Turning a 404 into a teachable moment for end users. In Conference on Email and Anti-Spam (2009). Author's version | BibTex

Karat, J., Bertino, E., Li, N., Ni, Q., Brodie, C., Lobo, J., Calo, S. B., Cranor, L. F., Kumaraguru, P., and Reeder, R. W. A Policy Framework for Security and Privacy Management. In IBM Journal of Research and Development, Harmonizing Security and Privacy, Volume 53, Number 2 (2009). BibTex

Kumaraguru, P., Cranshaw, J., Acquisti, A., Cranor, L., Hong, J., Blair, M. A., and Pham, T. School of Phish: A Real-World Evaluation of Anti-Phishing Training. In Symposium On Usable Privacy and Security (SOUPS) (2009). Author's version | BibTex

Kumaraguru, P., S. Sheng, A. Acquisti, L.F. Cranor, and J.I. Hong. PhishGuru: Lessons From a Real World Evaluation of Anti-Phishing Training. In e-Crime Researchers Summit, Anti-Phishing Working Group, October 15 - 16, 2008, Atlanta, USA. Author's version | BibTex

Kumaraguru, P., S. Sheng, A. Acquisti, L.F. Cranor, and J.I. Hong. Anti-Phishing Education. In The Proceedings of The International Conference on E-Learning in the Workplace (ICELW 2008). BibTex

Sheedy, C., Kumaraguru, P. A Contextual Method for Evaluating Privacy Preferences. In Policies and Research in Identity Management (IDMAN), October 11 - 12, 2007, Rotterdam, The Netherlands. Author's version | BibTex

Kumaraguru, P., Rhee, Y., Sheng, S., Hasan, S., Acquisti, A., Cranor, L.F., and Hong, J. Getting users to pay attention to anti-phishing education: Evaluation of retention and transfer. In e-Crime Researchers Summit, Anti-Phishing Working Group, October 4 - 5, 2007, Pittsburgh, USA. Author's version | BibTex

Sheng, S., Magnien, B., Kumaraguru, P., Acquisti, A., Cranor, L.F., Hong, J., and Nunge, E. Anti-phishing phil: The design and evaluation of a game that teaches people not to fall for phish. In SOUPS ’07: Proceedings of the 3rd symposium on usable privacy and security (New York, NY, USA, March 2007), ACM, pp.88 - 99. Author's version | BibTex

Kumaraguru, P., Cranor, L., Lobo, J., and Calo, S. A survey of privacy policy languages. In Workshop on Usable IT Security Management (USM 07). In SOUPS '07: Proceedings of the 3rd symposium on Usable privacy and security (New York, NY, USA, March 2007), ACM. Author's version | BibTex

Kumaraguru, P., Rhee, Y., Acquisti, A., Cranor, L.F., Hong, J., and Nunge, E. Protecting people from phishing: the design and evaluation of an embedded training email system. In CHI ’07: Proceedings of the SIGCHI conference on Human factors in computing systems, New York, NY, USA, May, 2007, ACM Press, pp.905 - 914. Author's version | BibTex

Kumaraguru, P., Acquisti, A., and Cranor, L. Trust modeling for online transactions: A phishing scenario. In the proceedings of Privacy Security Trust, Oct 30 - Nov 1, 2006, Ontario, Canada. Author's version | BibTex

Kumaraguru, P., Cranor, L., and Newton, E. Privacy Perceptions in India and the United States: An Interview Study. In The 33rd Research Conference on Communication, Information and Internet Policy (TPRC), Sep 23 - Sep 25, 2005, The National Center for Technology and Law, George Mason University School of Law, USA. Author's version | BibTex

Diesner, J., Kumaraguru, P., and Carley, K. Mental Models of Data Privacy and Security Extracted from Interviews with Indians. In 55th Annual Conference of the International Communication Association (ICA), May 26-30, 2005. New York, NY. Author's version | BibTex

Kumaraguru, P., and Cranor, L. Privacy in India: Attitudes and Awareness. In Proceedings of the 2005 Workshop on Privacy Enhancing Technologies (PET 2005), 30 May - 1 June 2005, Dubrovnik, Croatia. Author's version | BibTex

Jain, P. Automated Methods for Identity Resolution across Online Social Networks. Submitted in partial fulfillment of the requirements for the Degree of Philosophy in Computer Science. Author's version. | Slides | Ph.D. Thesis

Goel, S. Image Search for Improved Law and Order: Search, Analyse, Predict image spread on Twitter. Submitted in partial fulfillment of the requirements for the Degree of M. Tech. in Computer Science. IIIT-Delhi. 2016. Masters Thesis

Gupta, A. Designing and Evaluating Techniques to Mitigate Misinformation Spread on Microblogging Web Services. Submitted in partial fulfillment of the requirements for the Degree of Philosophy in Computer Science. IIIT-D-PhD-CS-CERC-15-001. Author's version. | Slides | Ph.D. Thesis

Bhola, A. Twitter and Polls: Analyzing and estimating political orientation of Twitter users in India General #Elections2014. Submitted in partial fulfillment of the requirements for the Degree of M.Tech. in Computer Science, with specialization in Data Engineering. IIIT-Delhi. 2014. Author's version | Masters Thesis

Mittal, S. Broker Bots: Analyzing automated activity during High Impact Events on Twitter. Submitted in partial fulfillment of the requirements for the Degree of M. Tech. in Computer Science. IIIT-Delhi. 2014. Author's version

Gupta, N. Exploration of gaps in Bitly's spam detection and relevant counter measures. Submitted in partial fulfillment of the requirements for the Degree of M.Tech. in Computer Science, with specialization in Information Security. IIIT-Delhi. 2014. Author's version | Slides | Video | Masters Thesis

Jain, P. Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on Online Social Networks. Submitted in partial fulfillment of the requirements for the Degree of M.Tech. in Computer Science, with specialization in Information Security. IIIT-Delhi. 2013. Author's version | Slides | Masters Thesis

Gupta, S. OCEAN: Open-source Collation of eGovernment data And Networks - Understanding Privacy Leaks in Open Government Data. Submitted in partial fulfillment of the requirements for the Degree of M.Tech. in Computer Science, with specialization in Information Security. IIIT-Delhi. 2013. Author's version | Slides | Bibtex | Masters Thesis

Pontes, T. Inferring Residence Location of Social Network Users From Public Data. Submitted in partial fulfillment of the requirements for the Degree of M.Tech. in Computer Science, from Universidade Federal de Minas Gerai, Brazil. 2012. Author's version | Masters Thesis

Aggarwal, A. PhishAri: Automatic Realtime Phishing Detection on Twitter. Submitted in partial fulfillment of the requirements for the Degree of M.Tech. in Computer Science, with specialization in Information Security. IIIT-Delhi. 2012. Author's version | Masters Thesis

Sachdeva, K. TrustGuru: A System to Show Trust Rating of Android Applications. Submitted in partial fulfillment of the requirements for the Degree of M.Tech. in Computer Science, with specialization in Information Security. IIIT-Delhi. 2012. Author's version | Masters Thesis

Rodrigues, T. Monitoring Information in the Online social Media Sphere. Submitted in partial fulfillment of the requirements for the Degree of M.Tech. in Computer Science, from Universidade Federal de Minas Gerai, Brazil. 2012. Author's version | Masters Thesis

Kumaraguru, P. PhishGuru: A System for Educating Users about Semantic Attacks. PhD thesis, School of Computer Science, Carnegie Mellon University, 2009. Author's version | Ph.D. Thesis

Aggarwal, A., Kumar, S., Shah, A., Viswanath, B., Zhang, L., and Kumaraguru, P. Spying Browser Extensions: Analysis and Detection. Technical Report. Author's version

Lamba, H., Bharadhwaj, V., Vachher, M., Agarwal, D., Arora, M., and Kumaraguru, P. Me, Myself and My Killfie: Characterizing and Preventing Selfie Deaths. Technical Report. Author's version

Dewan, P., Bharadhwaj, V., Mithal, A., Suri, A., and Kumaraguru, P. Visual Themes and Sentiment on Social Networks To Aid First Responders During Crisis Events. Technical Report. Author's version

Dewan, P., and Kumaraguru, P. Hiding in Plain Sight: The Anatomy of Malicious Facebook Pages. Technical Report. Author's version

Sachdeva, N., and Kumaraguru, P. Characterising Behavior and Emotions on Social Media for Safety: Exploring Online Communication between Police and Citizens. Technical Report. Author's version

Dewan, P., and Kumaraguru, P. Detecting Malicious Content on Facebook. Technical Report. Author's version

Dewan, P. A Survey on Identification and Analysis of Poor Quality Content on Facebook. Ph.D. Comprehensive Report. Author's version

Sachdeva, N., and Kumaraguru, P. Privacy4ICTD in India: Exploring Perceptions, Attitudes and Awareness about ICT Use. Technical Report. Author's version

Kumaraguru, P., and Sachdeva, N. Social Media Policy for Policing in India. Technical Report IIITD-CERC-14-002. Author's version

Sachdeva, N., Kumaraguru, P. Online Social Media and Police in India: Behavior, Perceptions, Challenges. Technical Report IIITD-CERC-14-001. Author's version

Mittal, S., Gupta, N., Dewan, P., and Kumaraguru, P. The Pin-Bang Theory: Discovering the Pinterest World. Technical Report arXiv:1307.4952v1. Author's version

Dewan, P., Gupta, M., Goyal, K., and Kumaraguru, P. MultiOSN: Monitoring Multiple Online Social Networks During Real-World Events. Technical report, Precog-TR-13-001, Precog@IIIT-D, 2013. Author's version | BibTex

Gupta, A. A survey on Analyzing and Measuring Trustworthiness of User-Generated Content on Twitter during High-Impact Events. Ph.D. Comprehensive Report. Author's version

Jain, P. Entity Resolution Techniques. Ph.D. Comprehensive Report. Author's version

Jain, P., and Kumaraguru, P. Finding Nemo: Searching and Resolving Identities of Users Across Online Social Networks. Technical report, Precog@IIIT-Delhi, 2012. Author's version | BibTex

Kumaraguru, P., and Sachdeva, N. Privacy in India: Attitudes and Awareness V 2.0. Tech. rep., Precog-TR-12-001, Precog@IIIT-Delhi, 2012. http://precog.iiitd.edu.in/research/privacyindia/. Author's version | BibTex

Panjwani, S., Ghosh, M., Kumaraguru, P. and Singh, S.V., Securing the Uncharted Territory: Transaction Receipts in Branchless Banking, IIITD-TR-2012-008, July 2012. Author's version | BibTex

Yadav, K., Malhotra, A., Kumaraguru, P., Khurana, R., and Singh, D.K. Take Control Over your SMSes: A Real-World Evaluation of a Mobile-based SpamSMS Filtering System, IIITD-TR-2012-007, July 2012. Author's version | BibTex

Dewan, P., Gupta, M., and Kumaraguru, P. ChaMAILeon: Simplified Email Sharing Like Never Before, IIITD-TR-2012-003, March 2012. Author's version | BibTex

Gupta, A., and Kumaraguru, P. Twitter Explodes with Activity in Mumbai Blasts! A Lifeline or an Unmonitored Daemon in the Lurking? IIITD-TR-2011-005, August 2011. Author's version | BibTex

Kumaraguru, P., and Cranor, L. F. Privacy indexes : a survey of Westin's studies. 2005. http://repository.cmu.edu/isr/856/. Author's version | BibTex

Egelman, S., and Kumaraguru, P. DIMACS Workshop and Working Group Meeting on Usable Privacy and Security, DIMACS Center - Rutgers University, July 7 - 9 2004

  1. Riots in Muzaffarnagar (Uttar Pradesh), India. September, 2013.
  2. Blasts in Patna during Narendra Modi's rally, (Bihar) India, October 2013.