Suivre
Enrico Mariconti
Enrico Mariconti
Adresse e-mail validée de ucl.ac.uk - Page d'accueil
Titre
Citée par
Citée par
Année
Mamadroid: Detecting android malware by building markov chains of behavioral models
E Mariconti, L Onwuzurike, P Andriotis, E De Cristofaro, G Ross, ...
Network and Distributed Systems Symposium (NDSS) 2017, 2017
3622017
Mamadroid: Detecting android malware by building markov chains of behavioral models (extended version)
L Onwuzurike, E Mariconti, P Andriotis, ED Cristofaro, G Ross, ...
ACM Transactions on Privacy and Security (TOPS) 22 (2), 1-34, 2019
2722019
Tiresias: Predicting security events through deep learning
Y Shen, E Mariconti, PA Vervier, G Stringhini
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1862018
What happens after you are pwnd: Understanding the use of leaked webmail credentials in the wild
J Onaolapo, E Mariconti, G Stringhini
Proceedings of the 2016 Internet Measurement Conference, 65-79, 2016
1052016
" You Know What to Do" Proactive Detection of YouTube Videos Targeted by Coordinated Hate Attacks
E Mariconti, G Suarez-Tangil, J Blackburn, E De Cristofaro, N Kourtellis, ...
Proceedings of the ACM on Human-Computer Interaction 3 (CSCW), 1-21, 2019
822019
A family of droids-android malware detection via behavioral modeling: Static vs dynamic analysis
L Onwuzurike, M Almeida, E Mariconti, J Blackburn, G Stringhini, ...
2018 16th Annual Conference on Privacy, Security and Trust (PST), 1-10, 2018
63*2018
What's in a Name? Understanding Profile Name Reuse on Twitter
E Mariconti, J Onaolapo, SS Ahmad, N Nikiforou, M Egele, N Nikiforakis, ...
Proceedings of the 26th International Conference on World Wide Web, 1161-1170, 2017
372017
Ex-ray: Detection of history-leaking browser extensions
M Weissbacher, E Mariconti, G Suarez-Tangil, G Stringhini, W Robertson, ...
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
362017
Statistical fingerprint‐based intrusion detection system (SF‐IDS)
L Boero, M Cello, M Marchese, E Mariconti, T Naqash, S Zappatore
International Journal of Communication Systems 30 (10), e3225, 2017
292017
BOTection: Bot Detection by Building Markov Chain Models of Bots Network Behavior
B Alahmadi, E Mariconti, R Spolaor, G Stringhini, I Martinovic
ACM AsiaCCS 2020, 2020
192020
Cerberus: exploring federated prediction of security events
M Naseri, Y Han, E Mariconti, Y Shen, G Stringhini, E De Cristofaro
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
92022
Why allowing profile name reuse is a bad idea
E Mariconti, J Onaolapo, SS Ahmad, N Nikiforou, M Egele, N Nikiforakis, ...
Proceedings of the 9th European Workshop on System Security, 1-6, 2016
82016
The cause of all evils: Assessing causality between user actions and malware activity
E Mariconti, J Onaolapo, G Ross, G Stringhini
10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 17), 2017
72017
What's your major threat? On the differences between the network behavior of targeted and commodity malware
E Mariconti, J Onaolapo, G Ross, G Stringhini
2016 11th International Conference on Availability, Reliability and Security …, 2016
72016
Short Paper: DeFi Deception—Uncovering the Prevalence of Rugpulls in Cryptocurrency Projects
S Agarwal, G Atondo-Siu, M Ordekian, A Hutchings, E Mariconti, M Vasek
International Conference on Financial Cryptography and Data Security, 363-372, 2023
52023
Crystal ball: From innovative attacks to attack effectiveness classifier
H Berger, C Hajaj, E Mariconti, A Dvir
IEEE Access 10, 1317-1333, 2021
52021
A systematic literature review of the use of computational text analysis methods in intimate partner violence research
L Neubauer, I Straw, E Mariconti, LM Tanczer
Journal of family violence 38 (6), 1205-1224, 2023
32023
The Ethics of Going Deep: Challenges in Machine Learning for Sensitive Security Domains
A Eusebi, M Vasek, E Cockbain, E Mariconti
2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2022
32022
Understanding and preventing the advertisement and sale of illicit drugs to young people through social media: A multidisciplinary scoping review
A Fuller, M Vasek, E Mariconti, SD Johnson
Drug and Alcohol Review 43 (1), 56-74, 2024
22024
Waiting for Q: An Exploration of QAnon Users' Online Migration to Poal in the Wake of Voat's Demise
A Papasavva, E Mariconti
arXiv preprint arXiv:2302.01397, 2023
22023
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20