Mamadroid: Detecting android malware by building markov chains of behavioral models E Mariconti, L Onwuzurike, P Andriotis, E De Cristofaro, G Ross, ... Network and Distributed Systems Symposium (NDSS) 2017, 2017 | 377 | 2017 |
Mamadroid: Detecting android malware by building markov chains of behavioral models (extended version) L Onwuzurike, E Mariconti, P Andriotis, ED Cristofaro, G Ross, ... ACM Transactions on Privacy and Security (TOPS) 22 (2), 1-34, 2019 | 299 | 2019 |
Tiresias: Predicting security events through deep learning Y Shen, E Mariconti, PA Vervier, G Stringhini Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 196 | 2018 |
What happens after you are pwnd: Understanding the use of leaked webmail credentials in the wild J Onaolapo, E Mariconti, G Stringhini Proceedings of the 2016 Internet Measurement Conference, 65-79, 2016 | 113 | 2016 |
" You Know What to Do" Proactive Detection of YouTube Videos Targeted by Coordinated Hate Attacks E Mariconti, G Suarez-Tangil, J Blackburn, E De Cristofaro, N Kourtellis, ... Proceedings of the ACM on Human-Computer Interaction 3 (CSCW), 1-21, 2019 | 85 | 2019 |
A family of droids-android malware detection via behavioral modeling: Static vs dynamic analysis L Onwuzurike, M Almeida, E Mariconti, J Blackburn, G Stringhini, ... 2018 16th Annual Conference on Privacy, Security and Trust (PST), 1-10, 2018 | 67* | 2018 |
What's in a name? understanding profile name reuse on twitter E Mariconti, J Onaolapo, SS Ahmad, N Nikiforou, M Egele, N Nikiforakis, ... Proceedings of the 26th International Conference on World Wide Web, 1161-1170, 2017 | 43 | 2017 |
Ex-ray: Detection of history-leaking browser extensions M Weissbacher, E Mariconti, G Suarez-Tangil, G Stringhini, W Robertson, ... Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017 | 40 | 2017 |
Statistical fingerprint‐based intrusion detection system (SF‐IDS) L Boero, M Cello, M Marchese, E Mariconti, T Naqash, S Zappatore International Journal of Communication Systems 30 (10), e3225, 2017 | 29 | 2017 |
BOTection: Bot Detection by Building Markov Chain Models of Bots Network Behavior B Alahmadi, E Mariconti, R Spolaor, G Stringhini, I Martinovic ACM AsiaCCS 2020, 2020 | 21 | 2020 |
Cerberus: exploring federated prediction of security events M Naseri, Y Han, E Mariconti, Y Shen, G Stringhini, E De Cristofaro Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 10 | 2022 |
Why allowing profile name reuse is a bad idea E Mariconti, J Onaolapo, SS Ahmad, N Nikiforou, M Egele, N Nikiforakis, ... Proceedings of the 9th European Workshop on System Security, 1-6, 2016 | 10 | 2016 |
The cause of all evils: Assessing causality between user actions and malware activity E Mariconti, J Onaolapo, G Ross, G Stringhini 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 17), 2017 | 7 | 2017 |
What's your major threat? On the differences between the network behavior of targeted and commodity malware E Mariconti, J Onaolapo, G Ross, G Stringhini 2016 11th International Conference on Availability, Reliability and Security …, 2016 | 7 | 2016 |
Crystal ball: From innovative attacks to attack effectiveness classifier H Berger, C Hajaj, E Mariconti, A Dvir IEEE Access 10, 1317-1333, 2021 | 6 | 2021 |
A systematic literature review of the use of computational text analysis methods in Intimate Partner Violence research L Neubauer, I Straw, E Mariconti, LM Tanczer Journal of family violence 38 (6), 1205-1224, 2023 | 5 | 2023 |
Short Paper: DeFi Deception—Uncovering the Prevalence of Rugpulls in Cryptocurrency Projects S Agarwal, G Atondo-Siu, M Ordekian, A Hutchings, E Mariconti, M Vasek International Conference on Financial Cryptography and Data Security, 363-372, 2023 | 5 | 2023 |
Waiting for Q: An Exploration of QAnon Users' Online Migration to Poal in the Wake of Voat's Demise A Papasavva, E Mariconti Proceedings of the 16th ACM Web Science Conference, 250-261, 2024 | 3 | 2024 |
Understanding and preventing the advertisement and sale of illicit drugs to young people through social media: A multidisciplinary scoping review A Fuller, M Vasek, E Mariconti, SD Johnson Drug and Alcohol Review 43 (1), 56-74, 2024 | 3 | 2024 |
The Ethics of Going Deep: Challenges in Machine Learning for Sensitive Security Domains A Eusebi, M Vasek, E Cockbain, E Mariconti 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2022 | 3 | 2022 |