Follow
Enrico Mariconti
Title
Cited by
Cited by
Year
Mamadroid: Detecting android malware by building markov chains of behavioral models
E Mariconti, L Onwuzurike, P Andriotis, E De Cristofaro, G Ross, ...
Network and Distributed Systems Symposium (NDSS) 2017, 2017
3982017
Mamadroid: Detecting android malware by building markov chains of behavioral models (extended version)
L Onwuzurike, E Mariconti, P Andriotis, ED Cristofaro, G Ross, ...
ACM Transactions on Privacy and Security (TOPS) 22 (2), 1-34, 2019
3282019
Tiresias: Predicting security events through deep learning
Y Shen, E Mariconti, PA Vervier, G Stringhini
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
2252018
What happens after you are pwnd: Understanding the use of leaked webmail credentials in the wild
J Onaolapo, E Mariconti, G Stringhini
Proceedings of the 2016 Internet Measurement Conference, 65-79, 2016
1202016
" You Know What to Do" Proactive Detection of YouTube Videos Targeted by Coordinated Hate Attacks
E Mariconti, G Suarez-Tangil, J Blackburn, E De Cristofaro, N Kourtellis, ...
Proceedings of the ACM on Human-Computer Interaction 3 (CSCW), 1-21, 2019
952019
A family of droids-android malware detection via behavioral modeling: Static vs dynamic analysis
L Onwuzurike, M Almeida, E Mariconti, J Blackburn, G Stringhini, ...
2018 16th Annual Conference on Privacy, Security and Trust (PST), 1-10, 2018
68*2018
What's in a name? understanding profile name reuse on twitter
E Mariconti, J Onaolapo, SS Ahmad, N Nikiforou, M Egele, N Nikiforakis, ...
Proceedings of the 26th International Conference on World Wide Web, 1161-1170, 2017
432017
Ex-ray: Detection of history-leaking browser extensions
M Weissbacher, E Mariconti, G Suarez-Tangil, G Stringhini, W Robertson, ...
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
402017
Statistical fingerprint‐based intrusion detection system (SF‐IDS)
L Boero, M Cello, M Marchese, E Mariconti, T Naqash, S Zappatore
International Journal of Communication Systems 30 (10), e3225, 2017
312017
BOTection: Bot Detection by Building Markov Chain Models of Bots Network Behavior
B Alahmadi, E Mariconti, R Spolaor, G Stringhini, I Martinovic
ACM AsiaCCS 2020, 2020
252020
Cerberus: exploring federated prediction of security events
M Naseri, Y Han, E Mariconti, Y Shen, G Stringhini, E De Cristofaro
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
122022
Why allowing profile name reuse is a bad idea
E Mariconti, J Onaolapo, SS Ahmad, N Nikiforou, M Egele, N Nikiforakis, ...
Proceedings of the 9th European Workshop on System Security, 1-6, 2016
102016
Short Paper: DeFi Deception—Uncovering the Prevalence of Rugpulls in Cryptocurrency Projects
S Agarwal, G Atondo-Siu, M Ordekian, A Hutchings, E Mariconti, M Vasek
International Conference on Financial Cryptography and Data Security, 363-372, 2023
9*2023
Crystal ball: From innovative attacks to attack effectiveness classifier
H Berger, C Hajaj, E Mariconti, A Dvir
IEEE Access 10, 1317-1333, 2021
92021
Understanding and preventing the advertisement and sale of illicit drugs to young people through social media: A multidisciplinary scoping review
A Fuller, M Vasek, E Mariconti, SD Johnson
Drug and Alcohol Review 43 (1), 56-74, 2024
72024
A systematic literature review of the use of computational text analysis methods in Intimate Partner Violence research
L Neubauer, I Straw, E Mariconti, LM Tanczer
Journal of family violence 38 (6), 1205-1224, 2023
72023
The cause of all evils: Assessing causality between user actions and malware activity
E Mariconti, J Onaolapo, G Ross, G Stringhini
10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 17), 2017
72017
What's your major threat? On the differences between the network behavior of targeted and commodity malware
E Mariconti, J Onaolapo, G Ross, G Stringhini
2016 11th International Conference on Availability, Reliability and Security …, 2016
72016
Breaking the structure of MaMaDroid
H Berger, A Dvir, E Mariconti, C Hajaj
Expert Systems with Applications 228, 120429, 2023
5*2023
The Ethics of Going Deep: Challenges in Machine Learning for Sensitive Security Domains
A Eusebi, M Vasek, E Cockbain, E Mariconti
2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2022
42022
The system can't perform the operation now. Try again later.
Articles 1–20