Follow
Enrico Mariconti
Title
Cited by
Cited by
Year
Mamadroid: Detecting android malware by building markov chains of behavioral models
E Mariconti, L Onwuzurike, P Andriotis, E De Cristofaro, G Ross, ...
Network and Distributed Systems Symposium (NDSS) 2017, 2017
3622017
Mamadroid: Detecting android malware by building markov chains of behavioral models (extended version)
L Onwuzurike, E Mariconti, P Andriotis, ED Cristofaro, G Ross, ...
ACM Transactions on Privacy and Security (TOPS) 22 (2), 1-34, 2019
2722019
Tiresias: Predicting security events through deep learning
Y Shen, E Mariconti, PA Vervier, G Stringhini
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1832018
What happens after you are pwnd: Understanding the use of leaked webmail credentials in the wild
J Onaolapo, E Mariconti, G Stringhini
Proceedings of the 2016 Internet Measurement Conference, 65-79, 2016
1032016
" You Know What to Do" Proactive Detection of YouTube Videos Targeted by Coordinated Hate Attacks
E Mariconti, G Suarez-Tangil, J Blackburn, E De Cristofaro, N Kourtellis, ...
Proceedings of the ACM on Human-Computer Interaction 3 (CSCW), 1-21, 2019
802019
A family of droids-android malware detection via behavioral modeling: Static vs dynamic analysis
L Onwuzurike, M Almeida, E Mariconti, J Blackburn, G Stringhini, ...
2018 16th Annual Conference on Privacy, Security and Trust (PST), 1-10, 2018
63*2018
Ex-ray: Detection of history-leaking browser extensions
M Weissbacher, E Mariconti, G Suarez-Tangil, G Stringhini, W Robertson, ...
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
362017
What's in a Name? Understanding Profile Name Reuse on Twitter
E Mariconti, J Onaolapo, SS Ahmad, N Nikiforou, M Egele, N Nikiforakis, ...
Proceedings of the 26th International Conference on World Wide Web, 1161-1170, 2017
352017
Statistical fingerprint‐based intrusion detection system (SF‐IDS)
L Boero, M Cello, M Marchese, E Mariconti, T Naqash, S Zappatore
International Journal of Communication Systems 30 (10), e3225, 2017
292017
BOTection: Bot Detection by Building Markov Chain Models of Bots Network Behavior
B Alahmadi, E Mariconti, R Spolaor, G Stringhini, I Martinovic
ACM AsiaCCS 2020, 2020
162020
Why allowing profile name reuse is a bad idea
E Mariconti, J Onaolapo, SS Ahmad, N Nikiforou, M Egele, N Nikiforakis, ...
Proceedings of the 9th European Workshop on System Security, 1-6, 2016
82016
Cerberus: exploring federated prediction of security events
M Naseri, Y Han, E Mariconti, Y Shen, G Stringhini, E De Cristofaro
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
72022
What's your major threat? On the differences between the network behavior of targeted and commodity malware
E Mariconti, J Onaolapo, G Ross, G Stringhini
2016 11th International Conference on Availability, Reliability and Security …, 2016
72016
The cause of all evils: Assessing causality between user actions and malware activity
E Mariconti, J Onaolapo, G Ross, G Stringhini
10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 17), 2017
62017
Crystal ball: From innovative attacks to attack effectiveness classifier
H Berger, C Hajaj, E Mariconti, A Dvir
IEEE Access 10, 1317-1333, 2021
52021
Short Paper: DeFi Deception–Uncovering the prevalence of rugpulls in cryptocurrency projects
S Agarwal, G Atondo-Siu, M Ordekian, A Hutchings, E Mariconti, M Vasek
Stichting Financial Cryptography/International Financial Cryptography …, 2023
42023
A Systematic Literature Review of the Use of Computational Text Analysis Methods in Intimate Partner Violence Research
L Neubauer, I Straw, E Mariconti, LM Tanczer
Journal of Family Violence, 1-20, 2023
32023
The Ethics of Going Deep: Challenges in Machine Learning for Sensitive Security Domains
A Eusebi, M Vasek, E Cockbain, E Mariconti
2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2022
32022
Understanding and preventing the advertisement and sale of illicit drugs to young people through social media: A multidisciplinary scoping review
A Fuller, M Vasek, E Mariconti, SD Johnson
Drug and Alcohol Review 43 (1), 56-74, 2024
22024
Harvesting wild honey from webmail beehives
J Onaolapo, E Mariconti, G Stringhini
Engineering Secure Software and Systems (ESSoS), 2016
22016
The system can't perform the operation now. Try again later.
Articles 1–20