Follow
Jeremiah Onaolapo
Title
Cited by
Cited by
Year
Kek, cucks, and god emperor trump: A measurement study of 4chan’s politically incorrect forum and its effects on the web
G Hine, J Onaolapo, E De Cristofaro, N Kourtellis, I Leontiadis, ...
Proceedings of the International AAAI Conference on Web and Social Media 11 …, 2017
3522017
What Happens After You Are Pwnd: Understanding The Use Of Leaked Webmail Credentials In The Wild
J Onaolapo, E Mariconti, G Stringhini
ACM SIGCOMM Internet Measurement Conference 2016, 2016
1172016
All your cards are belong to us: Understanding online carding forums
A Haslebacher, J Onaolapo, G Stringhini
2017 APWG Symposium on Electronic Crime Research (eCrime), 41-51, 2017
482017
What's in a Name?: Understanding Profile Name Reuse on Twitter
E Mariconti, J Onaolapo, SS Ahmad, N Nikiforou, M Egele, N Nikiforakis, ...
Proceedings of the 26th International Conference on World Wide Web, 1161-1170, 2017
432017
Honey Sheets: What Happens To Leaked Google Spreadsheets?
M Lazarov, J Onaolapo, G Stringhini
USENIX Workshop on Cyber Security Experimentation and Test (CSET), 2016
402016
Under and over the surface: a comparison of the use of leaked account credentials in the Dark and Surface Web
DAB Villalva, J Onaolapo, G Stringhini, M Musolesi
Crime Science 7 (1), 17, 2018
202018
Flipping 419 Cybercrime Scams: Targeting the Weak and the Vulnerable
G Mba, J Onaolapo, G Stringhini, L Cavallaro
Proceedings of the 26th International Conference on World Wide Web Companion …, 2017
192017
Limits of individual consent and models of distributed consent in online social networks
JL Lovato, A Allard, R Harp, J Onaolapo, L Hébert-Dufresne
Proceedings of the 2022 ACM Conference on Fairness, Accountability, and …, 2022
142022
SocialHEISTing: Understanding Stolen Facebook Accounts
J Onaolapo, N Leontiadis, D Magka, G Stringhini
30th USENIX Security Symposium (USENIX Security 21), 2021
132021
Why allowing profile name reuse is a bad idea
E Mariconti, J Onaolapo, SS Ahmad, N Nikiforou, M Egele, N Nikiforakis, ...
Proceedings of the 9th European Workshop on System Security, 1-6, 2016
102016
The cause of all evils: Assessing causality between user actions and malware activity
E Mariconti, J Onaolapo, G Ross, G Stringhini
10th {USENIX} Workshop on Cyber Security Experimentation and Test ({CSET} 17), 2017
72017
What's your major threat? On the differences between the network behavior of targeted and commodity malware
E Mariconti, J Onaolapo, G Ross, G Stringhini
2016 11th International Conference on Availability, Reliability and Security …, 2016
72016
Diverse misinformation: impacts of human biases on detection of deepfakes on networks
J Lovato, J St-Onge, R Harp, G Salazar Lopez, SP Rogers, IU Haq, ...
npj Complexity 1 (1), 5, 2024
52024
BABELTOWER: How Language Affects Criminal Activity in Stolen Webmail Accounts
E Bernard-Jones, J Onaolapo, G Stringhini
The Third Workshop on Computational Methods in CyberSafety, Online …, 2018
5*2018
Master of sheets: a tale of compromised cloud documents
J Onaolapo, M Lazarov, G Stringhini
2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2019
42019
Game of FAME: Automatic Detection of FAke MEmes
B Jabiyev, J Onaolapo, G Stringhini, E Kirda
4*
Harvesting wild honey from webmail beehives
J Onaolapo, E Mariconti, G Stringhini
Engineering Secure Software and Systems (ESSoS), 2016
22016
Developing a hierarchical model for unraveling conspiracy theories
M Ghasemizade, J Onaolapo
EPJ Data Science 13 (1), 31, 2024
12024
A Methodology To Assess Malware Causality In Network Activities
E Mariconti, J Onaolapo, G Ross, G Stringhini
Engineering Secure Software and Systems (ESSoS) 190, 2016
12016
Stick It to The Man: Correcting for Non-Cooperative Behavior of Subjects in Experiments on Social Networks
K Clary, E Tosch, J Onaolapo, DD Jensen
1*
The system can't perform the operation now. Try again later.
Articles 1–20