Measuring and Analyzing {Search-Redirection} Attacks in the Illicit Online Prescription Drug Trade N Leontiadis, T Moore, N Christin 20th USENIX Security Symposium (USENIX Security 11), 2011 | 137 | 2011 |
Fashion crimes: trending-term exploitation on the web T Moore, N Leontiadis, N Christin Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 68 | 2011 |
A nearly four-year longitudinal study of search-engine poisoning N Leontiadis, T Moore, N Christin Proceedings of the 21st ACM conference on Computer and Communications …, 2014 | 63 | 2014 |
Pick your poison: pricing and inventories at unlicensed online pharmacies N Leontiadis, T Moore, N Christin Proceedings of the fourteenth ACM conference on Electronic commerce, 621-638, 2013 | 40 | 2013 |
Supply chain management and NFC picking demonstrations using the AspireRfid middleware platform N Kefalakis, N Leontiadis, J Soldatos, K Gama, D Donsez Proceedings of the ACM/IFIP/USENIX Middleware'08 conference companion, 66-69, 2008 | 32 | 2008 |
Middleware building blocks for architecting rfid systems N Kefalakis, N Leontiadis, J Soldatos, D Donsez International Conference on Mobile Lightweight Wireless Systems, 325-336, 2009 | 29 | 2009 |
Scripting the crime commission process in the illicit online prescription drug trade N Leontiadis, A Hutchings Journal of Cybersecurity 1 (1), 81-92, 2015 | 25 | 2015 |
Measuring and mitigating oauth access token abuse by collusion networks S Farooqi, F Zaffar, N Leontiadis, Z Shafiq Proceedings of the 2017 Internet Measurement Conference, 355-368, 2017 | 23 | 2017 |
Malicious Browser Extensions at Scale: Bridging the Observability Gap between Web Site and Browser LF DeKoven, S Savage, GM Voelker, N Leontiadis 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 17), 2017 | 16 | 2017 |
Empirically measuring WHOIS misuse N Leontiadis, N Christin European Symposium on Research in Computer Security, 19-36, 2014 | 10 | 2014 |
Structuring disincentives for online criminals N Leontiadis Carnegie Mellon University, 2014 | 9 | 2014 |
Bridging RFID systems and enterprise applications through virtualized connectors N Leontiadis, N Kefalakis, J Soldatos International Journal of Automated Identification Technology (IJAIT) 1 (2), 1-12, 2010 | 7 | 2010 |
Following their footsteps: Characterizing account automation abuse and defenses LF DeKoven, T Pottinger, S Savage, GM Voelker, N Leontiadis Proceedings of the Internet Measurement Conference 2018, 43-55, 2018 | 6 | 2018 |
A lookup service in an interconnected world of uniquely identified objects E Polytarchos, N Leontiadis, S Eliakis, K Pramatari 2008 IEEE International Conference on Emerging Technologies and Factory …, 2008 | 4 | 2008 |
{SocialHEISTing}: Understanding Stolen Facebook Accounts J Onaolapo, N Leontiadis, D Magka, G Stringhini 30th USENIX Security Symposium (USENIX Security 21), 4115-4132, 2021 | 3 | 2021 |
FP7 Contract: ICT-215417-CP J Soldatos, N Kefalakis, N Leontiadis, N Konstantinou–AIT, N Mitton, ... | | 2011 |
Stick It to The Man: Correcting for Non-Cooperative Behavior of Subjects in Experiments on Social Networks K Clary, E Tosch, J Onaolapo, DD Jensen, B Jabiyev, G Stringhini, ... | | |
Following Their Footsteps LF DeKoven, T Pottinger, S Savage, GM Voelker, N Leontiadis | | |
Secure Network Management Using a Key Distribution Center NN Leontiadis, VP Kemerlis, PA Frangoudis, GC Polyzos | | |