Follow
Enrico Mariconti
Title
Cited by
Cited by
Year
Mamadroid: Detecting android malware by building markov chains of behavioral models
E Mariconti, L Onwuzurike, P Andriotis, E De Cristofaro, G Ross, ...
Network and Distributed Systems Symposium (NDSS) 2017, 2017
2702017
Mamadroid: Detecting android malware by building markov chains of behavioral models (extended version)
L Onwuzurike, E Mariconti, P Andriotis, ED Cristofaro, G Ross, ...
ACM Transactions on Privacy and Security (TOPS) 22 (2), 1-34, 2019
1592019
Tiresias: Predicting security events through deep learning
Y Shen, E Mariconti, PA Vervier, G Stringhini
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1002018
What happens after you are pwnd: Understanding the use of leaked webmail credentials in the wild
J Onaolapo, E Mariconti, G Stringhini
Proceedings of the 2016 Internet Measurement Conference, 65-79, 2016
852016
" You Know What to Do" Proactive Detection of YouTube Videos Targeted by Coordinated Hate Attacks
E Mariconti, G Suarez-Tangil, J Blackburn, E De Cristofaro, N Kourtellis, ...
Proceedings of the ACM on Human-Computer Interaction 3 (CSCW), 1-21, 2019
65*2019
A family of droids-Android malware detection via behavioral modeling: Static vs dynamic analysis
L Onwuzurike, M Almeida, E Mariconti, J Blackburn, G Stringhini, ...
2018 16th Annual Conference on Privacy, Security and Trust (PST), 1-10, 2018
45*2018
Ex-ray: Detection of history-leaking browser extensions
M Weissbacher, E Mariconti, G Suarez-Tangil, G Stringhini, W Robertson, ...
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
262017
What's in a Name? Understanding Profile Name Reuse on Twitter
E Mariconti, J Onaolapo, SS Ahmad, N Nikiforou, M Egele, N Nikiforakis, ...
Proceedings of the 26th International Conference on World Wide Web, 1161-1170, 2017
262017
Statistical fingerprint‐based intrusion detection system (SF‐IDS)
L Boero, M Cello, M Marchese, E Mariconti, T Naqash, S Zappatore
International Journal of Communication Systems 30 (10), e3225, 2017
212017
BOTection: Bot Detection by Building Markov Chain Models of Bots Network Behavior
B Alahmadi, E Mariconti, R Spolaor, G Stringhini, I Martinovic
ACM AsiaCCS 2020, 2020
92020
What's your major threat? On the differences between the network behavior of targeted and commodity malware
E Mariconti, J Onaolapo, G Ross, G Stringhini
2016 11th International Conference on Availability, Reliability and Security …, 2016
72016
Why allowing profile name reuse is a bad idea
E Mariconti, J Onaolapo, SS Ahmad, N Nikiforou, M Egele, N Nikiforakis, ...
Proceedings of the 9th European Workshop on System Security, 1-6, 2016
62016
The cause of all evils: Assessing causality between user actions and malware activity
E Mariconti, J Onaolapo, G Ross, G Stringhini
10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 17), 2017
52017
Crystal ball: From innovative attacks to attack effectiveness classifier
H Berger, C Hajaj, E Mariconti, A Dvir
IEEE Access 10, 1317-1333, 2021
42021
Harvesting wild honey from webmail beehives
J Onaolapo, E Mariconti, G Stringhini
Engineering Secure Software and Systems (ESSoS), 2016
22016
MaMaDroid2. 0--The Holes of Control Flow Graphs
H Berger, C Hajaj, E Mariconti, A Dvir
arXiv preprint arXiv:2202.13922, 2022
12022
A methodology to assess malware causality in network activities
E Mariconti, J Onaolapo, G Ross, G Stringhini
Engineering Secure Software and Systems (ESSoS) 190, 2016
12016
The Ethics of Going Deep: Challenges in Machine Learning for Sensitive Security Domains
A Eusebi, M Vasek, E Cockbain, E Mariconti
2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2022
2022
You Shall Not Pass! Measuring, Predicting, and Detecting Malware Behavior
E Mariconti
UCL (University College London), 2019
2019
Understanding The Use Of Stolen Webmail Credentials In The Wild
J Onaolapo, G Stringhini, E Mariconti
UCL Computer Science, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–20