Gianluca Stringhini
Gianluca Stringhini
Assistant Professor at Boston University
Verified email at bu.edu - Homepage
TitleCited byYear
Detecting spammers on social networks
G Stringhini, C Kruegel, G Vigna
Proceedings of the 26th Annual Computer Security Applications Conference, 1-9, 2010
7462010
COMPA: Detecting Compromised Accounts on Social Networks
M Egele, G Stringhini, C Kruegel, G Vigna
Network & Distributed System Security Symposium (NDSS), 2013
2552013
The Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns.
B Stone-Gross, T Holz, G Stringhini, G Vigna
LEET 11, 4-4, 2011
1822011
Follow the Green: Growth and Dynamics in Twitter Follower Markets
G Stringhini, G Wang, M Egele, C Kruegel, G Vigna, H Zheng, BY Zhao
ACM SIGCOMM Internet Measurement Conference (IMC), 2013
1572013
Mean Birds: Detecting Aggression and Bullying on Twitter
D Chatzakou, N Kourtellis, J Blackburn, E De Cristofaro, G Stringhini, ...
International ACM Web Science Conference (WebSci), 2017
1202017
MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models
E Mariconti, L Onwuzurike, P Andriotis, E De Cristofaro, G Ross, ...
Network and Distributed Systems Security Symposium (NDSS), 2017
1182017
Shady Paths: Leveraging Surfing Crowds to Detect Malicious Web Pages
G Stringhini, C Kruegel, G Vigna
ACM Conference on Computer and Communications Security (CCS), 2013
1112013
Kek, Cucks, and God Emperor Trump: A Measurement Study of 4chan's Politically Incorrect Forum and Its Effects on the Web
GE Hine, J Onaolapo, E De Cristofaro, N Kourtellis, I Leontiadis, ...
AAAI International Conference on Web and Social Media (ICWSM), 2017
972017
The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements
A Zarras, A Kapravelos, G Stringhini, T Holz, C Kruegel, G Vigna
ACM SIGCOMM Internet Measurement Conference (IMC), 2014
962014
PayBreak: Defense Against Cryptographic Ransomware
E Kolodenker, W Koch, G Stringhini, M Egele
ACM Asia Conference on Computer and Communications Security (ASIACCS), 2017
862017
Poultry Markets: On the Underground Economy of Twitter Followers
G Stringhini, M Egele, C Kruegel, G Vigna
Workshop on Online Social Networks (WOSN), 2012
812012
Towards detecting compromised accounts on social networks
M Egele, G Stringhini, C Kruegel, G Vigna
IEEE Transactions on Dependable and Secure Computing (TDSC), 2017
762017
BOTMAGNIFIER: Locating Spambots on the Internet
G Stringhini, T Holz, B Stone-Gross, C Kruegel, G Vigna
USENIX Security Symposium, 2011
582011
EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services.
G Stringhini, P Mourlanne, G Jacob, M Egele, C Kruegel, G Vigna
Usenix Security Symposium, 2015
522015
The Web Centipede: Understanding How Web Communities Influence Each Other Through the Lens of Mainstream and Alternative News Sources
S Zannettou, T Caulfield, E De Cristofaro, N Kourtellis, I Leontiadis, ...
ACM SIGCOMM Internet Measurement Conference (IMC), 2017
502017
Two Years of Short URLs Internet Measurement: Security Threats and Countermeasures
F Maggi, A Frossi, S Zanero, G Stringhini, B Stone-Gross, C Kruegel, ...
International World Wide Web Conference (WWW), 2013
482013
What Happens after you are Pwnd: Understanding the Use of Leaked Webmail Credentials in the Wild
J Onaolapo, E Mariconti, G Stringhini
ACM SIGCOMM Internet Measurement Conference (IMC) 2016, 2016
472016
Hit’em Where it Hurts: A Live Security Exercise on Cyber Situational Awareness
A Doupé, M Egele, B Caillat, G Stringhini, G Yakin, A Zand, L Cavedon, ...
Annual Computer Security Applications Conference (ACSAC), 2011
462011
What is Gab? A Bastion of Free Speech or an Alt-Right Echo Chamber?
S Zannettou, B Bradlyn, E De Cristofaro, M Sirivianos, G Stringhini, ...
Workshop on Computational Methods in CyberSafety, Online Harassment and …, 2018
422018
Targeted Attacks against Industrial Control Systems: Is the Power Industry Prepared?
MB Line, A Zand, G Stringhini, R Kemmerer
Smart Energy Grid Security Workshop (SEGS), 2014
412014
The system can't perform the operation now. Try again later.
Articles 1–20