Follow
Jeremiah Onaolapo
Title
Cited by
Cited by
Year
Kek, cucks, and god emperor trump: A measurement study of 4chan’s politically incorrect forum and its effects on the web
GE Hine, J Onaolapo, E De Cristofaro, N Kourtellis, I Leontiadis, ...
Eleventh International AAAI Conference on Web and Social Media, 2017
2472017
What Happens After You Are Pwnd: Understanding The Use Of Leaked Webmail Credentials In The Wild
J Onaolapo, E Mariconti, G Stringhini
ACM SIGCOMM Internet Measurement Conference 2016, 2016
852016
All your cards are belong to us: Understanding online carding forums
A Haslebacher, J Onaolapo, G Stringhini
2017 APWG Symposium on Electronic Crime Research (eCrime), 41-51, 2017
342017
Honey Sheets: What Happens To Leaked Google Spreadsheets?
M Lazarov, J Onaolapo, G Stringhini
USENIX Workshop on Cyber Security Experimentation and Test (CSET), 2016
312016
What's in a Name?: Understanding Profile Name Reuse on Twitter
E Mariconti, J Onaolapo, SS Ahmad, N Nikiforou, M Egele, N Nikiforakis, ...
Proceedings of the 26th International Conference on World Wide Web, 1161-1170, 2017
262017
Flipping 419 Cybercrime Scams: Targeting the Weak and the Vulnerable
G Mba, J Onaolapo, G Stringhini, L Cavallaro
Proceedings of the 26th International Conference on World Wide Web Companion …, 2017
102017
Under and over the surface: a comparison of the use of leaked account credentials in the Dark and Surface Web
DAB Villalva, J Onaolapo, G Stringhini, M Musolesi
Crime Science 7 (1), 17, 2018
82018
What's your major threat? On the differences between the network behavior of targeted and commodity malware
E Mariconti, J Onaolapo, G Ross, G Stringhini
2016 11th International Conference on Availability, Reliability and Security …, 2016
72016
Why allowing profile name reuse is a bad idea
E Mariconti, J Onaolapo, SS Ahmad, N Nikiforou, M Egele, N Nikiforakis, ...
Proceedings of the 9th European Workshop on System Security, 1-6, 2016
62016
The cause of all evils: Assessing causality between user actions and malware activity
E Mariconti, J Onaolapo, G Ross, G Stringhini
10th {USENIX} Workshop on Cyber Security Experimentation and Test ({CSET} 17), 2017
52017
SocialHEISTing: Understanding Stolen Facebook Accounts
J Onaolapo, N Leontiadis, D Magka, G Stringhini
30th USENIX Security Symposium (USENIX Security 21), 2021
32021
BABELTOWER: How Language Affects Criminal Activity in Stolen Webmail Accounts
E Bernard-Jones, J Onaolapo, G Stringhini
The Third Workshop on Computational Methods in CyberSafety, Online …, 2018
3*2018
Master of sheets: a tale of compromised cloud documents
J Onaolapo, M Lazarov, G Stringhini
2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2019
22019
Harvesting wild honey from webmail beehives
J Onaolapo, E Mariconti, G Stringhini
Engineering Secure Software and Systems (ESSoS), 2016
22016
A Methodology To Assess Malware Causality In Network Activities
E Mariconti, J Onaolapo, G Ross, G Stringhini
Engineering Secure Software and Systems (ESSoS) 190, 2016
12016
Limits of individual consent and models of distributed consent in online social networks
JL Lovato, A Allard, R Harp, J Onaolapo, L Hébert-Dufresne
2022 ACM Conference on Fairness, Accountability, and Transparency, 2251-2262, 2022
2022
Honeypot boulevard: understanding malicious activity via decoy accounts
JO Onaolapo
UCL (University College London), 2019
2019
Hives and Honeypots: Understanding Malicious Activity In Online Accounts
J Onaolapo
Cranfield Online Research Data (CORD), 2017
2017
Proceedings of EIE's 2nd International Conference on Computing, Energy, Networking, Robotics and Telecommunications
SN John, C Ndujiuba, F Ibikunle, JO Onaolapo
Covenant University, 2012
2012
Stick It to The Man: Correcting for Non-Cooperative Behavior of Subjects in Experiments on Social Networks
K Clary, E Tosch, J Onaolapo, DD Jensen
The system can't perform the operation now. Try again later.
Articles 1–20