Jeremiah Onaolapo
Jeremiah Onaolapo
Verified email at ccs.neu.edu - Homepage
Title
Cited by
Cited by
Year
Kek, Cucks, and God Emperor Trump: A Measurement Study of 4chan’s Politically Incorrect Forum and Its Effects on the Web
G Hine, J Onaolapo, E De Cristofaro, N Kourtellis, I Leontiadis, ...
International Conference on Web and Social Media (ICWSM), 2017
1072017
What Happens After You Are Pwnd: Understanding The Use Of Leaked Webmail Credentials In The Wild
J Onaolapo, E Mariconti, G Stringhini
ACM SIGCOMM Internet Measurement Conference 2016, 2016
552016
Honey Sheets: What Happens To Leaked Google Spreadsheets?
M Lazarov, J Onaolapo, G Stringhini
USENIX Workshop on Cyber Security Experimentation and Test (CSET), 2016
232016
All your cards are belong to us: Understanding online carding forums
A Haslebacher, J Onaolapo, G Stringhini
2017 APWG Symposium on Electronic Crime Research (eCrime), 41-51, 2017
172017
What's in a Name?: Understanding Profile Name Reuse on Twitter
E Mariconti, J Onaolapo, SS Ahmad, N Nikiforou, M Egele, N Nikiforakis, ...
Proceedings of the 26th International Conference on World Wide Web, 1161-1170, 2017
132017
What's your major threat? On the differences between the network behavior of targeted and commodity malware
E Mariconti, J Onaolapo, G Ross, G Stringhini
2016 11th International Conference on Availability, Reliability and Security …, 2016
62016
Why allowing profile name reuse is a bad idea
E Mariconti, J Onaolapo, SS Ahmad, N Nikiforou, M Egele, N Nikiforakis, ...
Proceedings of the 9th European Workshop on System Security, 1-6, 2016
62016
Flipping 419 Cybercrime Scams: Targeting the Weak and the Vulnerable
G Mba, J Onaolapo, G Stringhini, L Cavallaro
Proceedings of the 26th International Conference on World Wide Web Companion …, 2017
42017
The cause of all evils: Assessing causality between user actions and malware activity
E Mariconti, J Onaolapo, G Ross, G Stringhini
10th {USENIX} Workshop on Cyber Security Experimentation and Test ({CSET} 17), 2017
42017
BABELTOWER: How Language Affects Criminal Activity in Stolen Webmail Accounts
E Bernard-Jones, J Onaolapo, G Stringhini
The Third Workshop on Computational Methods in CyberSafety, Online …, 2018
3*2018
Under and over the surface: a comparison of the use of leaked account credentials in the Dark and Surface Web
DAB Villalva, J Onaolapo, G Stringhini, M Musolesi
Crime Science 7 (1), 17, 2018
22018
Harvesting wild honey from webmail beehives
J Onaolapo, E Mariconti, G Stringhini
Engineering Secure Software and Systems (ESSoS), 2016
22016
Master of sheets: a tale of compromised cloud documents
J Onaolapo, M Lazarov, G Stringhini
2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2019
12019
A Methodology To Assess Malware Causality In Network Activities
E Mariconti, J Onaolapo, G Ross, G Stringhini
Engineering Secure Software and Systems (ESSoS) 190, 2016
12016
Honeypot boulevard: understanding malicious activity via decoy accounts
JO Onaolapo
UCL (University College London), 2019
2019
Hives and Honeypots: Understanding Malicious Activity In Online Accounts
J Onaolapo
Cranfield Online Research Data (CORD), 2017
2017
Proceedings of EIE's 2nd International Conference on Computing, Energy, Networking, Robotics and Telecommunications
SN John, C Ndujiuba, F Ibikunle, JO Onaolapo
Covenant University, 2012
2012
2017 APWG Symposium on Electronic Crime Research (eCrime)
AR Beresford, AC Bahnsen, A Hutchings, A Haslebacher, A Ruef, ...
The system can't perform the operation now. Try again later.
Articles 1–18