Enrico Mariconti
Cited by
Cited by
Mamadroid: Detecting android malware by building markov chains of behavioral models
E Mariconti, L Onwuzurike, P Andriotis, E De Cristofaro, G Ross, ...
Network and Distributed Systems Symposium (NDSS) 2017, 2017
What happens after you are pwnd: Understanding the use of leaked webmail credentials in the wild
J Onaolapo, E Mariconti, G Stringhini
Proceedings of the 2016 Internet Measurement Conference, 65-79, 2016
MaMaDroid: Detecting Android malware by building Markov chains of behavioral models (extended version)
L Onwuzurike, E Mariconti, P Andriotis, ED Cristofaro, G Ross, ...
ACM Transactions on Privacy and Security (TOPS) 22 (2), 1-34, 2019
Tiresias: Predicting security events through deep learning
Y Shen, E Mariconti, PA Vervier, G Stringhini
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
" You Know What to Do" Proactive Detection of YouTube Videos Targeted by Coordinated Hate Attacks
E Mariconti, G Suarez-Tangil, J Blackburn, E De Cristofaro, N Kourtellis, ...
Proceedings of the ACM on Human-Computer Interaction 3 (CSCW), 1-21, 2019
A family of droids-Android malware detection via behavioral modeling: Static vs dynamic analysis
L Onwuzurike, M Almeida, E Mariconti, J Blackburn, G Stringhini, ...
2018 16th Annual Conference on Privacy, Security and Trust (PST), 1-10, 2018
Ex-ray: Detection of history-leaking browser extensions
M Weissbacher, E Mariconti, G Suarez-Tangil, G Stringhini, W Robertson, ...
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
What's in a Name? Understanding Profile Name Reuse on Twitter
E Mariconti, J Onaolapo, SS Ahmad, N Nikiforou, M Egele, N Nikiforakis, ...
Proceedings of the 26th International Conference on World Wide Web, 1161-1170, 2017
Statistical fingerprint‐based intrusion detection system (SF‐IDS)
L Boero, M Cello, M Marchese, E Mariconti, T Naqash, S Zappatore
International Journal of Communication Systems 30 (10), e3225, 2017
What's your major threat? On the differences between the network behavior of targeted and commodity malware
E Mariconti, J Onaolapo, G Ross, G Stringhini
2016 11th International Conference on Availability, Reliability and Security …, 2016
Why allowing profile name reuse is a bad idea
E Mariconti, J Onaolapo, SS Ahmad, N Nikiforou, M Egele, N Nikiforakis, ...
Proceedings of the 9th European Workshop on System Security, 1-6, 2016
Detecting Android Malware by Building Markov Chains of Behavioural Models
E Mariconti, O Lucky, P Andriotis
NDDS'17, 2017
The cause of all evils: Assessing causality between user actions and malware activity
E Mariconti, J Onaolapo, G Ross, G Stringhini
10th {USENIX} Workshop on Cyber Security Experimentation and Test ({CSET} 17), 2017
Harvesting wild honey from webmail beehives
J Onaolapo, E Mariconti, G Stringhini
Engineering Secure Software and Systems (ESSoS), 2016
XSAT of exact linear CNF Classes
BR Schuh
CoRR, 2017
A methodology to assess malware causality in network activities
E Mariconti, J Onaolapo, G Ross, G Stringhini
Engineering Secure Software and Systems (ESSoS) 190, 2016
BOTection: Bot Detection by Building Markov Chain Models of Bots Network Behavior
B Alahmadi, E Mariconti, R Spolaor, G Stringhini, I Martinovic
ACM AsiaCCS 2020, 2020
You Shall Not Pass! Measuring, Predicting, and Detecting Malware Behavior
E Mariconti
UCL (University College London), 2019
Understanding The Use Of Stolen Webmail Credentials In The Wild
J Onaolapo, G Stringhini, E Mariconti
UCL Computer Science, 2016
The system can't perform the operation now. Try again later.
Articles 1–19