Jeremiah Onaolapo
Title
Cited by
Cited by
Year
Kek, Cucks, and God Emperor Trump: A Measurement Study of 4chan’s Politically Incorrect Forum and Its Effects on the Web
G Hine, J Onaolapo, E De Cristofaro, N Kourtellis, I Leontiadis, ...
International Conference on Web and Social Media (ICWSM), 2017
1422017
What Happens After You Are Pwnd: Understanding The Use Of Leaked Webmail Credentials In The Wild
J Onaolapo, E Mariconti, G Stringhini
ACM SIGCOMM Internet Measurement Conference 2016, 2016
602016
Honey Sheets: What Happens To Leaked Google Spreadsheets?
M Lazarov, J Onaolapo, G Stringhini
USENIX Workshop on Cyber Security Experimentation and Test (CSET), 2016
242016
All your cards are belong to us: Understanding online carding forums
A Haslebacher, J Onaolapo, G Stringhini
2017 APWG Symposium on Electronic Crime Research (eCrime), 41-51, 2017
222017
What's in a Name?: Understanding Profile Name Reuse on Twitter
E Mariconti, J Onaolapo, SS Ahmad, N Nikiforou, M Egele, N Nikiforakis, ...
Proceedings of the 26th International Conference on World Wide Web, 1161-1170, 2017
142017
Flipping 419 Cybercrime Scams: Targeting the Weak and the Vulnerable
G Mba, J Onaolapo, G Stringhini, L Cavallaro
Proceedings of the 26th International Conference on World Wide Web Companion …, 2017
72017
What's your major threat? On the differences between the network behavior of targeted and commodity malware
E Mariconti, J Onaolapo, G Ross, G Stringhini
2016 11th International Conference on Availability, Reliability and Security …, 2016
62016
Why allowing profile name reuse is a bad idea
E Mariconti, J Onaolapo, SS Ahmad, N Nikiforou, M Egele, N Nikiforakis, ...
Proceedings of the 9th European Workshop on System Security, 1-6, 2016
62016
The cause of all evils: Assessing causality between user actions and malware activity
E Mariconti, J Onaolapo, G Ross, G Stringhini
10th {USENIX} Workshop on Cyber Security Experimentation and Test ({CSET} 17), 2017
42017
BABELTOWER: How Language Affects Criminal Activity in Stolen Webmail Accounts
E Bernard-Jones, J Onaolapo, G Stringhini
The Third Workshop on Computational Methods in CyberSafety, Online …, 2018
3*2018
Under and over the surface: a comparison of the use of leaked account credentials in the Dark and Surface Web
DAB Villalva, J Onaolapo, G Stringhini, M Musolesi
Crime Science 7 (1), 17, 2018
22018
Harvesting wild honey from webmail beehives
J Onaolapo, E Mariconti, G Stringhini
Engineering Secure Software and Systems (ESSoS), 2016
22016
Master of sheets: a tale of compromised cloud documents
J Onaolapo, M Lazarov, G Stringhini
2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2019
12019
A Methodology To Assess Malware Causality In Network Activities
E Mariconti, J Onaolapo, G Ross, G Stringhini
Engineering Secure Software and Systems (ESSoS) 190, 2016
12016
Honeypot boulevard: understanding malicious activity via decoy accounts
JO Onaolapo
UCL (University College London), 2019
2019
Hives and Honeypots: Understanding Malicious Activity In Online Accounts
J Onaolapo
Cranfield Online Research Data (CORD), 2017
2017
Proceedings of EIE's 2nd International Conference on Computing, Energy, Networking, Robotics and Telecommunications
SN John, C Ndujiuba, F Ibikunle, JO Onaolapo
Covenant University, 2012
2012
2017 APWG Symposium on Electronic Crime Research (eCrime)
AR Beresford, AC Bahnsen, A Hutchings, A Haslebacher, A Ruef, ...
The system can't perform the operation now. Try again later.
Articles 1–18