Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Enrico
    Last name: Mariconti
    DBLP: 178/2014
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 8 of 8  
    Select a publication
    Show Title Venue Rating Date
    Journal article
    Enrico Mariconti, Jeremiah Onaolapo, Syed Sharique Ahmad, Nicolas Nikiforou, Manuel Egele, Nick Nikiforakis, Gianluca Stringhini.
    What's in a Name? Understanding Profile Name Reuse on Twitter.
    CoRR 2017, Volume 0 (0) 2017
    Conference paper
    Enrico Mariconti, Jeremiah Onaolapo, Syed Sharique Ahmad, Nicolas Nikiforou, Manuel Egele, Nick Nikiforakis, Gianluca Stringhini.
    What's in a Name?: Understanding Profile Name Reuse on Twitter.
    Proceedings of the 26th International Conference on World Wide Web, WWW 2017, Perth, Australia, April 3-7, 2017 2017 (0) 2017
    Conference paper
    Luca Boero, Marco Cello, Mario Marchese, Enrico Mariconti, Talha Naqash, Sandro Zappatore.
    Statistical fingerprint-based intrusion detection system (SF-IDS).
    Int. J. Communication Systems 2017, Volume 30 (0) 2017
    Conference paper
    Enrico Mariconti, Jeremiah Onaolapo, Gordon J. Ross, Gianluca Stringhini.
    The Cause of All Evils: Assessing Causality Between User Actions and Malware Activity.
    10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC, Canada, August 14, 2017. 2017 (0) 2017
    Conference paper
    Enrico Mariconti, Jeremiah Onaolapo, Syed Sharique Ahmad, Nicolas Nikiforou, Manuel Egele, Nick Nikiforakis, Gianluca Stringhini.
    Why allowing profile name reuse is a bad idea.
    Proceedings of the 9th European Workshop on System Security, EUROSEC 2016, London, UK, April 18-21, 2016 2016 (0) 2016
    Conference paper
    Jeremiah Onaolapo, Enrico Mariconti, Gianluca Stringhini.
    What Happens After You Are Pwnd: Understanding the Use of Leaked Webmail Credentials in the Wild.
    Proceedings of the 2016 ACM on Internet Measurement Conference, IMC 2016, Santa Monica, CA, USA, November 14-16, 2016 2016 (0) 2016
    Conference paper
    Enrico Mariconti, Jeremiah Onaolapo, Gordon J. Ross, Gianluca Stringhini.
    What's Your Major Threat? On the Differences between the Network Behavior of Targeted and Commodity Malware.
    11th International Conference on Availability, Reliability and Security, ARES 2016, Salzburg, Austria, August 31 - September 2, 2016 2016 (0) 2016
    Conference paper
    Enrico Mariconti, Lucky Onwuzurike, Panagiotis Andriotis, Emiliano De Cristofaro, Gordon J. Ross, Gianluca Stringhini.
    MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models.
    CoRR 2016, Volume 0 (0) 2016
    Show item 1 to 8 of 8  

    Your query returned 8 matches in the database.