<?xml version="1.0"?>
<dblpperson name="Enrico Mariconti" pid="178/2014" n="39">
<person key="homepages/178/2014" mdate="2025-01-10">
<author pid="178/2014">Enrico Mariconti</author>
<url>https://orcid.org/0000-0003-3005-8214</url>
<url>https://www.wikidata.org/entity/Q130854604</url>
</person>
<r><article key="journals/tits/SolaasMT25" mdate="2025-03-03">
<author orcid="0000-0001-6481-348X" pid="377/2143">John Roar Ventura Solaas</author>
<author orcid="0000-0003-3005-8214" pid="178/2014">Enrico Mariconti</author>
<author pid="55/2871">Nilufer Tuptuk</author>
<title>Systematic Literature Review: Anomaly Detection in Connected and Autonomous Vehicles.</title>
<pages>43-58</pages>
<year>2025</year>
<month>January</month>
<volume>26</volume>
<journal>IEEE Trans. Intell. Transp. Syst.</journal>
<number>1</number>
<ee>https://doi.org/10.1109/TITS.2024.3495031</ee>
<url>db/journals/tits/tits26.html#SolaasMT25</url>
<stream>streams/journals/tits</stream>
</article>
</r>
<r><inproceedings key="conf/acsac/BrownTMJ25" mdate="2026-03-26">
<author pid="121/8981">Ashley Brown</author>
<author pid="55/2871">Nilufer Tuptuk</author>
<author pid="178/2014">Enrico Mariconti</author>
<author pid="144/1353">Shane D. Johnson</author>
<title>Systematic evaluation of security attacks to household consumer smart doorbells.</title>
<booktitle>ACSAC Workshops</booktitle>
<year>2025</year>
<pages>569-578</pages>
<crossref>conf/acsac/2025w</crossref>
<ee>https://doi.org/10.1109/ACSACW69556.2025.00066</ee>
<url>db/conf/acsac/acsac2025w.html#BrownTMJ25</url>
<stream>streams/conf/acsac</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/BeadleTETOMZV25" mdate="2025-11-15">
<author orcid="0009-0004-8735-8992" pid="354/6105">Kyle Beadle</author>
<author pid="344/8538">Kieron Ivy Turk</author>
<author pid="323/5342">Aliai Eusebi</author>
<author pid="353/2032">Mindy Tran</author>
<author orcid="0009-0002-4896-9438" pid="362/7430">Marilyne Ordekian</author>
<author orcid="0000-0003-3005-8214" pid="178/2014">Enrico Mariconti</author>
<author orcid="0000-0002-9088-705X" pid="218/0356">Yixin Zou</author>
<author orcid="0009-0009-4045-9493" pid="145/2831">Marie Vasek</author>
<title>SoK: A Privacy Framework for Security Research Using Social Media Data.</title>
<pages>1178-1196</pages>
<year>2025</year>
<booktitle>SP</booktitle>
<ee>https://doi.org/10.1109/SP61157.2025.00145</ee>
<crossref>conf/sp/2025</crossref>
<url>db/conf/sp/sp2025.html#BeadleTETOMZV25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/AgarwalHMSV25" mdate="2025-10-31">
<author pid="32/4165">Sharad Agarwal</author>
<author pid="358/5793">Emma Harvey</author>
<author pid="178/2014">Enrico Mariconti</author>
<author pid="56/9730">Guillermo Suarez-Tangil</author>
<author pid="145/2831">Marie Vasek</author>
<title>'Hey mum, I dropped my phone down the toilet': Investigating Hi Mum and Dad SMS Scams in the United Kingdom.</title>
<pages>4879-4896</pages>
<year>2025</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity25/presentation/agarwal-sharad</ee>
<crossref>conf/uss/2025</crossref>
<url>db/conf/uss/uss2025.html#AgarwalHMSV25</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2510-09618" mdate="2026-03-26">
<author pid="121/8981">Ashley Brown</author>
<author pid="55/2871">Nilufer Tuptuk</author>
<author pid="178/2014">Enrico Mariconti</author>
<author pid="144/1353">Shane D. Johnson</author>
<title>A Systematic Review on Crimes facilitated by Consumer Internet of Things Devices.</title>
<year>2025</year>
<month>October</month>
<volume>abs/2510.09618</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2510.09618</ee>
<url>db/journals/corr/corr2510.html#abs-2510-09618</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><inproceedings key="conf/ecrime/OrdekianPMV24" mdate="2025-11-15">
<author orcid="0009-0002-4896-9438" pid="362/7430">Marilyne Ordekian</author>
<author pid="234/7917">Antonis Papasavva</author>
<author orcid="0000-0003-3005-8214" pid="178/2014">Enrico Mariconti</author>
<author orcid="0009-0009-4045-9493" pid="145/2831">Marie Vasek</author>
<title>A Sinister Fattening: Dissecting the Tales of Pig Butchering and Other Cryptocurrency Scams.</title>
<pages>136-148</pages>
<year>2024</year>
<booktitle>eCrime</booktitle>
<ee>https://doi.org/10.1109/eCrime66200.2024.00016</ee>
<crossref>conf/ecrime/2024</crossref>
<url>db/conf/ecrime/ecrime2024.html#OrdekianPMV24</url>
<stream>streams/conf/ecrime</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/websci/PapasavvaM24" mdate="2025-01-19">
<author orcid="0000-0001-8719-719X" pid="234/7917">Antonis Papasavva</author>
<author orcid="0000-0003-3005-8214" pid="178/2014">Enrico Mariconti</author>
<title>Waiting for Q: An Exploration of QAnon Users' Online Migration to Poal in the Wake of Voat's Demise.</title>
<pages>250-261</pages>
<year>2024</year>
<booktitle>WebSci</booktitle>
<ee>https://doi.org/10.1145/3614419.3644021</ee>
<ee>https://www.wikidata.org/entity/Q130854606</ee>
<crossref>conf/websci/2024</crossref>
<url>db/conf/websci/websci2024.html#PapasavvaM24</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2405-02731" mdate="2024-08-04">
<author pid="377/2143">John Roar Ventura Solaas</author>
<author pid="55/2871">Nilufer Tuptuk</author>
<author orcid="0000-0003-3005-8214" pid="178/2014">Enrico Mariconti</author>
<title>Systematic Review: Anomaly Detection in Connected and Autonomous Vehicles.</title>
<year>2024</year>
<volume>abs/2405.02731</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2405.02731</ee>
<url>db/journals/corr/corr2405.html#abs-2405-02731</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2409-19022" mdate="2026-03-26">
<author pid="234/7917">Antonis Papasavva</author>
<author pid="144/1353">Shane D. Johnson</author>
<author pid="388/0331">Ed Lowther</author>
<author pid="388/0954">Samantha Lundrigan</author>
<author orcid="0000-0003-3005-8214" pid="178/2014">Enrico Mariconti</author>
<author pid="388/0005">Anna Markovska</author>
<author pid="55/2871">Nilufer Tuptuk</author>
<title>Application of AI-based Models for Online Fraud Detection and Analysis.</title>
<year>2024</year>
<volume>abs/2409.19022</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2409.19022</ee>
<url>db/journals/corr/corr2409.html#abs-2409-19022</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article key="journals/eswa/BergerDMH23" mdate="2023-11-12">
<author orcid="0000-0001-6035-5127" pid="243/5920">Harel Berger</author>
<author orcid="0000-0002-3670-0784" pid="79/4531">Amit Dvir</author>
<author orcid="0000-0003-3005-8214" pid="178/2014">Enrico Mariconti</author>
<author orcid="0000-0001-9940-5654" pid="133/1819">Chen Hajaj</author>
<title>Breaking the structure of MaMaDroid.</title>
<pages>120429</pages>
<year>2023</year>
<month>October</month>
<volume>228</volume>
<journal>Expert Syst. Appl.</journal>
<ee>https://doi.org/10.1016/j.eswa.2023.120429</ee>
<url>db/journals/eswa/eswa228.html#BergerDMH23</url>
</article>
</r>
<r><inproceedings key="conf/fc/AgarwalSOHMV23" mdate="2023-12-10">
<author orcid="0000-0002-6492-5390" pid="32/4165">Sharad Agarwal</author>
<author orcid="0009-0007-0253-2982" pid="305/5194">Gilberto Atondo Siu</author>
<author orcid="0009-0002-4896-9438" pid="362/7430">Marilyne Ordekian</author>
<author orcid="0000-0003-3037-2684" pid="181/3695">Alice Hutchings</author>
<author orcid="0000-0003-3005-8214" pid="178/2014">Enrico Mariconti</author>
<author orcid="0009-0009-4045-9493" pid="145/2831">Marie Vasek</author>
<title>Short Paper: DeFi Deception - Uncovering the Prevalence of Rugpulls in Cryptocurrency Projects.</title>
<pages>363-372</pages>
<year>2023</year>
<booktitle>FC (1)</booktitle>
<ee>https://doi.org/10.1007/978-3-031-47754-6_21</ee>
<crossref>conf/fc/2023-1</crossref>
<url>db/conf/fc/fc2023-1.html#AgarwalSOHMV23</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2302-01397" mdate="2023-02-09">
<author pid="234/7917">Antonis Papasavva</author>
<author pid="178/2014">Enrico Mariconti</author>
<title>Waiting for Q: An Exploration of QAnon Users' Online Migration to Poal in the Wake of Voat's Demise.</title>
<year>2023</year>
<volume>abs/2302.01397</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2302.01397</ee>
<url>db/journals/corr/corr2302.html#abs-2302-01397</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2304-02952" mdate="2023-09-30">
<author pid="344/4934">Ashly Fuller</author>
<author pid="344/4945">Martin Lo</author>
<author pid="344/4426">Angelica Holmes</author>
<author pid="344/4645">Lu Lemanski</author>
<author orcid="0009-0009-4045-9493" pid="145/2831">Marie Vasek</author>
<author pid="178/2014">Enrico Mariconti</author>
<title>Gotta Assess 'Em All: A Risk Analysis of Criminal Offenses Facilitated through PokemonGO.</title>
<year>2023</year>
<volume>abs/2304.02952</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2304.02952</ee>
<url>db/journals/corr/corr2304.html#abs-2304-02952</url>
</article>
</r>
<r><article key="journals/access/BergerHMD22" mdate="2022-01-21">
<author orcid="0000-0001-6035-5127" pid="243/5920">Harel Berger</author>
<author orcid="0000-0001-9940-5654" pid="133/1819">Chen Hajaj</author>
<author orcid="0000-0003-3005-8214" pid="178/2014">Enrico Mariconti</author>
<author orcid="0000-0002-3670-0784" pid="79/4531">Amit Dvir</author>
<title>Crystal Ball: From Innovative Attacks to Attack Effectiveness Classifier.</title>
<pages>1317-1333</pages>
<year>2022</year>
<volume>10</volume>
<journal>IEEE Access</journal>
<ee type="oa">https://doi.org/10.1109/ACCESS.2021.3138628</ee>
<url>db/journals/access/access10.html#BergerHMD22</url>
</article>
</r>
<r><inproceedings key="conf/IEEEares/LabrecheMS22" mdate="2025-01-19">
<author pid="198/9664">Fran&#231;ois Labr&#232;che</author>
<author orcid="0000-0003-3005-8214" pid="178/2014">Enrico Mariconti</author>
<author pid="86/8823">Gianluca Stringhini</author>
<title>Shedding Light on the Targeted Victim Profiles of Malicious Downloaders.</title>
<pages>112:1-112:10</pages>
<year>2022</year>
<booktitle>ARES</booktitle>
<ee>https://doi.org/10.1145/3538969.3544435</ee>
<ee>https://www.wikidata.org/entity/Q131115214</ee>
<crossref>conf/IEEEares/2022</crossref>
<url>db/conf/IEEEares/ares2022.html#LabrecheMS22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/NaseriHMSSC22" mdate="2025-05-16">
<author pid="241/9630">Mohammad Naseri</author>
<author pid="74/2507-1">Yufei Han 0001</author>
<author orcid="0000-0003-3005-8214" pid="178/2014">Enrico Mariconti</author>
<author pid="14/4412">Yun Shen</author>
<author pid="86/8823">Gianluca Stringhini</author>
<author pid="36/6225">Emiliano De Cristofaro</author>
<title>CERBERUS: Exploring Federated Prediction of Security Events.</title>
<pages>2337-2351</pages>
<year>2022</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/3548606.3560580</ee>
<crossref>conf/ccs/2022</crossref>
<url>db/conf/ccs/ccs2022.html#NaseriHMSSC22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/eurosp/EusebiVCM22" mdate="2023-09-30">
<author pid="323/5342">Aliai Eusebi</author>
<author orcid="0009-0009-4045-9493" pid="145/2831">Marie Vasek</author>
<author orcid="0000-0002-6293-0268" pid="323/5095">Ella Cockbain</author>
<author orcid="0000-0003-3005-8214" pid="178/2014">Enrico Mariconti</author>
<title>The Ethics of Going Deep: Challenges in Machine Learning for Sensitive Security Domains.</title>
<pages>533-537</pages>
<year>2022</year>
<booktitle>EuroS&#38;P Workshops</booktitle>
<ee>https://doi.org/10.1109/EuroSPW55150.2022.00063</ee>
<crossref>conf/eurosp/2022w</crossref>
<url>db/conf/eurosp/eurosp2022w.html#EusebiVCM22</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2202-13922" mdate="2022-03-03">
<author pid="243/5920">Harel Berger</author>
<author pid="133/1819">Chen Hajaj</author>
<author pid="178/2014">Enrico Mariconti</author>
<author pid="79/4531">Amit Dvir</author>
<title>MaMaDroid2.0 - The Holes of Control Flow Graphs.</title>
<year>2022</year>
<volume>abs/2202.13922</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2202.13922</ee>
<url>db/journals/corr/corr2202.html#abs-2202-13922</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2208-13278" mdate="2022-09-01">
<author pid="198/9664">Fran&#231;ois Labr&#232;che</author>
<author pid="178/2014">Enrico Mariconti</author>
<author pid="86/8823">Gianluca Stringhini</author>
<title>Shedding Light on the Targeted Victim Profiles of Malicious Downloaders.</title>
<year>2022</year>
<volume>abs/2208.13278</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2208.13278</ee>
<url>db/journals/corr/corr2208.html#abs-2208-13278</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2209-03050" mdate="2025-05-16">
<author pid="241/9630">Mohammad Naseri</author>
<author pid="74/2507-1">Yufei Han 0001</author>
<author pid="178/2014">Enrico Mariconti</author>
<author pid="14/4412">Yun Shen</author>
<author pid="86/8823">Gianluca Stringhini</author>
<author pid="36/6225">Emiliano De Cristofaro</author>
<title>Cerberus: Exploring Federated Prediction of Security Events.</title>
<year>2022</year>
<volume>abs/2209.03050</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2209.03050</ee>
<url>db/journals/corr/corr2209.html#abs-2209-03050</url>
</article>
</r>
<r><inproceedings key="conf/ccs/AlahmadiMSSM20" mdate="2021-10-14">
<author pid="166/2137">Bushra A. AlAhmadi</author>
<author orcid="0000-0003-3005-8214" pid="178/2014">Enrico Mariconti</author>
<author pid="149/2739">Riccardo Spolaor</author>
<author pid="86/8823">Gianluca Stringhini</author>
<author pid="87/2623">Ivan Martinovic</author>
<title>BOTection: Bot Detection by Building Markov Chain Models of Bots Network Behavior.</title>
<pages>652-664</pages>
<year>2020</year>
<booktitle>AsiaCCS</booktitle>
<ee>https://doi.org/10.1145/3320269.3372202</ee>
<crossref>conf/ccs/2020asia</crossref>
<url>db/conf/ccs/asiaccs2020.html#AlahmadiMSSM20</url>
</inproceedings>
</r>
<r><article key="journals/pacmhci/MaricontiSBCKLS19" mdate="2022-03-16">
<author orcid="0000-0003-3005-8214" pid="178/2014">Enrico Mariconti</author>
<author pid="56/9730">Guillermo Suarez-Tangil</author>
<author pid="12/8780">Jeremy Blackburn</author>
<author pid="36/6225">Emiliano De Cristofaro</author>
<author pid="96/8779">Nicolas Kourtellis</author>
<author pid="92/131">Ilias Leontiadis</author>
<author pid="179/8648">Jordi Luque Serrano</author>
<author pid="86/8823">Gianluca Stringhini</author>
<title>&#34;You Know What to Do&#34;: Proactive Detection of YouTube Videos Targeted by Coordinated Hate Attacks.</title>
<pages>207:1-207:21</pages>
<year>2019</year>
<volume>3</volume>
<journal>Proc. ACM Hum. Comput. Interact.</journal>
<number>CSCW</number>
<ee>https://doi.org/10.1145/3359309</ee>
<ee>https://www.wikidata.org/entity/Q108932341</ee>
<url>db/journals/pacmhci/pacmhci3.html#MaricontiSBCKLS19</url>
</article>
</r>
<r><article key="journals/tissec/OnwuzurikeMACRS19" mdate="2021-10-14">
<author pid="163/2274">Lucky Onwuzurike</author>
<author orcid="0000-0003-3005-8214" pid="178/2014">Enrico Mariconti</author>
<author orcid="0000-0002-3490-3123" pid="124/8353">Panagiotis Andriotis</author>
<author pid="36/6225">Emiliano De Cristofaro</author>
<author pid="52/5652">Gordon J. Ross</author>
<author pid="86/8823">Gianluca Stringhini</author>
<title>MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version).</title>
<pages>14:1-14:34</pages>
<year>2019</year>
<volume>22</volume>
<journal>ACM Trans. Priv. Secur.</journal>
<number>2</number>
<ee>https://doi.org/10.1145/3313391</ee>
<url>db/journals/tissec/tissec22.html#OnwuzurikeMACRS19</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1905-10328" mdate="2019-05-29">
<author pid="14/4412">Yun Shen</author>
<author pid="178/2014">Enrico Mariconti</author>
<author pid="122/8629">Pierre-Antoine Vervier</author>
<author pid="86/8823">Gianluca Stringhini</author>
<title>Tiresias: Predicting Security Events Through Deep Learning.</title>
<year>2019</year>
<volume>abs/1905.10328</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1905.10328</ee>
<url>db/journals/corr/corr1905.html#abs-1905-10328</url>
</article>
</r>
<r><inproceedings key="conf/ccs/ShenMVS18" mdate="2021-10-14">
<author pid="14/4412">Yun Shen</author>
<author orcid="0000-0003-3005-8214" pid="178/2014">Enrico Mariconti</author>
<author pid="122/8629">Pierre-Antoine Vervier</author>
<author pid="86/8823">Gianluca Stringhini</author>
<title>Tiresias: Predicting Security Events Through Deep Learning.</title>
<pages>592-605</pages>
<year>2018</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/3243734.3243811</ee>
<crossref>conf/ccs/2018</crossref>
<url>db/conf/ccs/ccs2018.html#ShenMVS18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/pst/OnwuzurikeAMBSC18" mdate="2023-03-23">
<author pid="163/2274">Lucky Onwuzurike</author>
<author pid="122/3298">M&#225;rio Almeida</author>
<author orcid="0000-0003-3005-8214" pid="178/2014">Enrico Mariconti</author>
<author pid="12/8780">Jeremy Blackburn</author>
<author pid="86/8823">Gianluca Stringhini</author>
<author pid="36/6225">Emiliano De Cristofaro</author>
<title>A Family of Droids-Android Malware Detection via Behavioral Modeling: Static vs Dynamic Analysis.</title>
<pages>1-10</pages>
<year>2018</year>
<booktitle>PST</booktitle>
<ee>https://doi.org/10.1109/PST.2018.8514191</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/PST.2018.8514191</ee>
<crossref>conf/pst/2018</crossref>
<url>db/conf/pst/pst2018.html#OnwuzurikeAMBSC18</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-1803-03448" mdate="2018-08-13">
<author pid="163/2274">Lucky Onwuzurike</author>
<author pid="122/3298">M&#225;rio Almeida</author>
<author pid="178/2014">Enrico Mariconti</author>
<author pid="12/8780">Jeremy Blackburn</author>
<author pid="86/8823">Gianluca Stringhini</author>
<author pid="36/6225">Emiliano De Cristofaro</author>
<title>A Family of Droids: Analyzing Behavioral Model based Android Malware Detection via Static and Dynamic Analysis.</title>
<year>2018</year>
<volume>abs/1803.03448</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1803.03448</ee>
<url>db/journals/corr/corr1803.html#abs-1803-03448</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1805-08168" mdate="2018-08-13">
<author pid="178/2014">Enrico Mariconti</author>
<author pid="56/9730">Guillermo Suarez-Tangil</author>
<author pid="12/8780">Jeremy Blackburn</author>
<author pid="36/6225">Emiliano De Cristofaro</author>
<author pid="96/8779">Nicolas Kourtellis</author>
<author pid="92/131">Ilias Leontiadis</author>
<author pid="179/8648">Jordi Luque Serrano</author>
<author pid="86/8823">Gianluca Stringhini</author>
<title>&#34;You Know What to Do&#34;: Proactive Detection of YouTube Videos Targeted by Coordinated Hate Attacks.</title>
<year>2018</year>
<volume>abs/1805.08168</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1805.08168</ee>
<url>db/journals/corr/corr1805.html#abs-1805-08168</url>
</article>
</r>
<r><article key="journals/ijcomsys/BoeroCMMNZ17" mdate="2023-03-21">
<author pid="176/0546">Luca Boero</author>
<author pid="33/7909">Marco Cello</author>
<author orcid="0000-0002-9626-3483" pid="13/4788">Mario Marchese</author>
<author orcid="0000-0003-3005-8214" pid="178/2014">Enrico Mariconti</author>
<author orcid="0000-0002-9614-3780" pid="139/7605">Talha Naqash</author>
<author pid="40/122">Sandro Zappatore</author>
<title>Statistical fingerprint-based intrusion detection system (SF-IDS).</title>
<year>2017</year>
<volume>30</volume>
<journal>Int. J. Commun. Syst.</journal>
<number>10</number>
<ee>https://doi.org/10.1002/dac.3225</ee>
<url>db/journals/ijcomsys/ijcomsys30.html#BoeroCMMNZ17</url>
</article>
</r>
<r><inproceedings key="conf/acsac/WeissbacherMSSR17" mdate="2026-02-01">
<author pid="150/8120">Michael Weissbacher</author>
<author orcid="0000-0003-3005-8214" pid="178/2014">Enrico Mariconti</author>
<author orcid="0000-0002-0455-2553" pid="56/9730">Guillermo Suarez-Tangil</author>
<author pid="86/8823">Gianluca Stringhini</author>
<author orcid="0000-0002-6968-0273" pid="r/WilliamKRobertson">William K. Robertson</author>
<author pid="k/EnginKirda">Engin Kirda</author>
<title>Ex-Ray: Detection of History-Leaking Browser Extensions.</title>
<pages>590-602</pages>
<year>2017</year>
<booktitle>ACSAC</booktitle>
<ee>https://doi.org/10.1145/3134600.3134632</ee>
<ee>https://www.wikidata.org/entity/Q131130097</ee>
<crossref>conf/acsac/2017</crossref>
<url>db/conf/acsac/acsac2017.html#WeissbacherMSSR17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ndss/MaricontiOACRS17" mdate="2021-02-01">
<author pid="178/2014">Enrico Mariconti</author>
<author pid="163/2274">Lucky Onwuzurike</author>
<author pid="124/8353">Panagiotis Andriotis</author>
<author pid="36/6225">Emiliano De Cristofaro</author>
<author pid="52/5652">Gordon J. Ross</author>
<author pid="86/8823">Gianluca Stringhini</author>
<title>MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models.</title>
<year>2017</year>
<booktitle>NDSS</booktitle>
<ee type="oa">https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/mamadroid-detecting-android-malware-building-markov-chains-behavioral-models/</ee>
<crossref>conf/ndss/2017</crossref>
<url>db/conf/ndss/ndss2017.html#MaricontiOACRS17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/MaricontiORS17" mdate="2021-02-01">
<author pid="178/2014">Enrico Mariconti</author>
<author pid="178/1987">Jeremiah Onaolapo</author>
<author pid="52/5652">Gordon J. Ross</author>
<author pid="86/8823">Gianluca Stringhini</author>
<title>The Cause of All Evils: Assessing Causality Between User Actions and Malware Activity.</title>
<year>2017</year>
<booktitle>CSET @ USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/cset17/workshop-program/presentation/mariconti</ee>
<crossref>conf/uss/2017cset</crossref>
<url>db/conf/uss/cset2017.html#MaricontiORS17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/www/MaricontiOANENS17" mdate="2021-10-14">
<author orcid="0000-0003-3005-8214" pid="178/2014">Enrico Mariconti</author>
<author pid="178/1987">Jeremiah Onaolapo</author>
<author pid="55/10921">Syed Sharique Ahmad</author>
<author pid="178/1982">Nicolas Nikiforou</author>
<author pid="27/3108">Manuel Egele</author>
<author pid="04/8280">Nick Nikiforakis</author>
<author pid="86/8823">Gianluca Stringhini</author>
<title>What's in a Name?: Understanding Profile Name Reuse on Twitter.</title>
<pages>1161-1170</pages>
<year>2017</year>
<booktitle>WWW</booktitle>
<ee>https://doi.org/10.1145/3038912.3052589</ee>
<crossref>conf/www/2017</crossref>
<url>db/conf/www/www2017.html#MaricontiOANENS17</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/MaricontiOANENS17" mdate="2018-08-13">
<author pid="178/2014">Enrico Mariconti</author>
<author pid="178/1987">Jeremiah Onaolapo</author>
<author pid="55/10921">Syed Sharique Ahmad</author>
<author pid="178/1982">Nicolas Nikiforou</author>
<author pid="27/3108">Manuel Egele</author>
<author pid="04/8280">Nick Nikiforakis</author>
<author pid="86/8823">Gianluca Stringhini</author>
<title>What's in a Name? Understanding Profile Name Reuse on Twitter.</title>
<year>2017</year>
<volume>abs/1702.04256</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1702.04256</ee>
<url>db/journals/corr/corr1702.html#MaricontiOANENS17</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1711-07477" mdate="2018-08-13">
<author pid="163/2274">Lucky Onwuzurike</author>
<author pid="178/2014">Enrico Mariconti</author>
<author pid="124/8353">Panagiotis Andriotis</author>
<author pid="36/6225">Emiliano De Cristofaro</author>
<author pid="52/5652">Gordon J. Ross</author>
<author pid="86/8823">Gianluca Stringhini</author>
<title>MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version).</title>
<year>2017</year>
<volume>abs/1711.07477</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1711.07477</ee>
<url>db/journals/corr/corr1711.html#abs-1711-07477</url>
</article>
</r>
<r><inproceedings key="conf/IEEEares/MaricontiORS16" mdate="2023-03-24">
<author orcid="0000-0003-3005-8214" pid="178/2014">Enrico Mariconti</author>
<author pid="178/1987">Jeremiah Onaolapo</author>
<author pid="52/5652">Gordon J. Ross</author>
<author pid="86/8823">Gianluca Stringhini</author>
<title>What's Your Major Threat? On the Differences between the Network Behavior of Targeted and Commodity Malware.</title>
<pages>599-608</pages>
<year>2016</year>
<booktitle>ARES</booktitle>
<ee>https://doi.org/10.1109/ARES.2016.36</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ARES.2016.36</ee>
<crossref>conf/IEEEares/2016</crossref>
<url>db/conf/IEEEares/ares2016.html#MaricontiORS16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/eurosec/MaricontiOANENS16" mdate="2021-10-14">
<author orcid="0000-0003-3005-8214" pid="178/2014">Enrico Mariconti</author>
<author pid="178/1987">Jeremiah Onaolapo</author>
<author pid="55/10921">Syed Sharique Ahmad</author>
<author pid="178/1982">Nicolas Nikiforou</author>
<author pid="27/3108">Manuel Egele</author>
<author pid="04/8280">Nick Nikiforakis</author>
<author pid="86/8823">Gianluca Stringhini</author>
<title>Why allowing profile name reuse is a bad idea.</title>
<pages>3:1-3:6</pages>
<year>2016</year>
<booktitle>EUROSEC</booktitle>
<ee>https://doi.org/10.1145/2905760.2905762</ee>
<crossref>conf/eurosec/2016</crossref>
<url>db/conf/eurosec/eurosec2016.html#MaricontiOANENS16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/imc/OnaolapoMS16" mdate="2017-08-19">
<author pid="178/1987">Jeremiah Onaolapo</author>
<author pid="178/2014">Enrico Mariconti</author>
<author pid="86/8823">Gianluca Stringhini</author>
<title>What Happens After You Are Pwnd: Understanding the Use of Leaked Webmail Credentials in the Wild.</title>
<pages>65-79</pages>
<year>2016</year>
<booktitle>Internet Measurement Conference</booktitle>
<ee>http://dl.acm.org/citation.cfm?id=2987475</ee>
<crossref>conf/imc/2016</crossref>
<url>db/conf/imc/imc2016.html#OnaolapoMS16</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/MaricontiOACRS16" mdate="2021-01-23">
<author pid="178/2014">Enrico Mariconti</author>
<author pid="163/2274">Lucky Onwuzurike</author>
<author orcid="0000-0002-3490-3123" pid="124/8353">Panagiotis Andriotis</author>
<author pid="36/6225">Emiliano De Cristofaro</author>
<author pid="52/5652">Gordon J. Ross</author>
<author pid="86/8823">Gianluca Stringhini</author>
<title>MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models.</title>
<year>2016</year>
<volume>abs/1612.04433</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1612.04433</ee>
<url>db/journals/corr/corr1612.html#MaricontiOACRS16</url>
</article>
</r>
<coauthors n="59" nc="3">
<co c="0"><na f="a/Agarwal:Sharad" pid="32/4165">Sharad Agarwal</na></co>
<co c="0"><na f="a/Ahmad:Syed_Sharique" pid="55/10921">Syed Sharique Ahmad</na></co>
<co c="0"><na f="a/AlAhmadi:Bushra_A=" pid="166/2137">Bushra A. AlAhmadi</na></co>
<co c="0"><na f="a/Almeida:M=aacute=rio" pid="122/3298">M&#225;rio Almeida</na></co>
<co c="0"><na f="a/Andriotis:Panagiotis" pid="124/8353">Panagiotis Andriotis</na></co>
<co c="0"><na f="b/Beadle:Kyle" pid="354/6105">Kyle Beadle</na></co>
<co c="2"><na f="b/Berger:Harel" pid="243/5920">Harel Berger</na></co>
<co c="0"><na f="b/Blackburn:Jeremy" pid="12/8780">Jeremy Blackburn</na></co>
<co c="1"><na f="b/Boero:Luca" pid="176/0546">Luca Boero</na></co>
<co c="0"><na f="b/Brown:Ashley" pid="121/8981">Ashley Brown</na></co>
<co c="1"><na f="c/Cello:Marco" pid="33/7909">Marco Cello</na></co>
<co c="0"><na f="c/Cockbain:Ella" pid="323/5095">Ella Cockbain</na></co>
<co c="0"><na f="c/Cristofaro:Emiliano_De" pid="36/6225">Emiliano De Cristofaro</na></co>
<co c="2"><na f="d/Dvir:Amit" pid="79/4531">Amit Dvir</na></co>
<co c="0"><na f="e/Egele:Manuel" pid="27/3108">Manuel Egele</na></co>
<co c="0"><na f="e/Eusebi:Aliai" pid="323/5342">Aliai Eusebi</na></co>
<co c="0"><na f="f/Fuller:Ashly" pid="344/4934">Ashly Fuller</na></co>
<co c="2"><na f="h/Hajaj:Chen" pid="133/1819">Chen Hajaj</na></co>
<co c="0"><na f="h/Han_0001:Yufei" pid="74/2507-1">Yufei Han 0001</na></co>
<co c="0"><na f="h/Harvey:Emma" pid="358/5793">Emma Harvey</na></co>
<co c="0"><na f="h/Holmes:Angelica" pid="344/4426">Angelica Holmes</na></co>
<co c="0"><na f="h/Hutchings:Alice" pid="181/3695">Alice Hutchings</na></co>
<co c="0"><na f="j/Johnson:Shane_D=" pid="144/1353">Shane D. Johnson</na></co>
<co c="0"><na f="k/Kirda:Engin" pid="k/EnginKirda">Engin Kirda</na></co>
<co c="0"><na f="k/Kourtellis:Nicolas" pid="96/8779">Nicolas Kourtellis</na></co>
<co c="0" n="2"><na f="l/Labreche:Francois" pid="198/9664">Francois Labreche</na><na>Fran&#231;ois Labr&#232;che</na></co>
<co c="0"><na f="l/Lemanski:Lu" pid="344/4645">Lu Lemanski</na></co>
<co c="0"><na f="l/Leontiadis:Ilias" pid="92/131">Ilias Leontiadis</na></co>
<co c="0"><na f="l/Lo:Martin" pid="344/4945">Martin Lo</na></co>
<co c="0"><na f="l/Lowther:Ed" pid="388/0331">Ed Lowther</na></co>
<co c="0"><na f="l/Lundrigan:Samantha" pid="388/0954">Samantha Lundrigan</na></co>
<co c="1"><na f="m/Marchese:Mario" pid="13/4788">Mario Marchese</na></co>
<co c="0"><na f="m/Markovska:Anna" pid="388/0005">Anna Markovska</na></co>
<co c="0"><na f="m/Martinovic:Ivan" pid="87/2623">Ivan Martinovic</na></co>
<co c="1"><na f="n/Naqash:Talha" pid="139/7605">Talha Naqash</na></co>
<co c="0"><na f="n/Naseri:Mohammad" pid="241/9630">Mohammad Naseri</na></co>
<co c="0"><na f="n/Nikiforakis:Nick" pid="04/8280">Nick Nikiforakis</na></co>
<co c="0"><na f="n/Nikiforou:Nicolas" pid="178/1982">Nicolas Nikiforou</na></co>
<co c="0"><na f="o/Onaolapo:Jeremiah" pid="178/1987">Jeremiah Onaolapo</na></co>
<co c="0"><na f="o/Onwuzurike:Lucky" pid="163/2274">Lucky Onwuzurike</na></co>
<co c="0"><na f="o/Ordekian:Marilyne" pid="362/7430">Marilyne Ordekian</na></co>
<co c="0"><na f="p/Papasavva:Antonis" pid="234/7917">Antonis Papasavva</na></co>
<co c="0"><na f="r/Robertson:William_K=" pid="r/WilliamKRobertson">William K. Robertson</na></co>
<co c="0"><na f="r/Ross:Gordon_J=" pid="52/5652">Gordon J. Ross</na></co>
<co c="0"><na f="s/Serrano:Jordi_Luque" pid="179/8648">Jordi Luque Serrano</na></co>
<co c="0"><na f="s/Shen:Yun" pid="14/4412">Yun Shen</na></co>
<co c="0"><na f="s/Siu:Gilberto_Atondo" pid="305/5194" bibtex="Gilberto {Atondo Siu}">Gilberto Atondo Siu</na></co>
<co c="0"><na f="s/Solaas:John_Roar_Ventura" pid="377/2143">John Roar Ventura Solaas</na></co>
<co c="0"><na f="s/Spolaor:Riccardo" pid="149/2739">Riccardo Spolaor</na></co>
<co c="0"><na f="s/Stringhini:Gianluca" pid="86/8823">Gianluca Stringhini</na></co>
<co c="0"><na f="s/Suarez=Tangil:Guillermo" pid="56/9730">Guillermo Suarez-Tangil</na></co>
<co c="0"><na f="t/Tran:Mindy" pid="353/2032">Mindy Tran</na></co>
<co c="0"><na f="t/Tuptuk:Nilufer" pid="55/2871">Nilufer Tuptuk</na></co>
<co c="0"><na f="t/Turk:Kieron_Ivy" pid="344/8538">Kieron Ivy Turk</na></co>
<co c="0"><na f="v/Vasek:Marie" pid="145/2831">Marie Vasek</na></co>
<co c="0"><na f="v/Vervier:Pierre=Antoine" pid="122/8629">Pierre-Antoine Vervier</na></co>
<co c="0"><na f="w/Weissbacher:Michael" pid="150/8120">Michael Weissbacher</na></co>
<co c="1"><na f="z/Zappatore:Sandro" pid="40/122">Sandro Zappatore</na></co>
<co c="0"><na f="z/Zou:Yixin" pid="218/0356">Yixin Zou</na></co>
</coauthors>
</dblpperson>

