Enrico Mariconti
Orcid: 0000-0003-3005-8214
According to our database1,
Enrico Mariconti
authored at least 25 papers
between 2016 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
CoRR, 2024
Waiting for Q: An Exploration of QAnon Users' Online Migration to Poal in the Wake of Voat's Demise.
Proceedings of the 16th ACM Web Science Conference, 2024
2023
Gotta Assess 'Em All: A Risk Analysis of Criminal Offenses Facilitated through PokemonGO.
CoRR, 2023
Short Paper: DeFi Deception - Uncovering the Prevalence of Rugpulls in Cryptocurrency Projects.
Proceedings of the Financial Cryptography and Data Security, 2023
2022
IEEE Access, 2022
The Ethics of Going Deep: Challenges in Machine Learning for Sensitive Security Domains.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2019
MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version).
ACM Trans. Priv. Secur., 2019
"You Know What to Do": Proactive Detection of YouTube Videos Targeted by Coordinated Hate Attacks.
Proc. ACM Hum. Comput. Interact., 2019
2018
A Family of Droids: Analyzing Behavioral Model based Android Malware Detection via Static and Dynamic Analysis.
CoRR, 2018
A Family of Droids-Android Malware Detection via Behavioral Modeling: Static vs Dynamic Analysis.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Int. J. Commun. Syst., 2017
Proceedings of the 26th International Conference on World Wide Web, 2017
The Cause of All Evils: Assessing Causality Between User Actions and Malware Activity.
Proceedings of the 10th USENIX Workshop on Cyber Security Experimentation and Test, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
What Happens After You Are Pwnd: Understanding the Use of Leaked Webmail Credentials in the Wild.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016
Proceedings of the 9th European Workshop on System Security, 2016
What's Your Major Threat? On the Differences between the Network Behavior of Targeted and Commodity Malware.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016