Enrico Mariconti

Orcid: 0000-0003-3005-8214

According to our database1, Enrico Mariconti authored at least 25 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Application of AI-based Models for Online Fraud Detection and Analysis.
CoRR, 2024

Systematic Review: Anomaly Detection in Connected and Autonomous Vehicles.
CoRR, 2024

Waiting for Q: An Exploration of QAnon Users' Online Migration to Poal in the Wake of Voat's Demise.
Proceedings of the 16th ACM Web Science Conference, 2024

2023
Breaking the structure of MaMaDroid.
Expert Syst. Appl., October, 2023

Gotta Assess 'Em All: A Risk Analysis of Criminal Offenses Facilitated through PokemonGO.
CoRR, 2023

Short Paper: DeFi Deception - Uncovering the Prevalence of Rugpulls in Cryptocurrency Projects.
Proceedings of the Financial Cryptography and Data Security, 2023

2022
MaMaDroid2.0 - The Holes of Control Flow Graphs.
CoRR, 2022

Crystal Ball: From Innovative Attacks to Attack Effectiveness Classifier.
IEEE Access, 2022

The Ethics of Going Deep: Challenges in Machine Learning for Sensitive Security Domains.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

CERBERUS: Exploring Federated Prediction of Security Events.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Shedding Light on the Targeted Victim Profiles of Malicious Downloaders.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2020
BOTection: Bot Detection by Building Markov Chain Models of Bots Network Behavior.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version).
ACM Trans. Priv. Secur., 2019

"You Know What to Do": Proactive Detection of YouTube Videos Targeted by Coordinated Hate Attacks.
Proc. ACM Hum. Comput. Interact., 2019

2018
A Family of Droids: Analyzing Behavioral Model based Android Malware Detection via Static and Dynamic Analysis.
CoRR, 2018

A Family of Droids-Android Malware Detection via Behavioral Modeling: Static vs Dynamic Analysis.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Tiresias: Predicting Security Events Through Deep Learning.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Statistical fingerprint-based intrusion detection system (SF-IDS).
Int. J. Commun. Syst., 2017

What's in a Name?: Understanding Profile Name Reuse on Twitter.
Proceedings of the 26th International Conference on World Wide Web, 2017

The Cause of All Evils: Assessing Causality Between User Actions and Malware Activity.
Proceedings of the 10th USENIX Workshop on Cyber Security Experimentation and Test, 2017

MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Ex-Ray: Detection of History-Leaking Browser Extensions.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
What Happens After You Are Pwnd: Understanding the Use of Leaked Webmail Credentials in the Wild.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

Why allowing profile name reuse is a bad idea.
Proceedings of the 9th European Workshop on System Security, 2016

What's Your Major Threat? On the Differences between the Network Behavior of Targeted and Commodity Malware.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016


  Loading...