Comparing Vulnerability Severity and Exploits Using Case-Control Studies L Allodi, F Massacci ACM Transactions on Information and System Security 17 (1), 2014 | 154 | 2014 |
Security events and vulnerability data for cybersecurity risk estimation L Allodi, F Massacci Risk Analysis 37 (8), 1606-1627, 2017 | 83 | 2017 |
Economic Factors of Vulnerability Trade and Exploitation L Allodi ACM SIGSAC Conference on Computer and Communications Security (CCS '17 …, 2017 | 80 | 2017 |
A preliminary analysis of vulnerability scores for attacks in wild: The ekits and sym datasets L Allodi, F Massacci Proceedings of the 2012 ACM Workshop on Building analysis datasets and …, 2012 | 77 | 2012 |
Then and now: On the maturity of the cybercrime markets the lesson that black-hat marketeers learned L Allodi, M Corradin, F Massacci IEEE Transactions on Emerging Topics in Computing 4 (1), 35-46, 2015 | 55 | 2015 |
Cognitive Triaging of Phishing Attacks A van der Heijden, L Allodi 28th USENIX Security Symposium, 1309--1326, 2019 | 44 | 2019 |
{MalwareLab}: Experimentation with Cybercrime Attack Tools L Allodi, V Kotov, F Massacci 6th Workshop on Cyber Security Experimentation and Test (CSET 13), 2013 | 38 | 2013 |
Quantitative assessment of risk reduction with cybercrime black market monitoring L Allodi, W Shim, F Massacci 2013 IEEE Security and Privacy Workshops, 165-172, 2013 | 35 | 2013 |
The work‐averse cyberattacker model: theory and evidence from two million attack signatures L Allodi, F Massacci, J Williams Risk Analysis, 2021 | 34* | 2021 |
The need for new antiphishing measures against spear-phishing attacks L Allodi, T Chotza, E Panina, N Zannone IEEE Security & Privacy 18 (2), 23-34, 2019 | 30 | 2019 |
The heavy tails of vulnerability exploitation L Allodi International Symposium on Engineering Secure Software and Systems, 133-148, 2015 | 26 | 2015 |
A bug bounty perspective on the disclosure of web vulnerabilities J Ruohonen, L Allodi arXiv preprint arXiv:1805.09850, 2018 | 20 | 2018 |
Identifying relevant information cues for vulnerability assessment using CVSS L Allodi, S Banescu, H Femmer, K Beckers Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018 | 20 | 2018 |
How CVSS is DOSsing your patching policy (and wasting your money). L Allodi, F Massacci blackhat USA 2013, 27 July-1 August 2013, Las Vegas, USA, 2013 | 18* | 2013 |
Measuring the accuracy of software vulnerability assessments: experiments with students and professionals L Allodi, M Cremonini, F Massacci, W Shim Empirical Software Engineering 25 (2), 1063-1094, 2020 | 16* | 2020 |
Impersonation-as-a-service: Characterizing the emerging criminal infrastructure for user impersonation at scale M Campobasso, L Allodi Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 14 | 2020 |
Crime pays if you are just an average hacker W Shim, L Allodi, F Massacci 2012 International Conference on Cyber Security, 62-68, 2012 | 14* | 2012 |
Estimating the assessment difficulty of CVSS environmental metrics: an experiment L Allodi, S Biagioni, B Crispo, K Labunets, F Massacci, W Santos International Conference on Future Data and Security Engineering, 23-39, 2017 | 13 | 2017 |
Don’t forget the human: a crowdsourced approach to automate response and containment against spear phishing attacks P Burda, L Allodi, N Zannone 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020 | 12 | 2020 |
Economic incentives on DNSSEC deployment: Time to move from quantity to quality T Le, R van Rijswijk-Deij, L Allodi, N Zannone NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, 1-9, 2018 | 12 | 2018 |