Gianluca Stringhini
Gianluca Stringhini
Assistant Professor at Boston University
Email verificata su bu.edu - Home page
TitoloCitata daAnno
Detecting spammers on social networks
G Stringhini, C Kruegel, G Vigna
Proceedings of the 26th Annual Computer Security Applications Conference, 1-9, 2010
7402010
COMPA: Detecting Compromised Accounts on Social Networks
M Egele, G Stringhini, C Kruegel, G Vigna
Network & Distributed System Security Symposium (NDSS), 2013
2512013
The Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns.
B Stone-Gross, T Holz, G Stringhini, G Vigna
LEET 11, 4-4, 2011
1812011
Follow the Green: Growth and Dynamics in Twitter Follower Markets
G Stringhini, G Wang, M Egele, C Kruegel, G Vigna, H Zheng, BY Zhao
ACM SIGCOMM Internet Measurement Conference (IMC), 2013
1542013
MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models
E Mariconti, L Onwuzurike, P Andriotis, E De Cristofaro, G Ross, ...
Network and Distributed Systems Security Symposium (NDSS), 2017
1152017
Mean Birds: Detecting Aggression and Bullying on Twitter
D Chatzakou, N Kourtellis, J Blackburn, E De Cristofaro, G Stringhini, ...
International ACM Web Science Conference (WebSci), 2017
1122017
Shady Paths: Leveraging Surfing Crowds to Detect Malicious Web Pages
G Stringhini, C Kruegel, G Vigna
ACM Conference on Computer and Communications Security (CCS), 2013
1112013
The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements
A Zarras, A Kapravelos, G Stringhini, T Holz, C Kruegel, G Vigna
Internet Measurement Conference, 2014
942014
Kek, Cucks, and God Emperor Trump: A Measurement Study of 4chan's Politically Incorrect Forum and Its Effects on the Web
GE Hine, J Onaolapo, E De Cristofaro, N Kourtellis, I Leontiadis, ...
AAAI International Conference on Web and Social Media (ICWSM), 2017
922017
Poultry Markets: On the Underground Economy of Twitter Followers
G Stringhini, M Egele, C Kruegel, G Vigna
Workshop on Online Social Networks (WOSN), 2012
812012
PayBreak: Defense Against Cryptographic Ransomware
E Kolodenker, W Koch, G Stringhini, M Egele
ACM Asia Conference on Computer and Communications Security (ASIACCS), 2017
792017
Towards detecting compromised accounts on social networks
M Egele, G Stringhini, C Kruegel, G Vigna
IEEE Transactions on Dependable and Secure Computing (TDSC), 2017
712017
BOTMAGNIFIER: Locating Spambots on the Internet
G Stringhini, T Holz, B Stone-Gross, C Kruegel, G Vigna
USENIX Security Symposium, 2011
572011
EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services.
G Stringhini, P Mourlanne, G Jacob, M Egele, C Kruegel, G Vigna
Usenix Security Symposium, 2015
502015
Two Years of Short URLs Internet Measurement: Security Threats and Countermeasures
F Maggi, A Frossi, S Zanero, G Stringhini, B Stone-Gross, C Kruegel, ...
International World Wide Web Conference (WWW), 2013
482013
The Web Centipede: Understanding How Web Communities Influence Each Other Through the Lens of Mainstream and Alternative News Sources
S Zannettou, T Caulfield, E De Cristofaro, N Kourtellis, I Leontiadis, ...
ACM SIGCOMM Internet Measurement Conference (IMC), 2017
472017
What Happens after you are Pwnd: Understanding the Use of Leaked Webmail Credentials in the Wild
J Onaolapo, E Mariconti, G Stringhini
ACM SIGCOMM Internet Measurement Conference (IMC) 2016, 2016
472016
Hit’em Where it Hurts: A Live Security Exercise on Cyber Situational Awareness
A Doupé, M Egele, B Caillat, G Stringhini, G Yakin, A Zand, L Cavedon, ...
Annual Computer Security Applications Conference (ACSAC), 2011
452011
Stranger Danger: Exploring the Ecosystem of Ad-based URL Shortening Services
N Nikiforakis, F Maggi, G Stringhini, MZ Rafique, W Joosen, C Kruegel, ...
International World Wide Web Conference (WWW), 2014
412014
Targeted Attacks against Industrial Control Systems: Is the Power Industry Prepared?
MB Line, A Zand, G Stringhini, R Kemmerer
Smart Energy Grid Security Workshop (SEGS), 2014
402014
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20