Browse by UCL people
Group by: Type | Date
Number of items: 23.
Article
Berger, H;
Dvir, A;
Mariconti, E;
Hajaj, C;
(2023)
Breaking the structure of MaMaDroid.
Expert Systems with Applications
, 228
, Article 120429. 10.1016/j.eswa.2023.120429.
|
Berger, H;
Hajaj, C;
Mariconti, E;
Dvir, A;
(2021)
Crystal Ball: From Innovative Attacks to Attack Effectiveness Classifier.
IEEE Access
, 10
pp. 1317-1333.
10.1109/ACCESS.2021.3138628.
|
Boero, L;
Cello, M;
Marchese, M;
Mariconti, E;
Naqash, T;
Zappatore, S;
(2017)
Statistical fingerprint-based intrusion detection system (SF-IDS).
International Journal of Communication Systems
, 30
(10)
, Article e3225. 10.1002/dac.3225.
|
Jang, J;
Mariconti, E;
Watts, R;
(2024)
Technical note: Analysis of the auricular surface for age estimation using dirichlet normal energy.
Forensic Imaging
, 36
, Article 200579. 10.1016/j.fri.2024.200579.
|
Jang, Jisun;
Mariconti, Enrico;
Watts, Rebecca;
(2024)
'JSDNE': A novel R package for estimating age quantitatively with the auricular surface by Dirichlet normal energy.
Journal of Archaeological Science
, 171
, Article 106080. 10.1016/j.jas.2024.106080.
|
Onwuzurike, L;
Mariconti, E;
Andriotis, P;
De Cristofaro, E;
Stringhini, G;
Ross, G;
(2019)
MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version).
ACM Transactions on Privacy and Security
, 22
(2)
, Article 14. 10.1145/3313391.
|
Papasavva, Antonis;
Lundrigan, Samantha;
Lowther, Ed;
Johnson, Shane;
Mariconti, Enrico;
Markovska, Anna;
Tuptuk, Nilufer;
(2025)
Applications of AI-Based Models for Online Fraud Detection and Analysis.
Crime Science
, 14
(1)
, Article 7. 10.1186/s40163-025-00248-8.
|
Solaas, John Roar Ventura;
Mariconti, Enrico;
Tuptuk, Nilufer;
(2025)
Systematic Literature Review: Anomaly Detection in Connected and Autonomous Vehicles.
IEEE Transactions on Intelligent Transportation Systems
, 26
(1)
43 -58.
10.1109/tits.2024.3495031.
|
Proceedings paper
Alahmadi, BA;
Mariconti, E;
Spolaor, R;
Stringhini, G;
Martinovic, I;
(2020)
BOTection: Bot Detection by Building Markov Chain Models of Bots Network Behavior.
In:
ASIA CCS '20: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security.
(pp. pp. 652-664).
ACM: Taipei, Taiwan.
|
Labrèche, F;
Mariconti, E;
Stringhini, G;
(2022)
Shedding Light on the Targeted Victim Profiles of Malicious Downloaders.
In:
ACM International Conference Proceeding Series.
(pp. p. 112).
ACM: Association for Computing Machinery
|
Mariconti, E;
Onaolapo, J;
Ahmad, S;
Nikiforou, N;
Egele, M;
Nikiforakis, N;
Stringhini, G;
(2017)
What's in a Name? Understanding Profile Name Reuse on Twitter.
In: Barrett, R and Cummings, R and Agichtein, E and Gabrilovich, E, (eds.)
Proceedings of the 26th International World Wide Web Conference (WWW 2017).
(pp. pp. 1161-1170).
Association for Computing Machinery (ACM): New York, NY, USA.
|
Mariconti, E;
Onaolapo, J;
Ross, G;
Stringhini, G;
(2017)
The Cause of All Evils: Assessing Causality Between User Actions and Malware Activity.
In:
Proceedings of the 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET '17).
USENIX: Vancouver, Canada.
|
Mariconti, E;
Onaolapo, J;
Ross, G;
Stringhini, G;
(2016)
What's your major threat? On the differences between the network behavior of targeted and commodity malware.
In:
Proceedings of the 2016 11th International Conference on Availability, Reliability and Security (ARES).
(pp. pp. 599-608).
IEEE: Salzburg, Austria.
|
Mariconti, E;
Onwuzurike, L;
Andriotis, P;
De Cristofaro, E;
Ross, G;
Stringhini, G;
(2017)
MamaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models.
In:
Proceedings of the ISOC Network and Distributed Systems Security Symposium (NDSS).
Internet Society: San Diego, CA, USA.
|
Mariconti, E;
Suarez-Tangil, G;
Blackburn, J;
Cristofaro, ED;
Kourtellis, N;
Leontiadis, I;
Serrano, JL;
(2018)
"You Know What to Do": Proactive Detection of YouTube Videos Targeted by Coordinated Hate Attacks.
In: Gilbert, Eric and Karahalios, Karrie, (eds.)
Proceedings of the 22nd ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW’19).
(pp. p. 207).
ACM (Association for Computing Machinery): New York, NY, USA.
|
Naseri, Mohammad;
Han, Yufei;
Mariconti, Enrico;
Shen, Yun;
Stringhini, Gianluca;
Cristofaro, Emiliano De;
(2022)
Cerberus: Exploring Federated Prediction of Security Events.
In:
Proceedings of the 29th ACM Conference on Computer and Communications Security (ACM CCS 2022).
(pp. pp. 2337-2351).
Association for Computing Machinery: Los Angeles, CA, USA.
|
Onaolapo, J;
Mariconti, E;
Stringhini, G;
(2016)
What Happens After You Are Pwnd: Understanding The Use Of Leaked Webmail Credentials In The Wild.
In:
Proceedings of the ACM Internet Measurement Conference 2016 (IMC 2016).
(pp. pp. 65-79).
Association for Computing Machinery (ACM): New York, NY, USA.
|
Onwuzurike, L;
Almeida, M;
Mariconti, E;
Blackburn, J;
Stringhini, G;
De Cristofaro, E;
(2018)
A Family of Droids-Android Malware Detection via Behavioral Modeling: Static vs Dynamic Analysis.
In:
2018 16th Annual Conference on Privacy, Security and Trust (PST).
IEEE
|
Shen, Y;
Mariconti, E;
Vervier, P-A;
Stringhini, G;
(2018)
Tiresias: Predicting Security Events Through Deep Learning.
In:
CCS '18 Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security.
(pp. pp. 592-605).
Association for Computing Machinery (ACM): New York, NY, USA.
|
Weissbacher, M;
Mariconti, E;
Suarez-Tangil, G;
Stringhini, G;
Robertson, W;
Kirda, E;
(2017)
Ex-Ray: Detection of History-Leaking Browser Extensions.
In:
ACSAC 2017: Proceedings of the 33rd Annual Computer Security Applications Conference.
(pp. pp. 590-602).
Association for Computing Machinery (ACM): New York, NY, USA.
|
Thesis
Mariconti, Enrico;
(2019)
You Shall Not Pass! Measuring, Predicting, and Detecting Malware Behavior.
Doctoral thesis (Ph.D), UCL (University College London).
|
Dataset
Mariconti, E;
Onaolapo, J;
Ross, G;
Stringhini, G;
(2016)
What's your major threat? On the differences between the network behavior of targeted and commodity malware.
[Dataset].
UCL Computer Science: London, UK.
|
Onaolapo, J;
Stringhini, G;
Mariconti, E;
(2016)
Understanding The Use Of Stolen Webmail Credentials In The Wild.
[Dataset].
UCL Computer Science: London, UK.
|