Browse by UCL people
Group by: Type | Date
Number of items: 52.
2019
Zannettou, S;
Sirivianos, M;
Caulfield, T;
Stringhini, G;
De Cristofaro, E;
Blackburn, J;
(2019)
Disinformation warfare: Understanding state-sponsored trolls on twitter and their influence on the web.
In:
WWW '19 Companion Proceedings of The 2019 World Wide Web Conference.
(pp. pp. 218-226).
ACM: New York (NY), USA.
|
2018
Andriotis, P;
Stringhini, G;
Sasse, MA;
(2018)
Studying users' adaptation to Android's run-time fine-grained access control system.
Journal of Information Security and Applications
, 40
pp. 31-43.
10.1016/j.jisa.2018.02.004.
|
Bernard-Jones, E;
Onaolapo, J;
Stringhini, G;
(2018)
BABELTOWER: How Language Affects Criminal Activity in Stolen Webmail Accounts.
In:
(Proceedings) The Web Conference.
ACM
|
Edwards, M;
Suarez-Tangil, G;
Peersman, C;
Stringhini, G;
Rashid, A;
Whitty, M;
(2018)
The Geography of Online Dating Fraud.
In:
Proceedings of the Workshop on Technology and Consumer Protection (ConPro ’18).
IEEE-TCSP: San Francisco, CA, USA.
|
Ibosiola, D;
Steer, B;
Garcia-Recuero, A;
Stringhini, G;
Uhlig, S;
Tyson, G;
(2018)
Movie Pirates of the Caribbean: Exploring Illegal Streaming Cyberlockers.
In:
Proceedings of the Twelfth International Conference on Web And Social Media.
(pp. pp. 131-140).
Association for the Advancement of Artificial Intelligence (AAAI): Stanford, CA, USA.
|
Ioannou, A;
Blackburn, J;
Stringhini, G;
De Cristofaro, E;
Kourtellis, N;
Sirivianos, M;
(2018)
From risk factors to detection and intervention: a practical proposal for future work on cyberbullying.
Behaviour and Information Technology
, 37
(3)
pp. 258-266.
10.1080/0144929X.2018.1432688.
|
Mariconti, E;
Suarez-Tangil, G;
Blackburn, J;
Cristofaro, ED;
Kourtellis, N;
Leontiadis, I;
Serrano, JL;
(2018)
"You Know What to Do": Proactive Detection of YouTube Videos Targeted by Coordinated Hate Attacks.
In: Gilbert, Eric and Karahalios, Karrie, (eds.)
Proceedings of the 22nd ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW’19).
(pp. p. 207).
ACM (Association for Computing Machinery): New York, NY, USA.
|
Onwuzurike, L;
Almeida, M;
Mariconti, E;
Blackburn, J;
Stringhini, G;
De Cristofaro, E;
(2018)
A Family of Droids-Android Malware Detection via Behavioral Modeling: Static vs Dynamic Analysis.
In:
2018 16th Annual Conference on Privacy, Security and Trust (PST).
IEEE
|
Perez, B;
Musolesi, M;
Stringhini, G;
(2018)
You are your Metadata: Identification and Obfuscation of Social Media Users using Metadata Information.
In:
Proceedings of Twelfth International AAAI Conference on Web and Social Media.
(pp. pp. 241-250).
The AAAI Press: Palo Alto, CA, USA.
|
Shen, Y;
Mariconti, E;
Vervier, P-A;
Stringhini, G;
(2018)
Tiresias: Predicting Security Events Through Deep Learning.
In:
CCS '18 Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security.
(pp. pp. 592-605).
Association for Computing Machinery (ACM): New York, NY, USA.
|
Zannettou, S;
Blackburn, J;
Sirivianos, M;
Stringhini, G;
(2018)
Understanding Web Archiving Services and Their (Mis)Use on Social Media.
In:
Twelfth International AAAI Conference on Web and Social Media.
(pp. pp. 454-463).
AAAI
|
Zannettou, S;
Bradlyn, B;
De Cristofaro, E;
Sirivianos, M;
Stringhini, G;
Kwak, H;
Blackburn, J;
(2018)
What is Gab: A Bastion of Free Speech or an Alt-Right Echo Chamber.
In: Champin, PA and Gandon, F and Médini, L and Lalmas, M and Ipeirotis, PG, (eds.)
WWW '18: Companion Proceedings of the The Web Conference 2018.
(pp. pp. 1007-1014).
International World Wide Web Conferences Steering Committee: Geneva, Switzerland.
|
Zannettou, S;
Caulfield, T;
Blackburn, J;
De Cristofaro, E;
Sirivianos, M;
Stringhini, G;
Suarez-Tangil, G;
(2018)
On the Origins of Memes by Means of Fringe Web Communities.
In:
Proceedings of the Internet Measurement Conference 2018.
(pp. pp. 188-202).
The Association for Computing Machinery: New York (NY), USA.
|
2017
Andriotis, P;
Li, S;
Spyridopoulos, T;
Stringhini, G;
(2017)
A comparative study of android users’ privacy preferences under the runtime permission model.
In: Tryfonas, T, (ed.)
Human Aspects of Information Security, Privacy and Trust. HAS 2017. Lecture Notes in Computer Science.
(pp. pp. 604-622).
Springer: Cham.
|
Becker, IF;
Hutchings, A;
Abu-Salma, R;
Anderson, R;
Bohm, N;
Murdoch, S;
Sasse, MA;
(2017)
International comparison of bank fraud reimbursement: customer perceptions and contractual terms.
Journal of Cybersecurity
, 3
(2)
pp. 109-125.
10.1093/cybsec/tyx011.
|
Becker, IF;
Hutchings, A;
Abu-Salma, R;
Anderson, R;
Bohm, N;
Murdoch, SJ;
Sasse, A;
(2017)
International Comparison of Bank Fraud Reimbursement: Customer Perceptions and Contractual Terms.
[Dataset].
UCL Computer Science: London, UK.
|
Chatzakou, D;
Kourtellis, N;
Blackburn, J;
Cristofaro, ED;
Stringhini, G;
Vakali, A;
(2017)
Detecting Aggressors and Bullies on Twitter.
In: Barrett, R and Cummings, R and Agichtein, E and Gabrilovich, E, (eds.)
Proceedings of the 26th International Conference on World Wide Web Companion.
(pp. pp. 767-768).
ACM: Perth, Australia.
|
Chatzakou, D;
Kourtellis, N;
Blackburn, J;
De Cristofaro, E;
Stringhini, G;
Vakali, A;
(2017)
Hate is not binary: Studying abusive behavior of #GamerGate on Twitter.
In:
HT '17 Proceedings of the 28th ACM Conference on Hypertext and Social Media.
(pp. pp. 65-74).
ACM: New York, USA.
|
Chatzakou, D;
Kourtellis, N;
Blackburn, J;
De Cristofaro, E;
Stringhini, G;
Vakali, A;
(2017)
Mean birds: Detecting aggression and bullying on Twitter.
In:
Proceedings of the 2017 ACM on Web Science Conference.
(pp. pp. 13-22).
ACM publishing: Troy, NY, USA.
|
Chatzakou, D;
Kourtellis, N;
Blackburn, J;
De Cristofaro, E;
Stringhini, G;
Vakali, A;
(2017)
Measuring #GamerGate: A Tale of Hate, Sexism, and Bullying.
In: Barrett, R and Cummings, R and Agichtein, E and Gabrilovich, E, (eds.)
WWW '17: Companion Proceedings of the 26th International Conference on World Wide Web Companion.
(pp. pp. 1285-1290).
Association for Computing Machinery (ACM): New York, NY, USA.
|
Egele, M;
Stringhini, G;
Kruegel, C;
Vigna, G;
(2017)
Towards Detecting Compromised Accounts on Social Networks.
IEEE Transactions on Dependable and Secure Computing (TDSC)
, 14
(4)
pp. 447-460.
10.1109/TDSC.2015.2479616.
|
Haslebacher, A;
Onaolapo, J;
Stringhini, G;
(2017)
All Your Cards Are Belong To Us: Understanding Online Carding Forums.
In:
Electronic Crime Research (eCrime), 2017 APWG Symposium on.
IEEE: Scottsdale, AZ, USA.
|
Hine, G;
Onaolapo, J;
De Cristofaro, E;
Kourtellis, N;
Leontiadis, I;
Samaras, R;
Stringhini, G;
(2017)
Kek, Cucks, and God Emperor Trump: A Measurement Study of 4chan's Politically Incorrect Forum and its Effects on the Web.
In: Gonzalez-Bailon, S and Marwick, A and Mason, W, (eds.)
Proceedings of the Eleventh International AAAI Conference on Web and Social Media (ICWSM 2017).
(pp. pp. 92-101).
Association for the Advancement of Artificial Intelligence (AAAI): Montreal, Canada.
|
Kolodenker, E;
Koch, W;
Stringhini, G;
Egele, M;
(2017)
PayBreak: Defense against cryptographic ransomware.
In:
Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security (ASIACCS).
(pp. pp. 599-611).
ACM (Association for Computing Machinery)
|
Mariconti, E;
Onaolapo, J;
Ahmad, S;
Nikiforou, N;
Egele, M;
Nikiforakis, N;
Stringhini, G;
(2017)
What's in a Name? Understanding Profile Name Reuse on Twitter.
In: Barrett, R and Cummings, R and Agichtein, E and Gabrilovich, E, (eds.)
Proceedings of the 26th International World Wide Web Conference (WWW 2017).
(pp. pp. 1161-1170).
Association for Computing Machinery (ACM): New York, NY, USA.
|
Mariconti, E;
Onaolapo, J;
Ross, G;
Stringhini, G;
(2017)
The Cause of All Evils: Assessing Causality Between User Actions and Malware Activity.
In:
Proceedings of the 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET '17).
USENIX: Vancouver, Canada.
|
Mariconti, E;
Onwuzurike, L;
Andriotis, P;
De Cristofaro, E;
Ross, G;
Stringhini, G;
(2017)
MamaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models.
In:
Proceedings of the ISOC Network and Distributed Systems Security Symposium (NDSS).
Internet Society: San Diego, CA, USA.
|
Mba, G;
Onaolapo, J;
Cavallaro, L;
Stringhini, G;
(2017)
Flipping 419 Scams: Targeting the Weak and the Vulnerable.
In:
WWW '17 Companion Proceedings of the 26th International Conference on World Wide Web Companion.
(pp. pp. 1301-1310).
ACM (Association for Computing Machinery): New York, USA.
|
Mba, G;
Onaolapo, J;
Stringhini, G;
Cavallaro, L;
(2017)
Flipping 419 Cybercrime Scams: Targeting the Weak and the Vulnerable.
In: Barrett, R and Cummings, R and Agichtein, E and Gabrilovich, E, (eds.)
Proceedings of the 26th International Conference on World Wide Web Companion.
(pp. pp. 1301-1310).
ACM
|
Nilizadeh, S;
Labreche, F;
Sedighian, A;
Zand, A;
Fernandez, J;
Kruegel, C;
Stringhini, G;
(2017)
POISED: Spotting Twitter Spam Off the Beaten Paths.
In: Thuraisingham, B and Evans, D and Malkin, T and Xu, D, (eds.)
CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security.
(pp. pp. 1159-1174).
Association for Computing Machinery (ACM): New York, NY, USA.
|
Sajadmanesh, S;
Jafarzadeh, S;
Osia, SA;
Rabiee, HR;
Haddadi, H;
Mejova, Y;
Musolesi, M;
... Stringhini, G; + view all
(2017)
Kissing Cuisines: Exploring Worldwide Culinary Habits on the Web.
In:
Proceedings of the 26th International Conference on World Wide Web Companion.
(pp. pp. 1013-1021).
ACM publishing
|
Serra, J;
Leontiadis, I;
Spathis, D;
Blackburn, J;
Stringhini, G;
Vakali, A;
(2017)
Class-based Prediction Errors to Detect Hate Speech with Out-of-vocabulary Words.
In: Nivre, J and Bhattacharyya, P and Hearst, M and Zhou, M, (eds.)
Proceedings of the annual meeting of the Association of Computational Linguistics (ACL) 2017 - ALW1: 1st Workshop on Abusive Language Online.
: Vancouver, Canada.
|
Stringhini, G;
Shen, Y;
Han, Y;
Zhang, X;
(2017)
Marmite: Spreading Malicious File Reputation Through Download Graphs.
In:
ACSAC 2017: Proceedings of the 33rd Annual Computer Security Applications Conference.
(pp. pp. 91-102).
Association for Computing Machinery (ACM): New York, NY, USA.
|
Weissbacher, M;
Mariconti, E;
Suarez-Tangil, G;
Stringhini, G;
Robertson, W;
Kirda, E;
(2017)
Ex-Ray: Detection of History-Leaking Browser Extensions.
In:
ACSAC 2017: Proceedings of the 33rd Annual Computer Security Applications Conference.
(pp. pp. 590-602).
Association for Computing Machinery (ACM): New York, NY, USA.
|
Whitty, M;
Edwards, M;
Levi, M;
Peersman, C;
Rashid, A;
Sasse, MA;
Sorell, T;
(2017)
Ethical and Social Challenges with developing Automated Methods to Detect and Warn potential victims of Mass-marketing Fraud (MMF).
In: Barrett, R and Cummings, R and Agichtein, E and Gabrilovich, E, (eds.)
WWW '17: Companion Proceedings of the 26th International Conference on World Wide Web Companion.
(pp. pp. 1311-1314).
Association for Computing Machinery (ACM): New York, NY, USA.
|
Zannettou, S;
Caulfield, T;
De Cristofaro, E;
Kourtellis, N;
Leontiadis, I;
Sirivianos, M;
Stringhini, G;
(2017)
The Web Centipede: Understanding How Web Communities Influence Each Other Through the Lens of Mainstream and Alternative News Sources.
In: Uhlig, S and Maennel, O, (eds.)
IMC '17: Proceedings of the 2017 Internet Measurement Conference.
(pp. pp. 405-417).
Association for Computing Machinery (ACM): New York, NY, USA.
|
2016
Andriotis, P;
Sasse, MA;
Stringhini, G;
(2016)
Permissions Snapshots: Assessing Users' Adaptation to the Android Runtime Permission Model.
In:
2016 IEEE International Workshop on Information Forensics and Security (WIFS).
Institute of Electrical and Electronics Engineers (IEEE): Abu Dhabi, UAE.
|
Andriotis, P;
Sasse, MA;
Stringhini, G;
(2016)
Permissions Snapshots: Assessing Users’ Adaptation to the Android Runtime Permission Model.
[Dataset].
UCL Computer Science: London, UK.
|
Becker, I;
Hutchings, A;
Abu-Salma, R;
Anderson, R;
Bohm, N;
Murdoch, SJ;
Sasse, MA;
(2016)
International Comparison of Bank Fraud Reimbursement: Customer Perceptions and Contractual Terms.
In:
Proceedings of the 15th Annual Workshop on the Economics of Information Security (WEIS).
Workshop on the Economics of Information Security (WEIS): Berkeley, CA, USA.
(In press).
|
Becker, IF;
Hutchings, A;
Abu-Salma, R;
Anderson, R;
Bohm, N;
Murdoch, SJ;
Sasse, MA;
(2016)
International Comparison of Bank Fraud Reimbursement: Customer Perceptions and Contractual Terms.
[Dataset].
UCL Computer Science
|
Lazarov, M;
Onaolapo, J;
Stringhini, G;
(2016)
Honey Sheets: What Happens to Leaked Google Spreadsheets?
In: Eide, E and Payer, M, (eds.)
Proceedings of CSET '16: 9th USENIX Workshop on Cyber Security Experimentation and Test.
USENIX: Austin, TX, USA.
|
Lazarov, M;
Onaolapo, J;
Stringhini, G;
(2016)
Honey Sheets: What Happens to Leaked Google Spreadsheets?
[Dataset].
UCL Computer Science: London, UK.
|
Mariconti, E;
Onaolapo, J;
Ross, G;
Stringhini, G;
(2016)
What's your major threat? On the differences between the network behavior of targeted and commodity malware.
In:
Proceedings of the 2016 11th International Conference on Availability, Reliability and Security (ARES).
(pp. pp. 599-608).
IEEE: Salzburg, Austria.
|
Mariconti, E;
Onaolapo, J;
Ross, G;
Stringhini, G;
(2016)
What's your major threat? On the differences between the network behavior of targeted and commodity malware.
[Dataset].
UCL Computer Science: London, UK.
|
Murdoch, SJ;
Becker, I;
Abu-Salma, R;
Anderson, R;
Bohm, N;
Hutchings, A;
Sasse, MA;
(2016)
Are Payment Card Contracts Unfair?
In: Grossklags, J and Preneel, B, (eds.)
International Conference on Financial Cryptography and Data Security FC 2016: Financial Cryptography and Data Security.
(pp. pp. 600-608).
Springer
|
Onaolapo, J;
Mariconti, E;
Stringhini, G;
(2016)
What Happens After You Are Pwnd: Understanding The Use Of Leaked Webmail Credentials In The Wild.
In:
Proceedings of the ACM Internet Measurement Conference 2016 (IMC 2016).
(pp. pp. 65-79).
Association for Computing Machinery (ACM): New York, NY, USA.
|
Onaolapo, J;
Stringhini, G;
Mariconti, E;
(2016)
Understanding The Use Of Stolen Webmail Credentials In The Wild.
[Dataset].
UCL Computer Science: London, UK.
|
2015
Hao, S;
Borgolte, K;
Nikiforakis, N;
Stringhini, G;
Egele, M;
Eubanks, M;
Krebs, B;
(2015)
Drops for stuff: An analysis of reshipping mule scams.
In: Ray, I and Li, N and Kruegel, C, (eds.)
CCS '15: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security.
(pp. pp. 1081-1092).
Association for Computing Machinery (ACM): New York, NY, USA.
|
Huang, JM;
Stringhini, G;
Yong, P;
(2015)
Quit playing games with my heart: Understanding online dating scams.
In:
Detection of Intrusions and Malware, and Vulnerability Assessment.
(pp. pp. 216-236).
Springer
|
Murdoch, SJ;
Becker, I;
Abu-Salma, R;
Anderson, R;
Bohm, N;
Hutchings, A;
Sasse, A;
(2015)
Are payment card contracts unfair?
[Dataset].
UCL Department of Computer Science: London, UK.
|
Stringhini, G;
Mourlanne, P;
Jacob, G;
Egele, M;
Kruegel, C;
Vigna, G;
(2015)
EvilCohort: Detecting Communities of Malicious Accounts on Online Services.
In:
Proceedings of the 24th USENIX Security Symposium.
(pp. pp. 563-578).
USENIX: Washington, D.C., USA.
|
Stringhini, G;
Thonnard, O;
(2015)
That ain’t you: Blocking spearphishing through behavioral modelling.
In:
Detection of Intrusions and Malware, and Vulnerability Assessment.
(pp. pp. 78-97).
Springer
|