UCL Discovery
UCL home » Library Services » Electronic resources » UCL Discovery

Browse by UCL people

Group by: Type | Date
Jump to: 2019 | 2018 | 2017 | 2016 | 2015
Number of items: 52.

2019

Zannettou, S; Sirivianos, M; Caulfield, T; Stringhini, G; De Cristofaro, E; Blackburn, J; (2019) Disinformation warfare: Understanding state-sponsored trolls on twitter and their influence on the web. In: WWW '19 Companion Proceedings of The 2019 World Wide Web Conference. (pp. pp. 218-226). ACM: New York (NY), USA. Green open access
file

2018

Andriotis, P; Stringhini, G; Sasse, MA; (2018) Studying users' adaptation to Android's run-time fine-grained access control system. Journal of Information Security and Applications , 40 pp. 31-43. 10.1016/j.jisa.2018.02.004. Green open access
file

Bernard-Jones, E; Onaolapo, J; Stringhini, G; (2018) BABELTOWER: How Language Affects Criminal Activity in Stolen Webmail Accounts. In: (Proceedings) The Web Conference. ACM Green open access
file

Edwards, M; Suarez-Tangil, G; Peersman, C; Stringhini, G; Rashid, A; Whitty, M; (2018) The Geography of Online Dating Fraud. In: Proceedings of the Workshop on Technology and Consumer Protection (ConPro ’18). IEEE-TCSP: San Francisco, CA, USA. Green open access
file

Ibosiola, D; Steer, B; Garcia-Recuero, A; Stringhini, G; Uhlig, S; Tyson, G; (2018) Movie Pirates of the Caribbean: Exploring Illegal Streaming Cyberlockers. In: Proceedings of the Twelfth International Conference on Web And Social Media. (pp. pp. 131-140). Association for the Advancement of Artificial Intelligence (AAAI): Stanford, CA, USA. Green open access
file

Ioannou, A; Blackburn, J; Stringhini, G; De Cristofaro, E; Kourtellis, N; Sirivianos, M; (2018) From risk factors to detection and intervention: a practical proposal for future work on cyberbullying. Behaviour and Information Technology , 37 (3) pp. 258-266. 10.1080/0144929X.2018.1432688. Green open access
file

Mariconti, E; Suarez-Tangil, G; Blackburn, J; Cristofaro, ED; Kourtellis, N; Leontiadis, I; Serrano, JL; (2018) "You Know What to Do": Proactive Detection of YouTube Videos Targeted by Coordinated Hate Attacks. In: Gilbert, Eric and Karahalios, Karrie, (eds.) Proceedings of the 22nd ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW’19). (pp. p. 207). ACM (Association for Computing Machinery): New York, NY, USA. Green open access
file

Onwuzurike, L; Almeida, M; Mariconti, E; Blackburn, J; Stringhini, G; De Cristofaro, E; (2018) A Family of Droids-Android Malware Detection via Behavioral Modeling: Static vs Dynamic Analysis. In: 2018 16th Annual Conference on Privacy, Security and Trust (PST). IEEE Green open access
file

Perez, B; Musolesi, M; Stringhini, G; (2018) You are your Metadata: Identification and Obfuscation of Social Media Users using Metadata Information. In: Proceedings of Twelfth International AAAI Conference on Web and Social Media. (pp. pp. 241-250). The AAAI Press: Palo Alto, CA, USA. Green open access
file

Shen, Y; Mariconti, E; Vervier, P-A; Stringhini, G; (2018) Tiresias: Predicting Security Events Through Deep Learning. In: CCS '18 Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. (pp. pp. 592-605). Association for Computing Machinery (ACM): New York, NY, USA. Green open access
file

Zannettou, S; Blackburn, J; Sirivianos, M; Stringhini, G; (2018) Understanding Web Archiving Services and Their (Mis)Use on Social Media. In: Twelfth International AAAI Conference on Web and Social Media. (pp. pp. 454-463). AAAI Green open access
file

Zannettou, S; Bradlyn, B; De Cristofaro, E; Sirivianos, M; Stringhini, G; Kwak, H; Blackburn, J; (2018) What is Gab: A Bastion of Free Speech or an Alt-Right Echo Chamber. In: Champin, PA and Gandon, F and Médini, L and Lalmas, M and Ipeirotis, PG, (eds.) WWW '18: Companion Proceedings of the The Web Conference 2018. (pp. pp. 1007-1014). International World Wide Web Conferences Steering Committee: Geneva, Switzerland. Green open access
file

Zannettou, S; Caulfield, T; Blackburn, J; De Cristofaro, E; Sirivianos, M; Stringhini, G; Suarez-Tangil, G; (2018) On the Origins of Memes by Means of Fringe Web Communities. In: Proceedings of the Internet Measurement Conference 2018. (pp. pp. 188-202). The Association for Computing Machinery: New York (NY), USA. Green open access
file

2017

Andriotis, P; Li, S; Spyridopoulos, T; Stringhini, G; (2017) A comparative study of android users’ privacy preferences under the runtime permission model. In: Tryfonas, T, (ed.) Human Aspects of Information Security, Privacy and Trust. HAS 2017. Lecture Notes in Computer Science. (pp. pp. 604-622). Springer: Cham. Green open access
file

Becker, IF; Hutchings, A; Abu-Salma, R; Anderson, R; Bohm, N; Murdoch, S; Sasse, MA; (2017) International comparison of bank fraud reimbursement: customer perceptions and contractual terms. Journal of Cybersecurity , 3 (2) pp. 109-125. 10.1093/cybsec/tyx011. Green open access
file

Becker, IF; Hutchings, A; Abu-Salma, R; Anderson, R; Bohm, N; Murdoch, SJ; Sasse, A; (2017) International Comparison of Bank Fraud Reimbursement: Customer Perceptions and Contractual Terms. [Dataset]. UCL Computer Science: London, UK. Green open access
file

Chatzakou, D; Kourtellis, N; Blackburn, J; Cristofaro, ED; Stringhini, G; Vakali, A; (2017) Detecting Aggressors and Bullies on Twitter. In: Barrett, R and Cummings, R and Agichtein, E and Gabrilovich, E, (eds.) Proceedings of the 26th International Conference on World Wide Web Companion. (pp. pp. 767-768). ACM: Perth, Australia. Green open access
file

Chatzakou, D; Kourtellis, N; Blackburn, J; De Cristofaro, E; Stringhini, G; Vakali, A; (2017) Hate is not binary: Studying abusive behavior of #GamerGate on Twitter. In: HT '17 Proceedings of the 28th ACM Conference on Hypertext and Social Media. (pp. pp. 65-74). ACM: New York, USA. Green open access
file

Chatzakou, D; Kourtellis, N; Blackburn, J; De Cristofaro, E; Stringhini, G; Vakali, A; (2017) Mean birds: Detecting aggression and bullying on Twitter. In: Proceedings of the 2017 ACM on Web Science Conference. (pp. pp. 13-22). ACM publishing: Troy, NY, USA. Green open access
file

Chatzakou, D; Kourtellis, N; Blackburn, J; De Cristofaro, E; Stringhini, G; Vakali, A; (2017) Measuring #GamerGate: A Tale of Hate, Sexism, and Bullying. In: Barrett, R and Cummings, R and Agichtein, E and Gabrilovich, E, (eds.) WWW '17: Companion Proceedings of the 26th International Conference on World Wide Web Companion. (pp. pp. 1285-1290). Association for Computing Machinery (ACM): New York, NY, USA. Green open access
file

Egele, M; Stringhini, G; Kruegel, C; Vigna, G; (2017) Towards Detecting Compromised Accounts on Social Networks. IEEE Transactions on Dependable and Secure Computing (TDSC) , 14 (4) pp. 447-460. 10.1109/TDSC.2015.2479616. Green open access
file

Haslebacher, A; Onaolapo, J; Stringhini, G; (2017) All Your Cards Are Belong To Us: Understanding Online Carding Forums. In: Electronic Crime Research (eCrime), 2017 APWG Symposium on. IEEE: Scottsdale, AZ, USA. Green open access
file

Hine, G; Onaolapo, J; De Cristofaro, E; Kourtellis, N; Leontiadis, I; Samaras, R; Stringhini, G; (2017) Kek, Cucks, and God Emperor Trump: A Measurement Study of 4chan's Politically Incorrect Forum and its Effects on the Web. In: Gonzalez-Bailon, S and Marwick, A and Mason, W, (eds.) Proceedings of the Eleventh International AAAI Conference on Web and Social Media (ICWSM 2017). (pp. pp. 92-101). Association for the Advancement of Artificial Intelligence (AAAI): Montreal, Canada. Green open access
filefile

Kolodenker, E; Koch, W; Stringhini, G; Egele, M; (2017) PayBreak: Defense against cryptographic ransomware. In: Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security (ASIACCS). (pp. pp. 599-611). ACM (Association for Computing Machinery) Green open access
file

Mariconti, E; Onaolapo, J; Ahmad, S; Nikiforou, N; Egele, M; Nikiforakis, N; Stringhini, G; (2017) What's in a Name? Understanding Profile Name Reuse on Twitter. In: Barrett, R and Cummings, R and Agichtein, E and Gabrilovich, E, (eds.) Proceedings of the 26th International World Wide Web Conference (WWW 2017). (pp. pp. 1161-1170). Association for Computing Machinery (ACM): New York, NY, USA. Green open access
file

Mariconti, E; Onaolapo, J; Ross, G; Stringhini, G; (2017) The Cause of All Evils: Assessing Causality Between User Actions and Malware Activity. In: Proceedings of the 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET '17). USENIX: Vancouver, Canada. Green open access
file

Mariconti, E; Onwuzurike, L; Andriotis, P; De Cristofaro, E; Ross, G; Stringhini, G; (2017) MamaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models. In: Proceedings of the ISOC Network and Distributed Systems Security Symposium (NDSS). Internet Society: San Diego, CA, USA. Green open access
file

Mba, G; Onaolapo, J; Cavallaro, L; Stringhini, G; (2017) Flipping 419 Scams: Targeting the Weak and the Vulnerable. In: WWW '17 Companion Proceedings of the 26th International Conference on World Wide Web Companion. (pp. pp. 1301-1310). ACM (Association for Computing Machinery): New York, USA. Green open access
file

Mba, G; Onaolapo, J; Stringhini, G; Cavallaro, L; (2017) Flipping 419 Cybercrime Scams: Targeting the Weak and the Vulnerable. In: Barrett, R and Cummings, R and Agichtein, E and Gabrilovich, E, (eds.) Proceedings of the 26th International Conference on World Wide Web Companion. (pp. pp. 1301-1310). ACM Green open access
file

Nilizadeh, S; Labreche, F; Sedighian, A; Zand, A; Fernandez, J; Kruegel, C; Stringhini, G; (2017) POISED: Spotting Twitter Spam Off the Beaten Paths. In: Thuraisingham, B and Evans, D and Malkin, T and Xu, D, (eds.) CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. (pp. pp. 1159-1174). Association for Computing Machinery (ACM): New York, NY, USA. Green open access
file

Sajadmanesh, S; Jafarzadeh, S; Osia, SA; Rabiee, HR; Haddadi, H; Mejova, Y; Musolesi, M; ... Stringhini, G; + view all (2017) Kissing Cuisines: Exploring Worldwide Culinary Habits on the Web. In: Proceedings of the 26th International Conference on World Wide Web Companion. (pp. pp. 1013-1021). ACM publishing Green open access
file

Serra, J; Leontiadis, I; Spathis, D; Blackburn, J; Stringhini, G; Vakali, A; (2017) Class-based Prediction Errors to Detect Hate Speech with Out-of-vocabulary Words. In: Nivre, J and Bhattacharyya, P and Hearst, M and Zhou, M, (eds.) Proceedings of the annual meeting of the Association of Computational Linguistics (ACL) 2017 - ALW1: 1st Workshop on Abusive Language Online. : Vancouver, Canada. Green open access
file

Stringhini, G; Shen, Y; Han, Y; Zhang, X; (2017) Marmite: Spreading Malicious File Reputation Through Download Graphs. In: ACSAC 2017: Proceedings of the 33rd Annual Computer Security Applications Conference. (pp. pp. 91-102). Association for Computing Machinery (ACM): New York, NY, USA. Green open access
file

Weissbacher, M; Mariconti, E; Suarez-Tangil, G; Stringhini, G; Robertson, W; Kirda, E; (2017) Ex-Ray: Detection of History-Leaking Browser Extensions. In: ACSAC 2017: Proceedings of the 33rd Annual Computer Security Applications Conference. (pp. pp. 590-602). Association for Computing Machinery (ACM): New York, NY, USA. Green open access
file

Whitty, M; Edwards, M; Levi, M; Peersman, C; Rashid, A; Sasse, MA; Sorell, T; (2017) Ethical and Social Challenges with developing Automated Methods to Detect and Warn potential victims of Mass-marketing Fraud (MMF). In: Barrett, R and Cummings, R and Agichtein, E and Gabrilovich, E, (eds.) WWW '17: Companion Proceedings of the 26th International Conference on World Wide Web Companion. (pp. pp. 1311-1314). Association for Computing Machinery (ACM): New York, NY, USA. Green open access
file

Zannettou, S; Caulfield, T; De Cristofaro, E; Kourtellis, N; Leontiadis, I; Sirivianos, M; Stringhini, G; (2017) The Web Centipede: Understanding How Web Communities Influence Each Other Through the Lens of Mainstream and Alternative News Sources. In: Uhlig, S and Maennel, O, (eds.) IMC '17: Proceedings of the 2017 Internet Measurement Conference. (pp. pp. 405-417). Association for Computing Machinery (ACM): New York, NY, USA. Green open access
file

2016

Andriotis, P; Sasse, MA; Stringhini, G; (2016) Permissions Snapshots: Assessing Users' Adaptation to the Android Runtime Permission Model. In: 2016 IEEE International Workshop on Information Forensics and Security (WIFS). Institute of Electrical and Electronics Engineers (IEEE): Abu Dhabi, UAE. Green open access
file

Andriotis, P; Sasse, MA; Stringhini, G; (2016) Permissions Snapshots: Assessing Users’ Adaptation to the Android Runtime Permission Model. [Dataset]. UCL Computer Science: London, UK. Green open access
file

Becker, I; Hutchings, A; Abu-Salma, R; Anderson, R; Bohm, N; Murdoch, SJ; Sasse, MA; (2016) International Comparison of Bank Fraud Reimbursement: Customer Perceptions and Contractual Terms. In: Proceedings of the 15th Annual Workshop on the Economics of Information Security (WEIS). Workshop on the Economics of Information Security (WEIS): Berkeley, CA, USA. (In press). Green open access
file

Becker, IF; Hutchings, A; Abu-Salma, R; Anderson, R; Bohm, N; Murdoch, SJ; Sasse, MA; (2016) International Comparison of Bank Fraud Reimbursement: Customer Perceptions and Contractual Terms. [Dataset]. UCL Computer Science Green open access
file

Lazarov, M; Onaolapo, J; Stringhini, G; (2016) Honey Sheets: What Happens to Leaked Google Spreadsheets? In: Eide, E and Payer, M, (eds.) Proceedings of CSET '16: 9th USENIX Workshop on Cyber Security Experimentation and Test. USENIX: Austin, TX, USA. Green open access
file

Lazarov, M; Onaolapo, J; Stringhini, G; (2016) Honey Sheets: What Happens to Leaked Google Spreadsheets? [Dataset]. UCL Computer Science: London, UK. Green open access
file

Mariconti, E; Onaolapo, J; Ross, G; Stringhini, G; (2016) What's your major threat? On the differences between the network behavior of targeted and commodity malware. In: Proceedings of the 2016 11th International Conference on Availability, Reliability and Security (ARES). (pp. pp. 599-608). IEEE: Salzburg, Austria. Green open access
file

Mariconti, E; Onaolapo, J; Ross, G; Stringhini, G; (2016) What's your major threat? On the differences between the network behavior of targeted and commodity malware. [Dataset]. UCL Computer Science: London, UK. Green open access
file

Murdoch, SJ; Becker, I; Abu-Salma, R; Anderson, R; Bohm, N; Hutchings, A; Sasse, MA; (2016) Are Payment Card Contracts Unfair? In: Grossklags, J and Preneel, B, (eds.) International Conference on Financial Cryptography and Data Security FC 2016: Financial Cryptography and Data Security. (pp. pp. 600-608). Springer Green open access
file

Onaolapo, J; Mariconti, E; Stringhini, G; (2016) What Happens After You Are Pwnd: Understanding The Use Of Leaked Webmail Credentials In The Wild. In: Proceedings of the ACM Internet Measurement Conference 2016 (IMC 2016). (pp. pp. 65-79). Association for Computing Machinery (ACM): New York, NY, USA. Green open access
file

Onaolapo, J; Stringhini, G; Mariconti, E; (2016) Understanding The Use Of Stolen Webmail Credentials In The Wild. [Dataset]. UCL Computer Science: London, UK. Green open access
file

2015

Hao, S; Borgolte, K; Nikiforakis, N; Stringhini, G; Egele, M; Eubanks, M; Krebs, B; (2015) Drops for stuff: An analysis of reshipping mule scams. In: Ray, I and Li, N and Kruegel, C, (eds.) CCS '15: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. (pp. pp. 1081-1092). Association for Computing Machinery (ACM): New York, NY, USA. Green open access
file

Huang, JM; Stringhini, G; Yong, P; (2015) Quit playing games with my heart: Understanding online dating scams. In: Detection of Intrusions and Malware, and Vulnerability Assessment. (pp. pp. 216-236). Springer Green open access
file

Murdoch, SJ; Becker, I; Abu-Salma, R; Anderson, R; Bohm, N; Hutchings, A; Sasse, A; (2015) Are payment card contracts unfair? [Dataset]. UCL Department of Computer Science: London, UK. Green open access
file

Stringhini, G; Mourlanne, P; Jacob, G; Egele, M; Kruegel, C; Vigna, G; (2015) EvilCohort: Detecting Communities of Malicious Accounts on Online Services. In: Proceedings of the 24th USENIX Security Symposium. (pp. pp. 563-578). USENIX: Washington, D.C., USA. Green open access
file

Stringhini, G; Thonnard, O; (2015) That ain’t you: Blocking spearphishing through behavioral modelling. In: Detection of Intrusions and Malware, and Vulnerability Assessment. (pp. pp. 78-97). Springer Green open access
file

This list was generated on Sun Feb 1 02:30:52 2026 GMT.