Can I opt out yet? GDPR and the global illusion of cookie control I Sanchez-Rola, M Dell'Amico, P Kotzias, D Balzarotti, L Bilge, PA Vervier, ... Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019 | 202 | 2019 |
Tiresias: Predicting security events through deep learning Y Shen, E Mariconti, PA Vervier, G Stringhini Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 171 | 2018 |
Mind Your Blocks: On the Stealthiness of Malicious BGP Hijacks PA Vervier, O Thonnard, M Dacier Network and Distributed System Security (NDSS) Symposium, 2015 | 97 | 2015 |
Before toasters rise up: A view into the emerging iot threat landscape PA Vervier, Y Shen Research in Attacks, Intrusions, and Defenses: 21st International Symposium …, 2018 | 67 | 2018 |
The tangled genealogy of IoT malware E Cozzi, PA Vervier, M Dell'Amico, Y Shen, L Bilge, D Balzarotti Annual Computer Security Applications Conference, 1-16, 2020 | 62 | 2020 |
Vistracer: a visual analytics tool to investigate routing anomalies in traceroutes F Fischer, J Fuchs, PA Vervier, F Mansmann, O Thonnard Proceedings of the ninth international symposium on visualization for cyber …, 2012 | 44 | 2012 |
Iot security and privacy labels Y Shen, PA Vervier Privacy Technologies and Policy: 7th Annual Privacy Forum, APF 2019, Rome …, 2019 | 38 | 2019 |
Mind Your Own Business: A Longitudinal Study of Threats and Vulnerabilities in Enterprises. P Kotzias, L Bilge, PA Vervier, J Caballero NDSS, 2019 | 34 | 2019 |
Visual analytics for BGP monitoring and prefix hijacking identification E Biersack, Q Jacquemart, F Fischer, J Fuchs, O Thonnard, G Theodoridis, ... IEEE Network 26 (6), 33-39, 2012 | 33 | 2012 |
Journey to the Center of the Cookie Ecosystem: Unraveling Actors' Roles and Relationships I Sanchez-Rola, M Dell'Amico, D Balzarotti, PA Vervier, L Bilge 2021 IEEE Symposium on Security and Privacy (SP), 1990-2004, 2021 | 27 | 2021 |
Accurate real-time identification of malicious BGP hijacks Y Shen, HAN Yufei, PA Vervier US Patent 10,148,690, 2018 | 26 | 2018 |
Lean on me: Mining internet service dependencies from large-scale dns data M Dell'Amico, L Bilge, A Kayyoor, P Efstathopoulos, PA Vervier Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017 | 26 | 2017 |
Systems and methods for evaluating infection risks based on profiled user behaviors HAN Yufei, L Yumer, PA Vervier, M Dell'Amico US Patent 10,116,680, 2018 | 22 | 2018 |
When Sally Met Trackers: Web Tracking From the Users' Perspective S Dambra, I Sanchez-Rola, L Bilge, D Balzarotti 31st USENIX Security Symposium (USENIX Security 22), 2189-2206, 2022 | 16 | 2022 |
Understanding worldwide private information collection on android Y Shen, PA Vervier, G Stringhini arXiv preprint arXiv:2102.12869, 2021 | 15 | 2021 |
SpamTracer: How Stealthy Are Spammers? PA Vervier, O Thonnard 5th IEEE International Traffic Monitoring and Analysis (TMA) Workshop …, 2013 | 13 | 2013 |
Malicious BGP Hijacks: Appearances Can Be Deceiving PA Vervier, Q Jacquemart, J Schlamp, O Thonnard, G Carle, ... ICC CISS 2014, IEEE International Conference on Communications, 10-14 June …, 2014 | 9 | 2014 |
Systems and methods for mapping internet protocol addresses for an organization PA Vervier, Y Shen US Patent 10,440,047, 2019 | 5 | 2019 |
Spammers operations: a multifaceted strategic analysis O Thonnard, PA Vervier, M Dacier Security and Communication Networks 9 (4), 336-356, 2016 | 5 | 2016 |
Securing a network device by forecasting an attack event using a recurrent neural network Y Shen, PA Vervier US Patent 11,108,787, 2021 | 4 | 2021 |