Gianluca Stringhini
Gianluca Stringhini
Assistant Professor at Boston University
Dirección de correo verificada de bu.edu - Página principal
Título
Citado por
Citado por
Año
Detecting spammers on social networks
G Stringhini, C Kruegel, G Vigna
Proceedings of the 26th Annual Computer Security Applications Conference, 1-9, 2010
8292010
COMPA: Detecting Compromised Accounts on Social Networks
M Egele, G Stringhini, C Kruegel, G Vigna
Network & Distributed System Security Symposium (NDSS), 2013
2922013
The Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns.
B Stone-Gross, T Holz, G Stringhini, G Vigna
LEET 11, 4-4, 2011
1962011
Mean Birds: Detecting Aggression and Bullying on Twitter
D Chatzakou, N Kourtellis, J Blackburn, E De Cristofaro, G Stringhini, ...
ACM Web Science Conference (WebSci), 2017
1842017
Follow the Green: Growth and Dynamics in Twitter Follower Markets
G Stringhini, G Wang, M Egele, C Kruegel, G Vigna, H Zheng, BY Zhao
ACM SIGCOMM Internet Measurement Conference (IMC), 2013
1722013
MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models
E Mariconti, L Onwuzurike, P Andriotis, E De Cristofaro, G Ross, ...
Network and Distributed Systems Security Symposium (NDSS), 2017
1532017
Kek, Cucks, and God Emperor Trump: A Measurement Study of 4chan's Politically Incorrect Forum and Its Effects on the Web
GE Hine, J Onaolapo, E De Cristofaro, N Kourtellis, I Leontiadis, ...
AAAI International Conference on Web and Social Media (ICWSM), 2017
1392017
Shady Paths: Leveraging Surfing Crowds to Detect Malicious Web Pages
G Stringhini, C Kruegel, G Vigna
ACM SIGSAC Conference on Computer and Communications Security (CCS), 2013
1252013
PayBreak: Defense Against Cryptographic Ransomware
E Kolodenker, W Koch, G Stringhini, M Egele
ACM Asia Conference on Computer and Communications Security (ASIACCS), 2017
1212017
The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements
A Zarras, A Kapravelos, G Stringhini, T Holz, C Kruegel, G Vigna
ACM SIGCOMM Internet Measurement Conference (IMC), 2014
1152014
Towards detecting compromised accounts on social networks
M Egele, G Stringhini, C Kruegel, G Vigna
IEEE Transactions on Dependable and Secure Computing (TDSC), 2017
1062017
Poultry Markets: On the Underground Economy of Twitter Followers
G Stringhini, M Egele, C Kruegel, G Vigna
Workshop on Online Social Networks (WOSN), 2012
892012
Large Scale Crowdsourcing and Characterization of Twitter Abusive Behavior
AM Founta, C Djouvas, D Chatzakou, I Leontiadis, J Blackburn, ...
International Conference on Web and Social Media (ICWSM), 2018
882018
On the Origins of Memes by Means of Fringe Web Communities
S Zannettou, T Caulfield, J Blackburn, E De Cristofaro, M Sirivianos, ...
ACM SIGCOMM Internet Measurement conference (IMC), 2018
842018
The Web Centipede: Understanding How Web Communities Influence Each Other Through the Lens of Mainstream and Alternative News Sources
S Zannettou, T Caulfield, E De Cristofaro, N Kourtellis, I Leontiadis, ...
ACM SIGCOMM Internet Measurement Conference (IMC), 2017
832017
What is Gab? A Bastion of Free Speech or an Alt-Right Echo Chamber?
S Zannettou, B Bradlyn, E De Cristofaro, M Sirivianos, G Stringhini, ...
Workshop on Computational Methods in CyberSafety, Online Harassment and …, 2018
792018
Disinformation warfare: Understanding state-sponsored trolls on Twitter and their influence on the Web
S Zannettou, T Caulfield, E De Cristofaro, M Sirivianos, G Stringhini, ...
Workshop on Computational Methods in Online Misbehavior (CYBERSAFETY), 2019
782019
EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services.
G Stringhini, P Mourlanne, G Jacob, M Egele, C Kruegel, G Vigna
Usenix Security Symposium, 2015
622015
What Happens after you are Pwnd: Understanding the Use of Leaked Webmail Credentials in the Wild
J Onaolapo, E Mariconti, G Stringhini
ACM SIGCOMM Internet Measurement Conference (IMC) 2016, 2016
602016
BOTMAGNIFIER: Locating Spambots on the Internet
G Stringhini, T Holz, B Stone-Gross, C Kruegel, G Vigna
USENIX Security Symposium, 2011
602011
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20