Zobrazeno 1 - 10
of 53
pro vyhledávání: '"MARICONTI, ENRICO"'
Autor:
Papasavva, Antonis, Johnson, Shane, Lowther, Ed, Lundrigan, Samantha, Mariconti, Enrico, Markovska, Anna, Tuptuk, Nilufer
Fraud is a prevalent offence that extends beyond financial loss, causing psychological and physical harm to victims. The advancements in online communication technologies alowed for online fraud to thrive in this vast network, with fraudsters increas
Externí odkaz:
http://arxiv.org/abs/2409.19022
Location-based games have come to the forefront of popularity in casual and mobile gaming over the past six years. However, there is no hard data on crimes that these games enable, ranging from assault to cyberstalking to grooming. Given these potent
Externí odkaz:
http://arxiv.org/abs/2304.02952
Autor:
Papasavva, Antonis, Mariconti, Enrico
Online communities are groups of people who interact primarily via the Internet, often sharing common interests. Some of these groups, particularly supporters of Q who created the far-right conspiracy theory known as QAnon, are highly toxic and contr
Externí odkaz:
http://arxiv.org/abs/2302.01397
Autor:
Naseri, Mohammad, Han, Yufei, Mariconti, Enrico, Shen, Yun, Stringhini, Gianluca, De Cristofaro, Emiliano
Publikováno v:
Proceedings of the 29th ACM Conference on Computer and Communications Security (ACM CCS 2022)
Modern defenses against cyberattacks increasingly rely on proactive approaches, e.g., to predict the adversary's next actions based on past events. Building accurate prediction models requires knowledge from many organizations; alas, this entails dis
Externí odkaz:
http://arxiv.org/abs/2209.03050
Malware affects millions of users worldwide, impacting the daily lives of many people as well as businesses. Malware infections are increasing in complexity and unfold over a number of stages. A malicious downloader often acts as the starting point a
Externí odkaz:
http://arxiv.org/abs/2208.13278
Publikováno v:
In Journal of Archaeological Science November 2024 171
Android malware is a continuously expanding threat to billions of mobile users around the globe. Detection systems are updated constantly to address these threats. However, a backlash takes the form of evasion attacks, in which an adversary changes m
Externí odkaz:
http://arxiv.org/abs/2202.13922
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
In Expert Systems With Applications 15 October 2023 228
Publikováno v:
ACM SIGSAC Conference on Computer and Communications Security (CCS), 2018
With the increased complexity of modern computer attacks, there is a need for defenders not only to detect malicious activity as it happens, but also to predict the specific steps that will be taken by an adversary when performing an attack. However
Externí odkaz:
http://arxiv.org/abs/1905.10328