Export 5 results:
Filters: Author is Gianluca Stringhini  [Clear All Filters]
Shen Y, Stringhini G.  2019.  ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of Cyberattacks. 28th {USENIX} Security Symposium ({USENIX} Security 19). :905--921.
Mariconti E, Onaolapo J, Ross G, Stringhini G.  2017.  The Cause of All Evils: Assessing Causality Between User Actions and Malware Activity. 10th {USENIX} Workshop on Cyber Security Experimentation and Test ({CSET} 17).
Lazarov M, Onaolapo J, Stringhini G.  2016.  Honey Sheets: What Happens to Leaked Google Spreadsheets? 9th Workshop on Cyber Security Experimentation and Test ({CSET} 16).
Stringhini G, Egele M, Zarras A, Holz T, Kruegel C, Vigna G.  2012.  B@bel: Leveraging Email Delivery for Spam Mitigation. Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security 12). :16--32.