You are here

Website Maintenance Alert

Due to scheduled maintenance, the USENIX website will not be available on Tuesday, December 17, from 10:00 am to 2:00 pm Pacific Daylight Time (UTC -7). We apologize for the inconvenience.

If you are trying to register for Enigma 2020, please complete your registration before or after this time period.


Export 5 results:
Filters: Author is Gianluca Stringhini  [Clear All Filters]
Shen Y, Stringhini G.  2019.  ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of Cyberattacks. 28th {USENIX} Security Symposium ({USENIX} Security 19). :905--921.
Mariconti E, Onaolapo J, Ross G, Stringhini G.  2017.  The Cause of All Evils: Assessing Causality Between User Actions and Malware Activity. 10th {USENIX} Workshop on Cyber Security Experimentation and Test ({CSET} 17).
Lazarov M, Onaolapo J, Stringhini G.  2016.  Honey Sheets: What Happens to Leaked Google Spreadsheets? 9th Workshop on Cyber Security Experimentation and Test ({CSET} 16).
Stringhini G, Egele M, Zarras A, Holz T, Kruegel C, Vigna G.  2012.  B@bel: Leveraging Email Delivery for Spam Mitigation. Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security 12). :16--32.