Systems and methods for assessing cyber risks using incident-origin information

Dell'amico Matteo , Han Yufei , Vervier Pierre-Antoine , Bilge Leylya

2019
Systems and methods for mapping services utilized by network domains

Matteo Dell'Amico , Pierre-Antoine Vervier , Leylya Yumer

2020
Tiresias: Predicting Security Events Through Deep Learning

Gianluca Stringhini , Yun Shen , Enrico Mariconti , Pierre-Antoine Vervier
arXiv: Cryptography and Security

128
2019
Journey to the Center of the Cookie Ecosystem: Unraveling Actors' Roles and Relationships

Leyla Bilge , Davide Balzarotti , Matteo Dell'Amico , Iskander Sanchez-Rola
ieee symposium on security and privacy

18
2021
Lean On Me: Mining Internet Service Dependencies From Large-Scale DNS Data

Matteo Dell'Amico , Leyla Bilge , Ashwin Kayyoor , Petros Efstathopoulos
annual computer security applications conference 449 -460

11
2017
Malicious BGP hijacks: Appearances can be deceiving

Pierre-Antoine Vervier , Quentin Jacquemart , Johann Schlamp , Olivier Thonnard
international conference on communications 884 -889

8
2014
Spammers operations: a multifaceted strategic analysis

O. Thonnard , Pierre-Antoine Vervier , M. Dacier
Security and Communication Networks 9 ( 4) 336 -356

3
2016
Mind Your Blocks: On the Stealthiness of Malicious BGP Hijacks

Pierre-Antoine Vervier , Olivier Thonnard , Marc Dacier
network and distributed system security symposium

36
2015
Mind Your Own Business: A Longitudinal Study of Threats and Vulnerabilities in Enterprises

Platon Kotzias , Leyla Bilge , Pierre-Antoine Vervier , Juan Caballero
Proceedings 2019 Network and Distributed System Security Symposium

9
2019
The Tangled Genealogy of IoT Malware

Emanuele Cozzi , Pierre-Antoine Vervier , Matteo Dell'Amico , Yun Shen
annual computer security applications conference 1 -16

5
2020
IoT Security and Privacy Labels

Yun Shen , Pierre-Antoine Vervier
privacy forum 136 -147

5
2019
Can I Opt Out Yet?: GDPR and the Global Illusion of Cookie Control

Iskander Sanchez-Rola , Matteo Dell'Amico , Platon Kotzias , Davide Balzarotti
computer and communications security 340 -351

154
2019
Systems and methods for evaluating infection risks based on profiled user behaviors

HAN Yufei , Leylya Yumer , Pierre-Antoine Vervier , Matteo Dell'Amico

28
2018
Systems and methods for determining the reputations of unknown files

Yun Shen , HAN Yufei , Pierre-Antoine Vervier

2
2019
Systems and methods for evaluating infection risks based on profiled user behaviors

HAN Yufei , Leylya Yumer , Pierre-Antoine Vervier , Matteo Dell'Amico

2019
A Large-scale Temporal Measurement of Android Malicious Apps: Persistence, Migration, and Lessons Learned

Yun Shen , Pierre-Antoine Vervier , Gianluca Stringhini
USENIX Security Symposium

6
2022
Before toasters rise up: A view into the emerging IoT threat landscape

Pierre-Antoine Vervier , Yun Shen
Research in Attacks, Intrusions, and Defenses: 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings 21 556 -576

73
2018