The Gospel according to Q: Understanding the QAnon Conspiracy from the Perspective of Canonical Information | 0 | 0.34 | 2022 |
"It Is Just a Flu": Assessing the Effect of Watch History on YouTube's Pseudoscientific Video Recommendations | 0 | 0.34 | 2022 |
Finding MNEMON: Reviving Memories of Node Embeddings | 0 | 0.34 | 2022 |
Why So Toxic?: Measuring and Triggering Toxic Behavior in Open-Domain Chatbots. | 0 | 0.34 | 2022 |
A Large-scale Temporal Measurement of Android Malicious Apps: Persistence, Migration, and Lessons Learned | 0 | 0.34 | 2022 |
Shedding Light on the Targeted Victim Profiles of Malicious Downloaders. | 0 | 0.34 | 2022 |
Slapping Cats, Bopping Heads, and Oreo Shakes: Understanding Indicators of Virality in TikTok Short Videos | 0 | 0.34 | 2022 |
A First Look at Zoombombing | 0 | 0.34 | 2022 |
TrollMagnifier: Detecting State-Sponsored Troll Accounts on Reddit | 0 | 0.34 | 2022 |
Cerberus: Exploring Federated Prediction of Security Events | 0 | 0.34 | 2022 |
Understanding Worldwide Private Information Collection On Android | 0 | 0.34 | 2021 |
Do Platform Migrations Compromise Content Moderation? Evidence from r/The_Donald and r/Incels | 0 | 0.34 | 2021 |
“Is it a Qoincidence?”: An Exploratory Study of QAnon on Voat | 0 | 0.34 | 2021 |
Understanding the Use of Fauxtography on Social Media | 0 | 0.34 | 2021 |
"How over is it?" Understanding the Incel Community on YouTube. | 0 | 0.34 | 2021 |
A First Look at Zoombombing | 0 | 0.34 | 2021 |
"I'm a Professor, which isn't usually a dangerous job": Internet-facilitated Harassment and Its Impact on Researchers. | 0 | 0.34 | 2021 |
To Err.Is Human: Characterizing The Threat Of Unintended Urls In Social Media | 0 | 0.34 | 2021 |
Understanding the Effect of Deplatforming on Social Networks | 0 | 0.34 | 2021 |
JABBIC Lookups: A Backend Telemetry-Based System for Malware Triage | 0 | 0.34 | 2021 |
ANDRuspex: Leveraging Graph Representation Learning to Predict Harmful App Installations on Mobile Devices | 0 | 0.34 | 2021 |
A Large Open Dataset from the Parler Social Network. | 0 | 0.34 | 2021 |
Dissecting the Meme Magic: Understanding Indicators of Virality in Image Memes. | 0 | 0.34 | 2021 |
A Human-Centered Systematic Literature Review of Cyberbullying Detection Algorithms. | 0 | 0.34 | 2021 |
SocialHEISTing: Understanding Stolen Facebook Accounts | 0 | 0.34 | 2021 |
MOSafely: Building an Open-Source HCAI Community to Make the Internet a Safer Place for Youth | 0 | 0.34 | 2021 |
A Human-Centered Systematic Literature Review of the Computational Approaches for Online Sexual Risk Detection. | 0 | 0.34 | 2021 |
“Go eat a bat, Chang!”: On the Emergence of Sinophobic Behavior on Web Communities in the Face of COVID-19 | 0 | 0.34 | 2021 |
You Don't Know How I Feel - Insider-Outsider Perspective Gaps in Cyberbullying Risk Detection. | 0 | 0.34 | 2021 |
SoK: Hate, Harassment, and the Changing Landscape of Online Abuse | 2 | 0.39 | 2021 |
AppJitsu: Investigating the Resiliency of Android Applications | 0 | 0.34 | 2021 |
Raiders of the Lost Kek: 3.5 Years of Augmented 4chan Posts from the Politically Incorrect Board | 0 | 0.34 | 2020 |
A Measurement Study on the Advertisements Displayed to Web Users Coming from the Regular Web and from Tor | 1 | 0.34 | 2020 |
BOTection: Bot Detection by Building Markov Chain Models of Bots Network Behavior | 1 | 0.36 | 2020 |
Automatically Dismantling Online Dating Fraud. | 1 | 0.36 | 2020 |
Measuring and Characterizing Hate Speech on News Websites | 0 | 0.34 | 2020 |
Characterizing the Use of Images in State-Sponsored Information Warfare Operations by Russian Trolls on Twitter. | 0 | 0.34 | 2020 |
Characterizing the Use of Images by State-Sponsored Troll Accounts on Twitter. | 0 | 0.34 | 2019 |
Disturbed YouTube for Kids: Characterizing and Detecting Disturbing Content on YouTube. | 0 | 0.34 | 2019 |
Attack2vec: Leveraging Temporal Word Embeddings To Understand The Evolution Of Cyberattacks | 0 | 0.34 | 2019 |
Automatically Dismantling Online Dating Fraud. | 0 | 0.34 | 2019 |
Master of Sheets: A Tale of Compromised Cloud Documents | 0 | 0.34 | 2019 |
PYTHIA: a Framework for the Automated Analysis of Web Hosting Environments | 0 | 0.34 | 2019 |
MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version). | 10 | 0.49 | 2019 |
BorderPatrol: Securing BYOD using Fine-Grained Contextual Information | 1 | 0.35 | 2019 |
Cybersafety Threats - from Deception to Aggression (Dagstuhl Seminar 19302). | 0 | 0.34 | 2019 |
A Qualitative Evaluation of Two Different Law Enforcement Approaches on Dark Net Markets | 0 | 0.34 | 2019 |
Who Watches the Watchmen: Exploring Complaints on the Web | 1 | 0.36 | 2019 |
Movie Pirates of the Caribbean: Exploring Illegal Streaming Cyberlockers. | 2 | 0.38 | 2018 |
Session details: Session 9B: Mobile Security 2 | 0 | 0.34 | 2018 |