Name
Affiliation
Papers
LEYLA BILGE
Eurecom, Sophia Antipolis, France
30
Collaborators
Citations 
PageRank 
50
911
43.78
Referers 
Referees 
References 
2427
883
413
Search Limit
1001000
Title
Citations
PageRank
Year
When Sally Met Trackers: Web Tracking From the Users' Perspective00.342022
Journey to the Center of the Cookie Ecosystem: Unraveling Actors' Roles and Relationships00.342022
Does Every Second Count? Time-Based Evolution Of Malware Behavior In Sandboxes10.352021
When Malware Changed Its Mind - An Empirical Study of Variable Program Behaviors in the Real World.00.342021
How Did That Get In My Phone? Unwanted App Distribution on Android Devices10.342021
SoK: Cyber Insurance – Technical Challenges and a System Security Roadmap10.352020
The Tangled Genealogy of IoT Malware.30.392020
Can I Opt Out Yet? - GDPR and the Global Illusion of Cookie Control.50.422019
Mind Your Own Business - A Longitudinal Study of Threats and Vulnerabilities in Enterprises.00.342019
Spearphishing Malware: Do We Really Know The Unknown?00.342018
RiskTeller: Predicting the Risk of Cyber Incidents.70.462017
Lean On Me: Mining Internet Service Dependencies From Large-Scale DNS Data.40.452017
Measuring Pup Prevalence And Pup Distribution Through Pay-Per-Install Services120.722016
Needles in a Haystack: Mining Information from Public Dynamic Analysis Sandboxes for Malware Intelligence120.552015
The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics280.992015
Cutting the gordian knot: A look under the hood of ransomware attacks573.022015
Are You at Risk? Profiling Organizations and Individuals Subject to Targeted Attacks70.592015
The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching291.322015
On the effectiveness of risk prediction based on users browsing behavior130.772014
Exposure: A Passive DNS Analysis Service to Detect and Report Malicious Domains521.882014
Investigating Zero-Day Attacks.00.342013
Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis772.682012
Industrial espionage and targeted attacks: understanding the characteristics of an escalating threat171.152012
Before we knew it: an empirical study of zero-day attacks in the real world1265.042012
Thwarting real-time dynamic unpacking20.412011
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis.592.502011
G-Free: defeating return-oriented programming through gadget-less binaries1083.982010
CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms171.062010
All your contacts are belong to us: automated identity theft attacks on social networks24010.632009
Automatically generating models for botnet detection331.712009