Measuring and analyzing {Search-Redirection} attacks in the illicit online prescription drug trade N Leontiadis, T Moore, N Christin 20th USENIX Security Symposium (USENIX Security 11), 2011 | 144 | 2011 |
A nearly four-year longitudinal study of search-engine poisoning N Leontiadis, T Moore, N Christin Proceedings of the 21st ACM conference on Computer and Communications …, 2014 | 73 | 2014 |
Fashion crimes: trending-term exploitation on the web T Moore, N Leontiadis, N Christin Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 69 | 2011 |
Pick your poison: pricing and inventories at unlicensed online pharmacies N Leontiadis, T Moore, N Christin Proceedings of the fourteenth ACM conference on Electronic commerce, 621-638, 2013 | 40 | 2013 |
Supply chain management and NFC picking demonstrations using the AspireRfid middleware platform N Kefalakis, N Leontiadis, J Soldatos, K Gama, D Donsez Proceedings of the ACM/IFIP/USENIX Middleware'08 conference companion, 66-69, 2008 | 34 | 2008 |
Scripting the crime commission process in the illicit online prescription drug trade N Leontiadis, A Hutchings Journal of Cybersecurity 1 (1), 81-92, 2015 | 31 | 2015 |
Middleware building blocks for architecting rfid systems N Kefalakis, N Leontiadis, J Soldatos, D Donsez Mobile Lightweight Wireless Systems: First International ICST Conference …, 2009 | 30 | 2009 |
Measuring and mitigating oauth access token abuse by collusion networks S Farooqi, F Zaffar, N Leontiadis, Z Shafiq Proceedings of the 2017 Internet Measurement Conference, 355-368, 2017 | 28 | 2017 |
Malicious Browser Extensions at Scale: Bridging the Observability Gap between Web Site and Browser LF DeKoven, S Savage, GM Voelker, N Leontiadis 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 17), 2017 | 25 | 2017 |
Empirically measuring WHOIS misuse N Leontiadis, N Christin Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014 | 14 | 2014 |
{SocialHEISTing}: Understanding Stolen Facebook Accounts J Onaolapo, N Leontiadis, D Magka, G Stringhini 30th USENIX Security Symposium (USENIX Security 21), 4115-4132, 2021 | 10 | 2021 |
Structuring disincentives for online criminals N Leontiadis Carnegie Mellon University, 2014 | 8 | 2014 |
Following their footsteps: Characterizing account automation abuse and defenses LF DeKoven, T Pottinger, S Savage, GM Voelker, N Leontiadis Proceedings of the Internet Measurement Conference 2018, 43-55, 2018 | 7 | 2018 |
Bridging RFID systems and enterprise applications through virtualized connectors N Leontiadis, N Kefalakis, J Soldatos International Journal of Automated Identification Technology (IJAIT) 1 (2), 1-12, 2010 | 7 | 2010 |
A lookup service in an interconnected world of uniquely identified objects E Polytarchos, N Leontiadis, S Eliakis, K Pramatari 2008 IEEE International Conference on Emerging Technologies and Factory …, 2008 | 4 | 2008 |
Stick It to The Man: Correcting for {Non-Cooperative} Behavior of Subjects in Experiments on Social Networks K Clary, E Tosch, J Onaolapo, DD Jensen 31st USENIX Security Symposium (USENIX Security 22), 3771-3788, 2022 | 1 | 2022 |
FP7 Contract: ICT-215417-CP J Soldatos, N Kefalakis, N Mitton, L Schmidt-INRIA, M David-AAU, ... | | 2009 |
Secure Network Management Using a Key Distribution Center NN Leontiadis, VP Kemerlis, PA Frangoudis, GC Polyzos | | |