
-
The Gospel According to Q: Understanding the QAnon Conspiracy from the Perspective of Canonical Information
The QAnon conspiracy theory claims that a cabal of (literally) bloodthir...
read it
-
Dissecting the Meme Magic: Understanding Indicators of Virality in Image Memes
Despite the increasingly important role played by image memes, we do not...
read it
-
An Early Look at the Parler Online Social Network
Parler is as an "alternative" social network promoting itself as a servi...
read it
-
"It is just a flu": Assessing the Effect of Watch History on YouTube's Pseudoscientific Video Recommendations
YouTube has revolutionized the way people discover and consume videos, b...
read it
-
Does Platform Migration Compromise Content Moderation? Evidence from r/The_Donald and r/Incels
When toxic online communities on mainstream platforms face moderation me...
read it
-
Understanding the Use of Fauxtography on Social Media
Despite the influence that image-based communication has on online disco...
read it
-
"Is it a Qoincidence?": A First Step Towards Understanding and Characterizing the QAnon Movement on Voat.co
Online fringe communities offer fertile grounds for users to seek and sh...
read it
-
A First Look at Zoombombing
Online meeting tools like Zoom and Google Meet have become central to ou...
read it
-
Measuring and Characterizing Hate Speech on News Websites
The Web has become the main source for news acquisition. At the same tim...
read it
-
"Go eat a bat, Chang!": An Early Look on the Emergence of Sinophobic Behavior on Web Communities in the Face of COVID-19
The outbreak of the COVID-19 pandemic has changed our lives in unprecede...
read it
-
Understanding the Incel Community on YouTube
YouTube is by far the largest host of user-generated video content world...
read it
-
From Pick-Up Artists to Incels: A Data-Driven Sketch of the Manosphere
Over the past few years, a number of "fringe" online communities have be...
read it
-
Raiders of the Lost Kek: 3.5 Years of Augmented 4chan Posts from the Politically Incorrect Board
This paper presents a dataset with over 3.3M threads and 134.5M posts fr...
read it
-
Bridging Information Security and Environmental Criminology Research to Better Mitigate Cybercrime
Cybercrime is a complex phenomenon that spans both technical and human a...
read it
-
Detecting Cyberbullying and Cyberaggression in Social Media
Cyberbullying and cyberaggression are increasingly worrisome phenomena a...
read it
-
Automatically Dismantling Online Dating Fraud
Online romance scams are a prevalent form of mass-marketing fraud in the...
read it
-
ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of Cyberattacks
Despite the fact that cyberattacks are constantly growing in complexity,...
read it
-
Tiresias: Predicting Security Events Through Deep Learning
With the increased complexity of modern computer attacks, there is a nee...
read it
-
Pythia: a Framework for the Automated Analysis of Web Hosting Environments
A common approach when setting up a website is to utilize third party We...
read it
-
Who Watches the Watchmen: Exploring Complaints on the Web
Under increasing scrutiny, many web companies now offer bespoke mechanis...
read it
-
Disturbed YouTube for Kids: Characterizing and Detecting Disturbing Content on YouTube
A considerable number of the most-subscribed YouTube channels feature co...
read it
-
Characterizing the Use of Images by State-Sponsored Troll Accounts on Twitter
Anecdotal evidence has emerged suggesting that state-sponsored organizat...
read it
-
Who Let The Trolls Out? Towards Understanding State-Sponsored Trolls
Over the past few years, extensive anecdotal evidence emerged that sugge...
read it
-
LOBO -- Evaluation of Generalization Deficiencies in Twitter Bot Classifiers
Botnets in online social networks are increasingly often affecting the r...
read it
-
On the Origins of Memes by Means of Fringe Web Communities
Internet memes are increasingly used to sway and possibly manipulate pub...
read it
-
"You Know What to Do": Proactive Detection of YouTube Videos Targeted by Coordinated Hate Attacks
Over the years, the Web has shrunk the world, allowing individuals to sh...
read it
-
Movie Pirates of the Caribbean: Exploring Illegal Streaming Cyberlockers
Online video piracy (OVP) is a contentious topic, with strong proponents...
read it
-
You are your Metadata: Identification and Obfuscation of Social Media Users using Metadata Information
Metadata are associated to most of the information we produce in our dai...
read it
-
A Family of Droids: Analyzing Behavioral Model based Android Malware Detection via Static and Dynamic Analysis
As smartphones play an increasingly central role in our everyday lives, ...
read it
-
What is Gab? A Bastion of Free Speech or an Alt-Right Echo Chamber?
Over the past few years new "fringe" communities have been created and g...
read it
-
Understanding Web Archiving Services and Their (Mis)Use on Social Media
Either by ensuring the continuing availability of information, or by del...
read it
-
Eight Years of Rider Measurement in the Android Malware Ecosystem: Evolution and Lessons Learned
Despite the growing threat posed by Android malware, the research commun...
read it
-
MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version)
As Android becomes increasingly popular, so does malware targeting it, t...
read it
-
Email Babel: Does Language Affect Criminal Activity in Compromised Webmail Accounts?
We set out to understand the effects of differing language on the abilit...
read it
-
Measuring #GamerGate: A Tale of Hate, Sexism, and Bullying
Over the past few years, online aggression and abusive behaviors have oc...
read it
-
Kissing Cuisines: Exploring Worldwide Culinary Habits on the Web
Food and nutrition occupy an increasingly prevalent space on the web, an...
read it