Comparing Vulnerability Severity and Exploits Using Case-Control Studies L Allodi, F Massacci ACM Transactions on Information and System Security 17 (1), 2014 | 218 | 2014 |
Security events and vulnerability data for cybersecurity risk estimation L Allodi, F Massacci Risk Analysis 37 (8), 1606-1627, 2017 | 139 | 2017 |
Economic Factors of Vulnerability Trade and Exploitation L Allodi ACM SIGSAC Conference on Computer and Communications Security (CCS '17 …, 2017 | 121 | 2017 |
Cognitive Triaging of Phishing Attacks A van der Heijden, L Allodi 28th USENIX Security Symposium, 1309--1326, 2019 | 103 | 2019 |
A preliminary analysis of vulnerability scores for attacks in wild: The ekits and sym datasets L Allodi, F Massacci Proceedings of the 2012 ACM Workshop on Building analysis datasets and …, 2012 | 92 | 2012 |
The need for new antiphishing measures against spear-phishing attacks L Allodi, T Chotza, E Panina, N Zannone IEEE Security & Privacy 18 (2), 23-34, 2019 | 71 | 2019 |
Then and now: On the maturity of the cybercrime markets the lesson that black-hat marketeers learned L Allodi, M Corradin, F Massacci IEEE Transactions on Emerging Topics in Computing 4 (1), 35-46, 2015 | 65 | 2015 |
The work‐averse cyberattacker model: theory and evidence from two million attack signatures L Allodi, F Massacci, J Williams Risk Analysis 42 (8), 1623-1642, 2022 | 56* | 2022 |
Measuring the accuracy of software vulnerability assessments: experiments with students and professionals L Allodi, M Cremonini, F Massacci, W Shim Empirical Software Engineering 25, 1063-1094, 2020 | 54* | 2020 |
Impersonation-as-a-service: Characterizing the emerging criminal infrastructure for user impersonation at scale M Campobasso, L Allodi Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 49 | 2020 |
Don’t forget the human: a crowdsourced approach to automate response and containment against spear phishing attacks P Burda, L Allodi, N Zannone 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020 | 40 | 2020 |
Identifying relevant information cues for vulnerability assessment using CVSS L Allodi, S Banescu, H Femmer, K Beckers Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018 | 40 | 2018 |
{MalwareLab}: Experimentation with Cybercrime Attack Tools L Allodi, V Kotov, F Massacci 6th Workshop on Cyber Security Experimentation and Test (CSET 13), 2013 | 40 | 2013 |
Quantitative assessment of risk reduction with cybercrime black market monitoring L Allodi, W Shim, F Massacci 2013 IEEE Security and Privacy Workshops, 165-172, 2013 | 38 | 2013 |
A bug bounty perspective on the disclosure of web vulnerabilities J Ruohonen, L Allodi arXiv preprint arXiv:1805.09850, 2018 | 35 | 2018 |
Testing the effectiveness of tailored phishing techniques in industry and academia: a field experiment P Burda, T Chotza, L Allodi, N Zannone Proceedings of the 15th International Conference on Availability …, 2020 | 34 | 2020 |
The heavy tails of vulnerability exploitation L Allodi International Symposium on Engineering Secure Software and Systems, 133-148, 2015 | 31 | 2015 |
Combining text and visual features to improve the identification of cloned webpages for early phishing detection B Van Dooremaal, P Burda, L Allodi, N Zannone Proceedings of the 16th International Conference on Availability …, 2021 | 29 | 2021 |
Estimating the assessment difficulty of CVSS environmental metrics: an experiment L Allodi, S Biagioni, B Crispo, K Labunets, F Massacci, W Santos Future Data and Security Engineering: 4th International Conference, FDSE …, 2017 | 22 | 2017 |
The influence of human factors on the intention to report phishing emails IA Marin, P Burda, N Zannone, L Allodi Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems …, 2023 | 20 | 2023 |