Search dblp for Publications

export results for "toc:db/conf/ecrime/ecrime2016.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ecrime/BaslymanC16,
  author       = {Malak Baslyman and
                  Sonia Chiasson},
  title        = {"Smells Phishy?": An educational game about online phishing scams},
  booktitle    = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto,
                  ON, Canada, June 1-3, 2016},
  pages        = {91--101},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ECRIME.2016.7487946},
  doi          = {10.1109/ECRIME.2016.7487946},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/BaslymanC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/BidgoliKG16,
  author       = {Morvareed Bidgoli and
                  Bart P. Knijnenburg and
                  Jens Grossklags},
  title        = {When cybercrimes strike undergraduates},
  booktitle    = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto,
                  ON, Canada, June 1-3, 2016},
  pages        = {42--51},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ECRIME.2016.7487948},
  doi          = {10.1109/ECRIME.2016.7487948},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/BidgoliKG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/ButlerWP16,
  author       = {Blake Butler and
                  Brad Wardman and
                  Nate Pratt},
  title        = {{REAPER:} an automated, scalable solution for mass credential harvesting
                  and {OSINT}},
  booktitle    = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto,
                  ON, Canada, June 1-3, 2016},
  pages        = {71--80},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ECRIME.2016.7487944},
  doi          = {10.1109/ECRIME.2016.7487944},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/ButlerWP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/HutchingsCA16,
  author       = {Alice Hutchings and
                  Richard Clayton and
                  Ross J. Anderson},
  title        = {Taking down websites to prevent crime},
  booktitle    = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto,
                  ON, Canada, June 1-3, 2016},
  pages        = {102--111},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ECRIME.2016.7487947},
  doi          = {10.1109/ECRIME.2016.7487947},
  timestamp    = {Tue, 10 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/HutchingsCA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/LiaoZDA16,
  author       = {Kevin Liao and
                  Ziming Zhao and
                  Adam Doup{\'{e}} and
                  Gail{-}Joon Ahn},
  title        = {Behind closed doors: measurement and analysis of CryptoLocker ransoms
                  in Bitcoin},
  booktitle    = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto,
                  ON, Canada, June 1-3, 2016},
  pages        = {1--13},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ECRIME.2016.7487938},
  doi          = {10.1109/ECRIME.2016.7487938},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/LiaoZDA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/SundaresanMAP16,
  author       = {Srikanth Sundaresan and
                  Damon McCoy and
                  Sadia Afroz and
                  Vern Paxson},
  title        = {Profiling underground merchants based on network behavior},
  booktitle    = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto,
                  ON, Canada, June 1-3, 2016},
  pages        = {62--70},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ECRIME.2016.7487943},
  doi          = {10.1109/ECRIME.2016.7487943},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/SundaresanMAP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/VargasBVI16,
  author       = {Javier Vargas and
                  Alejandro Correa Bahnsen and
                  Sergio Villegas and
                  Daniel Ingevaldson},
  title        = {Knowing your enemies: leveraging data analysis to expose phishing
                  patterns against a major {US} financial institution},
  booktitle    = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto,
                  ON, Canada, June 1-3, 2016},
  pages        = {52--61},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ECRIME.2016.7487942},
  doi          = {10.1109/ECRIME.2016.7487942},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/VargasBVI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/WullinkMDMH16,
  author       = {Maarten Wullink and
                  Moritz M{\"{u}}ller and
                  Marco Davids and
                  Giovane C. M. Moura and
                  Cristian Hesselman},
  title        = {{ENTRADA:} enabling {DNS} big data applications},
  booktitle    = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto,
                  ON, Canada, June 1-3, 2016},
  pages        = {14--24},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ECRIME.2016.7487939},
  doi          = {10.1109/ECRIME.2016.7487939},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/WullinkMDMH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/Zhang-KennedyCO16,
  author       = {Leah Zhang{-}Kennedy and
                  Sonia Chiasson and
                  Paul C. van Oorschot},
  title        = {Revisiting password rules: facilitating human management of passwords},
  booktitle    = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto,
                  ON, Canada, June 1-3, 2016},
  pages        = {81--90},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ECRIME.2016.7487945},
  doi          = {10.1109/ECRIME.2016.7487945},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/Zhang-KennedyCO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/Zhang-KennedyFC16,
  author       = {Leah Zhang{-}Kennedy and
                  Elias Fares and
                  Sonia Chiasson and
                  Robert Biddle},
  title        = {Geo-Phisher: the design and evaluation of information visualizations
                  about internet phishing trends},
  booktitle    = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto,
                  ON, Canada, June 1-3, 2016},
  pages        = {30--41},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ECRIME.2016.7487941},
  doi          = {10.1109/ECRIME.2016.7487941},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/Zhang-KennedyFC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/ZhaoLW16,
  author       = {Xuan Zhao and
                  Jay Luan and
                  Matt Wolff},
  title        = {Evaluating randomness in cyber attack textual artifacts},
  booktitle    = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto,
                  ON, Canada, June 1-3, 2016},
  pages        = {25--29},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ECRIME.2016.7487940},
  doi          = {10.1109/ECRIME.2016.7487940},
  timestamp    = {Wed, 04 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/ZhaoLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ecrime/2016,
  title        = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto,
                  ON, Canada, June 1-3, 2016},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7486625/proceeding},
  isbn         = {978-1-5090-2922-8},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics