- Dennis Tatang, Florian Quinkert, Thorsten Holz:
Below the Radar: Spotting DNS Tunnels in Newly Observed Hostnames in the Wild. eCrime 2019: 1-15 - Alexander Vetterl, Richard Clayton:
Honware: A Virtual Honeypot Framework for Capturing CPE and IoT Zero Days. eCrime 2019: 1-13 - 2019 APWG Symposium on Electronic Crime Research, eCrime 2019, Pittsburgh, PA, USA, November 13-15, 2019. IEEE 2019, ISBN 978-1-7281-6383-3 [contents]
- 2018
- Bushra A. AlAhmadi, Ivan Martinovic:
MalClassifier: Malware family classification using network flow sequence behaviour. eCrime 2018: 1-13 - Marc J. Dupuis, Faisal Khan:
Effects of peer feedback on password strength. eCrime 2018: 1-9 - Yahia Elsayed, Ahmed F. Shosha:
Large scale detection of IDN domain name masquerading. eCrime 2018: 1-11 - Richard J. Enbody, Aditya K. Sood, Pranshu Bajpai
:
A key-management-based taxonomy for ransomware. eCrime 2018: 1-12 - Artsiom Holub, Jeremiah O'Connor:
COINHOARDER: Tracking a ukrainian bitcoin phishing ring DNS style. eCrime 2018: 1-5 - Cristina Houle, Ruchika Pandey:
A layered approach to defending against list-linking email bombs. eCrime 2018: 1-9 - Eric Nunes, Paulo Shakarian, Gerardo I. Simari:
At-risk system identification via analysis of discussions on the darkweb. eCrime 2018: 1-12 - Adam Oest, Yeganeh Safaei, Adam Doupé, Gail-Joon Ahn
, Brad Wardman, Gary Warner:
Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis. eCrime 2018: 1-12 - Sophie Le Page, Guy-Vincent Jourdan, Gregor von Bochmann, Jason Flood, Iosif-Viorel Onut:
Using URL shorteners to compare phishing and malware attacks. eCrime 2018: 1-13 - Hongwei Tian, Stephen M. Gaffigan, D. Sean West, Damon McCoy:
Bullet-proof payment processors. eCrime 2018: 1-11 - 2018 APWG Symposium on Electronic Crime Research, eCrime 2018, San Diego, CA, USA, May 15-17, 2018. IEEE 2018, ISBN 978-1-5386-4922-0 [contents]
- 2017
- Sara Amini, Chris Kanich:
Characterizing the impact of malware infections and remediation attempts through support forum analysis. eCrime 2017: 70-78 - Alejandro Correa Bahnsen, Eduardo Contreras Bohorquez, Sergio Villegas, Javier Vargas, Fabio A. González:
Classifying phishing URLs using recurrent neural networks. eCrime 2017: 1-8 - Morvareed Bidgoli, Jens Grossklags:
"Hello. This is the IRS calling.": A case study on scams, extortion, impersonation, and phone spoofing. eCrime 2017: 57-69 - Mayank Dhiman, Markus Jakobsson, Ting-Fang Yen:
Breaking and fixing content-based filtering. eCrime 2017: 52-56 - Shehroze Farooqi, Guillaume Jourjon, Muhammad Ikram, Mohamed Ali Kâafar
, Emiliano De Cristofaro, Muhammad Zubair Shafiq, Arik Friedman, Fareed Zaffar:
Characterizing key stakeholders in an online black-hat marketplace. eCrime 2017: 17-27 - Andreas Haslebacher, Jeremiah Onaolapo, Gianluca Stringhini:
All your cards are belong to us: Understanding online carding forums. eCrime 2017: 41-51 - Alice Hutchings, Richard Clayton:
Configuring Zeus: A case study of online crime target selection and knowledge transmission. eCrime 2017: 33-40 - Hiroki Kuzuno, Christian Karam:
Blockchain explorer: An analytical process and investigation environment for bitcoin. eCrime 2017: 9-16 - Andrew Ruef, Eric Nunes, Paulo Shakarian, Gerardo I. Simari:
Measuring cyber attribution in games. eCrime 2017: 28-32 - Daniel R. Thomas
, Richard Clayton, Alastair R. Beresford:
1000 days of UDP amplification DDoS attacks. eCrime 2017: 79-84 - 2017 APWG Symposium on Electronic Crime Research, eCrime 2017, Phoenix, AZ, USA, April 25-27, 2017. IEEE 2017, ISBN 978-1-5386-2701-3 [contents]
- 2016
- Malak Baslyman
, Sonia Chiasson:
"Smells Phishy?": An educational game about online phishing scams. eCrime 2016: 91-101 - Morvareed Bidgoli, Bart P. Knijnenburg, Jens Grossklags:
When cybercrimes strike undergraduates. eCrime 2016: 42-51 - Blake Butler, Brad Wardman, Nate Pratt:
REAPER: an automated, scalable solution for mass credential harvesting and OSINT. eCrime 2016: 71-80 - Alice Hutchings, Richard Clayton, Ross J. Anderson:
Taking down websites to prevent crime. eCrime 2016: 102-111 - Kevin Liao, Ziming Zhao, Adam Doupé, Gail-Joon Ahn
:
Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin. eCrime 2016: 1-13