- Srikanth Sundaresan, Damon McCoy, Sadia Afroz, Vern Paxson:
Profiling underground merchants based on network behavior. eCrime 2016: 62-70 - Javier Vargas, Alejandro Correa Bahnsen, Sergio Villegas, Daniel Ingevaldson:
Knowing your enemies: leveraging data analysis to expose phishing patterns against a major US financial institution. eCrime 2016: 52-61 - Maarten Wullink, Moritz Müller, Marco Davids, Giovane C. M. Moura, Cristian Hesselman:
ENTRADA: enabling DNS big data applications. eCrime 2016: 14-24 - Leah Zhang-Kennedy, Sonia Chiasson, Paul C. van Oorschot
:
Revisiting password rules: facilitating human management of passwords. eCrime 2016: 81-90 - Leah Zhang-Kennedy, Elias Fares, Sonia Chiasson, Robert Biddle:
Geo-Phisher: the design and evaluation of information visualizations about internet phishing trends. eCrime 2016: 30-41 - Xuan Zhao, Jay Luan, Matt Wolff:
Evaluating randomness in cyber attack textual artifacts. eCrime 2016: 25-29 - 2016 APWG Symposium on Electronic Crime Research, eCrime 2016, Toronto, ON, Canada, June 1-3, 2016. IEEE 2016, ISBN 978-1-5090-2922-8 [contents]
- 2015
- Ryan Johnson, Nikolaos Kiourtis, Angelos Stavrou
, Vincent Sritapan:
Analysis of content copyright infringement in mobile application markets. eCrime 2015: 43-52 - Zheng Dong, Apu Kapadia, Jim Blythe, L. Jean Camp:
Beyond the lock icon: real-time detection of phishing websites using public key certificates. eCrime 2015: 1-12 - Vaibhav Garg, L. Jean Camp:
Spare the rod, spoil the network security? Economic analysis of sanctions online. eCrime 2015: 59-68 - Tyler Moore, Richard Clayton:
Which malware lures work best? Measurements from a large instant messaging worm. eCrime 2015: 69-78 - Sergio de los Santos, Antonio Guzmán, Chema Alonso, Francisco Gómez-Rodríguez:
Chasing shuabang in apps stores. eCrime 2015: 13-21 - Jonathan M. Spring, Sarah Kern, Alec Summers:
Global adversarial capability modeling. eCrime 2015: 22-42 - Gary Warner
, Dhiraj Rajani, Mike Nagy:
Spammer success through customization and randomization of URLs. eCrime 2015: 53-58 - 2015 APWG Symposium on Electronic Crime Research, eCrime 2015, Barcelona, Spain, May 26-29, 2015. IEEE 2015, ISBN 978-1-4799-8909-6 [contents]
- 2014
- Prateek Dewan, Anand Kashyap, Ponnurangam Kumaraguru:
Analyzing social and stylometric features to identify spear phishing emails. eCrime 2014: 1-13 - Neha Gupta, Anupama Aggarwal, Ponnurangam Kumaraguru:
bit.ly/malicious: Deep dive into short URL based e-crime detection. eCrime 2014: 14-24 - Srishti Gupta, Ponnurangam Kumaraguru:
Emerging phishing trends and effectiveness of the anti-phishing landing page. eCrime 2014: 36-47 - Jackie Jones, Damon McCoy:
The check is in the mail: Monetization of Craigslist buyer scams. eCrime 2014: 25-35 - Jens Neisius, Richard Clayton:
Orchestrated crime: The high yield investment fraud ecosystem. eCrime 2014: 48-58 - 2014 APWG Symposium on Electronic Crime Research, eCrime 2014, Birmingham, AL, USA, September 23-25, 2014. IEEE 2014, ISBN 978-1-4799-6509-0 [contents]
- 2013
- Sadia Afroz, Vaibhav Garg, Damon McCoy, Rachel Greenstadt:
Honor among thieves: A common's analysis of cybercrime economies. eCrime 2013: 1-11 - Guang-Gang Geng
, Xiao-Dong Lee, Wei Wang, Shian-Shyong Tseng:
Favicon - a clue to phishing sites detection. eCrime 2013: 1-10 - Aditi Gupta, Hemank Lamba, Ponnurangam Kumaraguru:
$1.00 per RT #BostonMarathon #PrayForBoston: Analyzing fake content on Twitter. eCrime 2013: 1-12 - Thomas J. Holt, Yi Ting Chua, Olga Smirnova:
An exploration of the factors affecting the advertised price for stolen data. eCrime 2013: 1-10 - Mohammad Karami, Shiva Ghaemi, Damon McCoy:
Folex: An analysis of an herbal and counterfeit luxury goods affiliate program. eCrime 2013: 1-9 - Dhia Mahjoub:
Monitoring a fast flux botnet using recursive and passive DNS: A case study. eCrime 2013: 1-9 - Malte Möser, Rainer Böhme, Dominic Breuker:
An inquiry into money laundering tools in the Bitcoin ecosystem. eCrime 2013: 1-14 - Aunshul Rege:
10v3.c0ns. eCrime 2013: 1-9 - Jonathan M. Spring:
A notation for describing the steps in indicator expansion. eCrime 2013: 1-6