Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 179 matches
- 2023
- Jan Bayer, Sourena Maroofi, Olivier Hureau, Andrzej Duda, Maciej Korczynski:
Building a Resilient Domain Whitelist to Enhance Phishing Blacklist Accuracy. eCrime 2023: 1-14 - Albert Calvo, Santiago Escuder, Josep Escrig, Xavier Marrugat-Plaza, Nil Ortiz, Jordi Guijarro:
Achieving High-Fidelity Explanations for Risk Exposition Assessment in the Cybersecurity Domain. eCrime 2023: 1-10 - Selina Cho, Jonathan Lusthaus, Ivan Flechais:
The Slippery Slope: Exploring the Parallels Between Game Cheating and Cybercrime Through Routine Activity Theory. eCrime 2023: 1-13 - Josh Clough, Matthew Edwards:
Pump, Dump, and then What? The Long-Term Impact of Cryptocurrency Pump-and-Dump Schemes. eCrime 2023: 1-17 - Ajka Draganovic, Savino Dambra, Javier Aldana-Iuit, Kevin Alejandro Roundy, Giovanni Apruzzese:
"Do Users Fall for Real Adversarial Phishing?" Investigating the Human Response to Evasive Webpages. eCrime 2023: 1-14 - Dimitrios Georgoulias, Jens Myrup Pedersen, Alice Hutchings, Morten Falch, Emmanouil Vasilomanolakis:
In the Market for a Botnet? An In-Depth Analysis of Botnet-Related Listings on Darkweb Marketplaces. eCrime 2023: 1-14 - Bernhard Haslhofer, Christiane Hanslbauer, Michael Fröwis, Thomas Goger:
Increasing the Efficiency of Cryptoasset Investigations by Connecting the Cases. eCrime 2023: 1-10 - Jessica Man, Gilberto Atondo Siu, Alice Hutchings:
Autism Disclosures and Cybercrime Discourse on a Large Underground Forum. eCrime 2023: 1-14 - Tom Meurs, Edward J. Cartwright, Anna Cartwright, Marianne Junger, Raphael Hoheisel, Erik Tews, Abhishta Abhishta:
Ransomware Economics: A Two-Step Approach To Model Ransom Paid. eCrime 2023: 1-13 - Anna Talas, Alice Hutchings:
Hacker's Paradise: Analysing Music in a Cybercrime Forum. eCrime 2023: 1-14 - Pouria Zahraei, Serguei A. Mokhov, Joey Paquet, Peyman Derafshkavian:
A Kubernetes Underlay for OpenTDIP Forensic Computing Backend. eCrime 2023: 1-10 - APWG Symposium on Electronic Crime Research, eCrime 2023, Barcelona, Spain, November 15-17, 2023. IEEE 2023, ISBN 979-8-3503-6027-1 [contents]
- 2022
- Michele Campobasso, Luca Allodi:
THREAT/crawl: a Trainable, Highly-Reusable, and Extensible Automated Method and Tool to Crawl Criminal Underground Forums. eCrime 2022: 1-13 - Ian W. Gray, Jack Cable, Benjamin Brown, Vlad Cuiujuclu, Damon McCoy:
Money Over Morals: A Business Analysis of Conti Ransomware. eCrime 2022: 1-12 - Lin Kyi, Elizabeth Stobert:
"I don't really give them piece of mind": User Perceptions of Social Engineering Attacks. eCrime 2022: 1-13 - Pablo López-Aguilar, Constantinos Patsakis, Agusti Solanas:
The Role of Extraversion in Phishing Victimisation: A Systematic Literature Review. eCrime 2022: 1-10 - Dalyapraz Manatova, Dewesha Sharma, Sagar Samtani, L. Jean Camp:
Building and Testing a Network of Social Trust in an Underground Forum: Robust Connections and Overlapping Criminal Domains. eCrime 2022: 1-12 - Tom Meurs, Marianne Junger, Erik Tews, Abhishta Abhishta:
Ransomware: How attacker's effort, victim characteristics and context influence ransom requested, payment and financial loss. eCrime 2022: 1-13 - Arghya Mukherjee, Tyler Moore:
Cryptocurrency Exchange Closure Revisited (Again). eCrime 2022: 1-8 - Audrey Randall, Wes Hardaker, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman:
The Challenges of Blockchain-Based Naming Systems for Malware Defenders. eCrime 2022: 1-14 - Gilberto Atondo Siu, Alice Hutchings, Marie Vasek, Tyler Moore:
"Invest in crypto!": An analysis of investment scam advertisements found in Bitcointalk. eCrime 2022: 1-12 - Bhaskar Tejaswi, Nayanamana Samarasinghe, Sajjad Pourali, Mohammad Mannan, Amr M. Youssef:
Leaky Kits: The Increased Risk of Data Exposure from Phishing Kits. eCrime 2022: 1-13 - APWG Symposium on Electronic Crime Research, eCrime 2022, Boston, MA, USA, November 30 - December 2, 2022. IEEE 2022, ISBN 979-8-3503-0169-4 [contents]
- 2021
- Svetlana Abramova, Rainer Böhme:
Out of the Dark: The Effect of Law Enforcement Actions on Cryptocurrency Market Prices. eCrime 2021: 1-11 - Maria Bada, Yi Ting Chua:
Understanding Risk and Risk Perceptions of Cybercrime in Underground Forums. eCrime 2021: 1-11 - Adrian Bermudez-Villalva, Gianluca Stringhini:
The shady economy: Understanding the difference in trading activity from underground forums in different layers of the Web. eCrime 2021: 1-10 - Veronica Chierzi, Fernando Mercês:
Evolution of IoT Linux Malware: A MITRE ATT&CK TTP Based Approach. eCrime 2021: 1-11 - Dimitrios Georgoulias, Jens Myrup Pedersen, Morten Falch, Emmanouil Vasilomanolakis:
A qualitative mapping of Darkweb marketplaces. eCrime 2021: 1-15 - Neeraj Kumar, Sukhada Ghewari, Harshal Tupsamudre, Manish Shukla, Sachin Lodha:
When Diversity Meets Hostility: A Study of Domain Squatting Abuse in Online Banking. eCrime 2021: 1-15 - Kevin Lee, Arvind Narayanan:
Security and Privacy Risks of Number Recycling at Mobile Carriers in the United States. eCrime 2021: 1-17
skipping 149 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-27 03:20 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint