The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "eCrime"( http://dblp.L3S.de/Venues/eCrime )

URL (DBLP): http://dblp.uni-trier.de/db/conf/ecrime

Publication years (Num. hits)
2008-2009 (21) 2010-2013 (25) 2014-2016 (26) 2017-2018 (22) 2019-2020 (27) 2021-2022 (24) 2023 (12)
Publication types (Num. hits)
inproceedings(142) proceedings(15)
Venues (Conferences, Journals, ...)
eCrime(157)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 157 publication records. Showing 157 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Tyler Moore 0001, Richard Clayton 0001 Which malware lures work best? Measurements from a large instant messaging worm. Search on Bibsonomy eCrime The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ryan Johnson 0002, Nikolaos Kiourtis, Angelos Stavrou, Vincent Sritapan Analysis of content copyright infringement in mobile application markets. Search on Bibsonomy eCrime The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1 2015 APWG Symposium on Electronic Crime Research, eCrime 2015, Barcelona, Spain, May 26-29, 2015 Search on Bibsonomy eCrime The full citation details ... 2015 DBLP  BibTeX  RDF
1Jonathan M. Spring, Sarah Kern, Alec Summers Global adversarial capability modeling. Search on Bibsonomy eCrime The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Vaibhav Garg, L. Jean Camp Spare the rod, spoil the network security? Economic analysis of sanctions online. Search on Bibsonomy eCrime The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Neha Gupta 0005, Anupama Aggarwal, Ponnurangam Kumaraguru bit.ly/malicious: Deep dive into short URL based e-crime detection. Search on Bibsonomy eCrime The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Srishti Gupta, Ponnurangam Kumaraguru Emerging phishing trends and effectiveness of the anti-phishing landing page. Search on Bibsonomy eCrime The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1 2014 APWG Symposium on Electronic Crime Research, eCrime 2014, Birmingham, AL, USA, September 23-25, 2014 Search on Bibsonomy eCrime The full citation details ... 2014 DBLP  BibTeX  RDF
1Jackie Jones, Damon McCoy The check is in the mail: Monetization of Craigslist buyer scams. Search on Bibsonomy eCrime The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Prateek Dewan, Anand Kashyap, Ponnurangam Kumaraguru Analyzing social and stylometric features to identify spear phishing emails. Search on Bibsonomy eCrime The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jens Neisius, Richard Clayton 0001 Orchestrated crime: The high yield investment fraud ecosystem. Search on Bibsonomy eCrime The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jonathan M. Spring Modeling malicious domain name take-down dynamics: Why eCrime pays. Search on Bibsonomy eCrime The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Aunshul Rege 10v3.c0ns. Search on Bibsonomy eCrime The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Guang-Gang Geng, Xiao-Dong Lee, Wei Wang 0083, Shian-Shyong Tseng Favicon - a clue to phishing sites detection. Search on Bibsonomy eCrime The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Thomas J. Holt, Yi Ting Chua 0001, Olga Smirnova An exploration of the factors affecting the advertised price for stolen data. Search on Bibsonomy eCrime The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Brad Wardman, Lisa Kelly, Michael Weideman Voice of the customer. Search on Bibsonomy eCrime The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sadia Afroz 0001, Vaibhav Garg, Damon McCoy, Rachel Greenstadt Honor among thieves: A common's analysis of cybercrime economies. Search on Bibsonomy eCrime The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jonathan M. Spring A notation for describing the steps in indicator expansion. Search on Bibsonomy eCrime The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1 2013 APWG eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013 Search on Bibsonomy eCrime The full citation details ... 2013 DBLP  BibTeX  RDF
1Leah Zhang-Kennedy, Sonia Chiasson, Robert Biddle Password advice shouldn't be boring: Visualizing password guessing attacks. Search on Bibsonomy eCrime The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Marie Vasek, Tyler Moore 0001 Empirical analysis of factors affecting malware URL detection. Search on Bibsonomy eCrime The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Aditi Gupta 0003, Hemank Lamba, Ponnurangam Kumaraguru $1.00 per RT #BostonMarathon #PrayForBoston: Analyzing fake content on Twitter. Search on Bibsonomy eCrime The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Malte Möser, Rainer Böhme, Dominic Breuker An inquiry into money laundering tools in the Bitcoin ecosystem. Search on Bibsonomy eCrime The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mohammad Karami, Shiva Ghaemi, Damon McCoy Folex: An analysis of an herbal and counterfeit luxury goods affiliate program. Search on Bibsonomy eCrime The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Shams Zawoad, Amit Kumar Dutta, Alan P. Sprague, Ragib Hasan, Jason Britt, Gary Warner Phish-Net: Investigating phish clusters using drop email addresses. Search on Bibsonomy eCrime The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Dhia Mahjoub Monitoring a fast flux botnet using recursive and passive DNS: A case study. Search on Bibsonomy eCrime The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1 2012 eCrime Researchers Summit, eCrime 2012, Las Croabas, PR, USA, October 23-24, 2012 Search on Bibsonomy eCrime The full citation details ... 2012 DBLP  BibTeX  RDF
1Wei Gao, Thomas H. Morris, Bradley Reaves, Drew Richey On SCADA control system command and response injection and intrusion detection. Search on Bibsonomy eCrime The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Robert Layton, Paul A. Watters, Richard Dazeley Automatically determining phishing campaigns using the USCAP methodology. Search on Bibsonomy eCrime The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Marco Riccardi, David Oro, Jesus Luna, Marco Cremonini, Marc Vilanova A framework for financial botnet analysis. Search on Bibsonomy eCrime The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Brian K. Tanner, Gary Warner, Henry Stern, Scott Olechowski Koobface: The evolution of the social botnet. Search on Bibsonomy eCrime The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sangita Pillay, Thamar Solorio Authorship attribution of web forum posts. Search on Bibsonomy eCrime The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Fergus Toolan, Joe Carthy Feature selection for Spam and Phishing detection. Search on Bibsonomy eCrime The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Seckin Anil Unlu, Kemal Bicakci NoTabNab: Protection against the "tabnabbing attack". Search on Bibsonomy eCrime The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sean M. Zadig, Gurvirender P. Tejay Securing IS assets through hacker deterrence: A case study. Search on Bibsonomy eCrime The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1 2010 eCrime Researchers Summit, eCrime 2010, Dallas, TX, USA, October 18-20, 2010 Search on Bibsonomy eCrime The full citation details ... 2010 DBLP  BibTeX  RDF
1Liping Ma, John Yearwood, Paul A. Watters Establishing phishing provenance using orthographic features. Search on Bibsonomy eCrime The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Paul Knickerbocker, Dongting Yu, Jun Li 0001 Humboldt: A distributed phishing disruption system. Search on Bibsonomy eCrime The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Fergus Toolan, Joe Carthy Phishing detection using classifier ensembles. Search on Bibsonomy eCrime The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Onook Oh, Rajarshi Chakraborty, H. Raghav Rao, Shambhu J. Upadhyaya An exploration of unintended online private information disclosure in educational institutions across four countries. Search on Bibsonomy eCrime The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Paul A. Watters Why do users trust the wrong messages? A behavioural model of phishing. Search on Bibsonomy eCrime The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Steve Sheng, Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong Improving phishing countermeasures: An analysis of expert interviews. Search on Bibsonomy eCrime The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mina Guirguis, Jason Valdez, Bassam El Lababedi, Joseph Valdez Burn Before Reading: A stealthy framework for combating live forensics examinations. Search on Bibsonomy eCrime The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1 2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October 20-21, 2009 Search on Bibsonomy eCrime The full citation details ... 2009 DBLP  BibTeX  RDF
1Brad Wardman, Gaurang Shukla, Gary Warner Identifying vulnerable websites by analysis of common strings in phishing URLs. Search on Bibsonomy eCrime The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Bradley Reaves, Thomas H. Morris Discovery, infiltration, and denial of service in a process control system wireless network. Search on Bibsonomy eCrime The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Shujun Li, Roland Schmitz A novel anti-phishing framework based on honeypots. Search on Bibsonomy eCrime The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Robert Layton, Paul A. Watters Determining provenance in phishing websites using automated conceptual analysis. Search on Bibsonomy eCrime The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Tyler Moore 0001, Richard Clayton 0001 The consequence of non-cooperation in the fight against phishing. Search on Bibsonomy eCrime The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Malte Hesse, Norbert Pohlmann Internet Situation Awareness. Search on Bibsonomy eCrime The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Ponnurangam Kumaraguru, Steve Sheng, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong Lessons from a real world evaluation of anti-phishing training. Search on Bibsonomy eCrime The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Danesh Irani, Steve Webb, Jonathon Giffin, Calton Pu Evolutionary study of phishing. Search on Bibsonomy eCrime The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Brad Wardman, Gary Warner Automating phishing website identification through deep MD5 matching. Search on Bibsonomy eCrime The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Christopher Soghoian Legal risks for phishing researchers. Search on Bibsonomy eCrime The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Steven A. Myers, Sid Stamm Practice & prevention of home-router mid-stream injection attacks. Search on Bibsonomy eCrime The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1 2008 eCrime Researchers Summit, eCrime 2008, Atlanta, GA, USA, October 15-16, 2008 Search on Bibsonomy eCrime The full citation details ... 2008 DBLP  BibTeX  RDF
1Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang 0001, Suku Nair A distributed architecture for phishing detection using Bayesian Additive Regression Trees. Search on Bibsonomy eCrime The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #157 of 157 (100 per page; Change: )
Pages: [<<][1][2]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license