|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
No Growbag Graphs found.
|
|
|
Results
Found 157 publication records. Showing 157 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Tyler Moore 0001, Richard Clayton 0001 |
Which malware lures work best? Measurements from a large instant messaging worm. |
eCrime |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ryan Johnson 0002, Nikolaos Kiourtis, Angelos Stavrou, Vincent Sritapan |
Analysis of content copyright infringement in mobile application markets. |
eCrime |
2015 |
DBLP DOI BibTeX RDF |
|
1 | |
2015 APWG Symposium on Electronic Crime Research, eCrime 2015, Barcelona, Spain, May 26-29, 2015 |
eCrime |
2015 |
DBLP BibTeX RDF |
|
1 | Jonathan M. Spring, Sarah Kern, Alec Summers |
Global adversarial capability modeling. |
eCrime |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Vaibhav Garg, L. Jean Camp |
Spare the rod, spoil the network security? Economic analysis of sanctions online. |
eCrime |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Neha Gupta 0005, Anupama Aggarwal, Ponnurangam Kumaraguru |
bit.ly/malicious: Deep dive into short URL based e-crime detection. |
eCrime |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Srishti Gupta, Ponnurangam Kumaraguru |
Emerging phishing trends and effectiveness of the anti-phishing landing page. |
eCrime |
2014 |
DBLP DOI BibTeX RDF |
|
1 | |
2014 APWG Symposium on Electronic Crime Research, eCrime 2014, Birmingham, AL, USA, September 23-25, 2014 |
eCrime |
2014 |
DBLP BibTeX RDF |
|
1 | Jackie Jones, Damon McCoy |
The check is in the mail: Monetization of Craigslist buyer scams. |
eCrime |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Prateek Dewan, Anand Kashyap, Ponnurangam Kumaraguru |
Analyzing social and stylometric features to identify spear phishing emails. |
eCrime |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jens Neisius, Richard Clayton 0001 |
Orchestrated crime: The high yield investment fraud ecosystem. |
eCrime |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan M. Spring |
Modeling malicious domain name take-down dynamics: Why eCrime pays. |
eCrime |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Aunshul Rege |
10v3.c0ns. |
eCrime |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Guang-Gang Geng, Xiao-Dong Lee, Wei Wang 0083, Shian-Shyong Tseng |
Favicon - a clue to phishing sites detection. |
eCrime |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Thomas J. Holt, Yi Ting Chua 0001, Olga Smirnova |
An exploration of the factors affecting the advertised price for stolen data. |
eCrime |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Brad Wardman, Lisa Kelly, Michael Weideman |
Voice of the customer. |
eCrime |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sadia Afroz 0001, Vaibhav Garg, Damon McCoy, Rachel Greenstadt |
Honor among thieves: A common's analysis of cybercrime economies. |
eCrime |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan M. Spring |
A notation for describing the steps in indicator expansion. |
eCrime |
2013 |
DBLP DOI BibTeX RDF |
|
1 | |
2013 APWG eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013 |
eCrime |
2013 |
DBLP BibTeX RDF |
|
1 | Leah Zhang-Kennedy, Sonia Chiasson, Robert Biddle |
Password advice shouldn't be boring: Visualizing password guessing attacks. |
eCrime |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Marie Vasek, Tyler Moore 0001 |
Empirical analysis of factors affecting malware URL detection. |
eCrime |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Aditi Gupta 0003, Hemank Lamba, Ponnurangam Kumaraguru |
$1.00 per RT #BostonMarathon #PrayForBoston: Analyzing fake content on Twitter. |
eCrime |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Malte Möser, Rainer Böhme, Dominic Breuker |
An inquiry into money laundering tools in the Bitcoin ecosystem. |
eCrime |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Karami, Shiva Ghaemi, Damon McCoy |
Folex: An analysis of an herbal and counterfeit luxury goods affiliate program. |
eCrime |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Shams Zawoad, Amit Kumar Dutta, Alan P. Sprague, Ragib Hasan, Jason Britt, Gary Warner |
Phish-Net: Investigating phish clusters using drop email addresses. |
eCrime |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Dhia Mahjoub |
Monitoring a fast flux botnet using recursive and passive DNS: A case study. |
eCrime |
2013 |
DBLP DOI BibTeX RDF |
|
1 | |
2012 eCrime Researchers Summit, eCrime 2012, Las Croabas, PR, USA, October 23-24, 2012 |
eCrime |
2012 |
DBLP BibTeX RDF |
|
1 | Wei Gao, Thomas H. Morris, Bradley Reaves, Drew Richey |
On SCADA control system command and response injection and intrusion detection. |
eCrime |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Robert Layton, Paul A. Watters, Richard Dazeley |
Automatically determining phishing campaigns using the USCAP methodology. |
eCrime |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Marco Riccardi, David Oro, Jesus Luna, Marco Cremonini, Marc Vilanova |
A framework for financial botnet analysis. |
eCrime |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Brian K. Tanner, Gary Warner, Henry Stern, Scott Olechowski |
Koobface: The evolution of the social botnet. |
eCrime |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sangita Pillay, Thamar Solorio |
Authorship attribution of web forum posts. |
eCrime |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Fergus Toolan, Joe Carthy |
Feature selection for Spam and Phishing detection. |
eCrime |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Seckin Anil Unlu, Kemal Bicakci |
NoTabNab: Protection against the "tabnabbing attack". |
eCrime |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sean M. Zadig, Gurvirender P. Tejay |
Securing IS assets through hacker deterrence: A case study. |
eCrime |
2010 |
DBLP DOI BibTeX RDF |
|
1 | |
2010 eCrime Researchers Summit, eCrime 2010, Dallas, TX, USA, October 18-20, 2010 |
eCrime |
2010 |
DBLP BibTeX RDF |
|
1 | Liping Ma, John Yearwood, Paul A. Watters |
Establishing phishing provenance using orthographic features. |
eCrime |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Paul Knickerbocker, Dongting Yu, Jun Li 0001 |
Humboldt: A distributed phishing disruption system. |
eCrime |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Fergus Toolan, Joe Carthy |
Phishing detection using classifier ensembles. |
eCrime |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Onook Oh, Rajarshi Chakraborty, H. Raghav Rao, Shambhu J. Upadhyaya |
An exploration of unintended online private information disclosure in educational institutions across four countries. |
eCrime |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Paul A. Watters |
Why do users trust the wrong messages? A behavioural model of phishing. |
eCrime |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Steve Sheng, Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong |
Improving phishing countermeasures: An analysis of expert interviews. |
eCrime |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Mina Guirguis, Jason Valdez, Bassam El Lababedi, Joseph Valdez |
Burn Before Reading: A stealthy framework for combating live forensics examinations. |
eCrime |
2009 |
DBLP DOI BibTeX RDF |
|
1 | |
2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October 20-21, 2009 |
eCrime |
2009 |
DBLP BibTeX RDF |
|
1 | Brad Wardman, Gaurang Shukla, Gary Warner |
Identifying vulnerable websites by analysis of common strings in phishing URLs. |
eCrime |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Bradley Reaves, Thomas H. Morris |
Discovery, infiltration, and denial of service in a process control system wireless network. |
eCrime |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Shujun Li, Roland Schmitz |
A novel anti-phishing framework based on honeypots. |
eCrime |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Robert Layton, Paul A. Watters |
Determining provenance in phishing websites using automated conceptual analysis. |
eCrime |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Tyler Moore 0001, Richard Clayton 0001 |
The consequence of non-cooperation in the fight against phishing. |
eCrime |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Malte Hesse, Norbert Pohlmann |
Internet Situation Awareness. |
eCrime |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Ponnurangam Kumaraguru, Steve Sheng, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong |
Lessons from a real world evaluation of anti-phishing training. |
eCrime |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Danesh Irani, Steve Webb, Jonathon Giffin, Calton Pu |
Evolutionary study of phishing. |
eCrime |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Brad Wardman, Gary Warner |
Automating phishing website identification through deep MD5 matching. |
eCrime |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Christopher Soghoian |
Legal risks for phishing researchers. |
eCrime |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Steven A. Myers, Sid Stamm |
Practice & prevention of home-router mid-stream injection attacks. |
eCrime |
2008 |
DBLP DOI BibTeX RDF |
|
1 | |
2008 eCrime Researchers Summit, eCrime 2008, Atlanta, GA, USA, October 15-16, 2008 |
eCrime |
2008 |
DBLP BibTeX RDF |
|
1 | Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang 0001, Suku Nair |
A distributed architecture for phishing detection using Bayesian Additive Regression Trees. |
eCrime |
2008 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #157 of 157 (100 per page; Change: ) Pages: [ <<][ 1][ 2] |
|