default search action
eCrime 2013, San Francisco, CA, USA
- 2013 APWG eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013. IEEE 2013, ISBN 978-1-4799-1158-5
- Brad Wardman, Lisa Kelly, Michael Weideman:
Voice of the customer. 1-7 - Shams Zawoad, Amit Kumar Dutta, Alan P. Sprague, Ragib Hasan, Jason Britt, Gary Warner:
Phish-Net: Investigating phish clusters using drop email addresses. 1-13 - Mohammad Karami, Shiva Ghaemi, Damon McCoy:
Folex: An analysis of an herbal and counterfeit luxury goods affiliate program. 1-9 - Marie Vasek, Tyler Moore:
Empirical analysis of factors affecting malware URL detection. 1-8 - Malte Möser, Rainer Böhme, Dominic Breuker:
An inquiry into money laundering tools in the Bitcoin ecosystem. 1-14 - Sadia Afroz, Vaibhav Garg, Damon McCoy, Rachel Greenstadt:
Honor among thieves: A common's analysis of cybercrime economies. 1-11 - Leah Zhang-Kennedy, Sonia Chiasson, Robert Biddle:
Password advice shouldn't be boring: Visualizing password guessing attacks. 1-11 - Thomas J. Holt, Yi Ting Chua, Olga Smirnova:
An exploration of the factors affecting the advertised price for stolen data. 1-10 - Guang-Gang Geng, Xiao-Dong Lee, Wei Wang, Shian-Shyong Tseng:
Favicon - a clue to phishing sites detection. 1-10 - Jonathan M. Spring:
A notation for describing the steps in indicator expansion. 1-6 - Aunshul Rege:
10v3.c0ns. 1-9 - Aditi Gupta, Hemank Lamba, Ponnurangam Kumaraguru:
$1.00 per RT #BostonMarathon #PrayForBoston: Analyzing fake content on Twitter. 1-12 - Dhia Mahjoub:
Monitoring a fast flux botnet using recursive and passive DNS: A case study. 1-9 - Jonathan M. Spring:
Modeling malicious domain name take-down dynamics: Why eCrime pays. 1-9
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.