Search dblp for Publications

export results for "stream:streams/conf/ecrime:"

 download as .bib file

@inproceedings{DBLP:conf/ecrime/BayerMHDK23,
  author       = {Jan Bayer and
                  Sourena Maroofi and
                  Olivier Hureau and
                  Andrzej Duda and
                  Maciej Korczynski},
  title        = {Building a Resilient Domain Whitelist to Enhance Phishing Blacklist
                  Accuracy},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2023, Barcelona,
                  Spain, November 15-17, 2023},
  pages        = {1--14},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/eCrime61234.2023.10485549},
  doi          = {10.1109/ECRIME61234.2023.10485549},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/BayerMHDK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/CalvoEEMOG23,
  author       = {Albert Calvo and
                  Santiago Escuder and
                  Josep Escrig and
                  Xavier Marrugat{-}Plaza and
                  Nil Ortiz and
                  Jordi Guijarro},
  title        = {Achieving High-Fidelity Explanations for Risk Exposition Assessment
                  in the Cybersecurity Domain},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2023, Barcelona,
                  Spain, November 15-17, 2023},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/eCrime61234.2023.10485502},
  doi          = {10.1109/ECRIME61234.2023.10485502},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/CalvoEEMOG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/ChoLF23,
  author       = {Selina Cho and
                  Jonathan Lusthaus and
                  Ivan Flechais},
  title        = {The Slippery Slope: Exploring the Parallels Between Game Cheating
                  and Cybercrime Through Routine Activity Theory},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2023, Barcelona,
                  Spain, November 15-17, 2023},
  pages        = {1--13},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/eCrime61234.2023.10485501},
  doi          = {10.1109/ECRIME61234.2023.10485501},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/ChoLF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/CloughE23,
  author       = {Josh Clough and
                  Matthew Edwards},
  title        = {Pump, Dump, and then What? The Long-Term Impact of Cryptocurrency
                  Pump-and-Dump Schemes},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2023, Barcelona,
                  Spain, November 15-17, 2023},
  pages        = {1--17},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/eCrime61234.2023.10485505},
  doi          = {10.1109/ECRIME61234.2023.10485505},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/CloughE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/DraganovicDARA23,
  author       = {Ajka Draganovic and
                  Savino Dambra and
                  Javier Aldana{-}Iuit and
                  Kevin Alejandro Roundy and
                  Giovanni Apruzzese},
  title        = {"Do Users Fall for Real Adversarial Phishing?" Investigating the Human
                  Response to Evasive Webpages},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2023, Barcelona,
                  Spain, November 15-17, 2023},
  pages        = {1--14},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/eCrime61234.2023.10485552},
  doi          = {10.1109/ECRIME61234.2023.10485552},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/DraganovicDARA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/GeorgouliasPHFV23,
  author       = {Dimitrios Georgoulias and
                  Jens Myrup Pedersen and
                  Alice Hutchings and
                  Morten Falch and
                  Emmanouil Vasilomanolakis},
  title        = {In the Market for a Botnet? An In-Depth Analysis of Botnet-Related
                  Listings on Darkweb Marketplaces},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2023, Barcelona,
                  Spain, November 15-17, 2023},
  pages        = {1--14},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/eCrime61234.2023.10485500},
  doi          = {10.1109/ECRIME61234.2023.10485500},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/GeorgouliasPHFV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/HaslhoferHFG23,
  author       = {Bernhard Haslhofer and
                  Christiane Hanslbauer and
                  Michael Fr{\"{o}}wis and
                  Thomas Goger},
  title        = {Increasing the Efficiency of Cryptoasset Investigations by Connecting
                  the Cases},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2023, Barcelona,
                  Spain, November 15-17, 2023},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/eCrime61234.2023.10485550},
  doi          = {10.1109/ECRIME61234.2023.10485550},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/HaslhoferHFG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/ManSH23,
  author       = {Jessica Man and
                  Gilberto {Atondo Siu} and
                  Alice Hutchings},
  title        = {Autism Disclosures and Cybercrime Discourse on a Large Underground
                  Forum},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2023, Barcelona,
                  Spain, November 15-17, 2023},
  pages        = {1--14},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/eCrime61234.2023.10485504},
  doi          = {10.1109/ECRIME61234.2023.10485504},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/ManSH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/MeursCCJHTA23,
  author       = {Tom Meurs and
                  Edward J. Cartwright and
                  Anna Cartwright and
                  Marianne Junger and
                  Raphael Hoheisel and
                  Erik Tews and
                  Abhishta Abhishta},
  title        = {Ransomware Economics: {A} Two-Step Approach To Model Ransom Paid},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2023, Barcelona,
                  Spain, November 15-17, 2023},
  pages        = {1--13},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/eCrime61234.2023.10485506},
  doi          = {10.1109/ECRIME61234.2023.10485506},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/MeursCCJHTA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/TalasH23,
  author       = {Anna Talas and
                  Alice Hutchings},
  title        = {Hacker's Paradise: Analysing Music in a Cybercrime Forum},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2023, Barcelona,
                  Spain, November 15-17, 2023},
  pages        = {1--14},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/eCrime61234.2023.10485503},
  doi          = {10.1109/ECRIME61234.2023.10485503},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/TalasH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/ZahraeiMPD23,
  author       = {Pouria Zahraei and
                  Serguei A. Mokhov and
                  Joey Paquet and
                  Peyman Derafshkavian},
  title        = {A Kubernetes Underlay for OpenTDIP Forensic Computing Backend},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2023, Barcelona,
                  Spain, November 15-17, 2023},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/eCrime61234.2023.10485551},
  doi          = {10.1109/ECRIME61234.2023.10485551},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/ZahraeiMPD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ecrime/2023,
  title        = {{APWG} Symposium on Electronic Crime Research, eCrime 2023, Barcelona,
                  Spain, November 15-17, 2023},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/eCrime61234.2023},
  doi          = {10.1109/ECRIME61234.2023},
  isbn         = {979-8-3503-6027-1},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/CampobassoA22,
  author       = {Michele Campobasso and
                  Luca Allodi},
  title        = {THREAT/crawl: a Trainable, Highly-Reusable, and Extensible Automated
                  Method and Tool to Crawl Criminal Underground Forums},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2022, Boston,
                  MA, USA, November 30 - December 2, 2022},
  pages        = {1--13},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/eCrime57793.2022.10142081},
  doi          = {10.1109/ECRIME57793.2022.10142081},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/CampobassoA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/GrayCBCM22,
  author       = {Ian W. Gray and
                  Jack Cable and
                  Benjamin Brown and
                  Vlad Cuiujuclu and
                  Damon McCoy},
  title        = {Money Over Morals: {A} Business Analysis of Conti Ransomware},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2022, Boston,
                  MA, USA, November 30 - December 2, 2022},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/eCrime57793.2022.10142119},
  doi          = {10.1109/ECRIME57793.2022.10142119},
  timestamp    = {Tue, 20 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/GrayCBCM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/KyiS22,
  author       = {Lin Kyi and
                  Elizabeth Stobert},
  title        = {"I don't really give them piece of mind": User Perceptions of Social
                  Engineering Attacks},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2022, Boston,
                  MA, USA, November 30 - December 2, 2022},
  pages        = {1--13},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/eCrime57793.2022.10142113},
  doi          = {10.1109/ECRIME57793.2022.10142113},
  timestamp    = {Tue, 20 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/KyiS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/Lopez-AguilarPS22,
  author       = {Pablo L{\'{o}}pez{-}Aguilar and
                  Constantinos Patsakis and
                  Agusti Solanas},
  title        = {The Role of Extraversion in Phishing Victimisation: {A} Systematic
                  Literature Review},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2022, Boston,
                  MA, USA, November 30 - December 2, 2022},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/eCrime57793.2022.10142078},
  doi          = {10.1109/ECRIME57793.2022.10142078},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/Lopez-AguilarPS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/ManatovaSSC22,
  author       = {Dalyapraz Manatova and
                  Dewesha Sharma and
                  Sagar Samtani and
                  L. Jean Camp},
  title        = {Building and Testing a Network of Social Trust in an Underground Forum:
                  Robust Connections and Overlapping Criminal Domains},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2022, Boston,
                  MA, USA, November 30 - December 2, 2022},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/eCrime57793.2022.10142120},
  doi          = {10.1109/ECRIME57793.2022.10142120},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/ManatovaSSC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/MeursJTA22,
  author       = {Tom Meurs and
                  Marianne Junger and
                  Erik Tews and
                  Abhishta Abhishta},
  title        = {Ransomware: How attacker's effort, victim characteristics and context
                  influence ransom requested, payment and financial loss},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2022, Boston,
                  MA, USA, November 30 - December 2, 2022},
  pages        = {1--13},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/eCrime57793.2022.10142138},
  doi          = {10.1109/ECRIME57793.2022.10142138},
  timestamp    = {Tue, 20 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/MeursJTA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/Mukherjee022,
  author       = {Arghya Mukherjee and
                  Tyler Moore},
  title        = {Cryptocurrency Exchange Closure Revisited (Again)},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2022, Boston,
                  MA, USA, November 30 - December 2, 2022},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/eCrime57793.2022.10142141},
  doi          = {10.1109/ECRIME57793.2022.10142141},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/Mukherjee022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/RandallHVSS22,
  author       = {Audrey Randall and
                  Wes Hardaker and
                  Geoffrey M. Voelker and
                  Stefan Savage and
                  Aaron Schulman},
  title        = {The Challenges of Blockchain-Based Naming Systems for Malware Defenders},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2022, Boston,
                  MA, USA, November 30 - December 2, 2022},
  pages        = {1--14},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/eCrime57793.2022.10142131},
  doi          = {10.1109/ECRIME57793.2022.10142131},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/RandallHVSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/SiuHV022,
  author       = {Gilberto {Atondo Siu} and
                  Alice Hutchings and
                  Marie Vasek and
                  Tyler Moore},
  title        = {"Invest in crypto!": An analysis of investment scam advertisements
                  found in Bitcointalk},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2022, Boston,
                  MA, USA, November 30 - December 2, 2022},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/eCrime57793.2022.10142100},
  doi          = {10.1109/ECRIME57793.2022.10142100},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/SiuHV022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/TejaswiSPMY22,
  author       = {Bhaskar Tejaswi and
                  Nayanamana Samarasinghe and
                  Sajjad Pourali and
                  Mohammad Mannan and
                  Amr M. Youssef},
  title        = {Leaky Kits: The Increased Risk of Data Exposure from Phishing Kits},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2022, Boston,
                  MA, USA, November 30 - December 2, 2022},
  pages        = {1--13},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/eCrime57793.2022.10142092},
  doi          = {10.1109/ECRIME57793.2022.10142092},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/TejaswiSPMY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ecrime/2022,
  title        = {{APWG} Symposium on Electronic Crime Research, eCrime 2022, Boston,
                  MA, USA, November 30 - December 2, 2022},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/eCrime57793.2022},
  doi          = {10.1109/ECRIME57793.2022},
  isbn         = {979-8-3503-0169-4},
  timestamp    = {Tue, 20 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/AbramovaB21,
  author       = {Svetlana Abramova and
                  Rainer B{\"{o}}hme},
  title        = {Out of the Dark: The Effect of Law Enforcement Actions on Cryptocurrency
                  Market Prices},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2021, Boston,
                  MA, USA, December 1-3, 2021},
  pages        = {1--11},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/eCrime54498.2021.9738787},
  doi          = {10.1109/ECRIME54498.2021.9738787},
  timestamp    = {Fri, 01 Apr 2022 15:15:45 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/AbramovaB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/BadaC21,
  author       = {Maria Bada and
                  Yi Ting Chua},
  title        = {Understanding Risk and Risk Perceptions of Cybercrime in Underground
                  Forums},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2021, Boston,
                  MA, USA, December 1-3, 2021},
  pages        = {1--11},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/eCrime54498.2021.9738790},
  doi          = {10.1109/ECRIME54498.2021.9738790},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/BadaC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/Bermudez-Villalva21,
  author       = {Adrian Bermudez{-}Villalva and
                  Gianluca Stringhini},
  title        = {The shady economy: Understanding the difference in trading activity
                  from underground forums in different layers of the Web},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2021, Boston,
                  MA, USA, December 1-3, 2021},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/eCrime54498.2021.9738751},
  doi          = {10.1109/ECRIME54498.2021.9738751},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/Bermudez-Villalva21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/ChierziM21,
  author       = {Veronica Chierzi and
                  Fernando Merc{\^{e}}s},
  title        = {Evolution of IoT Linux Malware: {A} {MITRE} ATT{\&}CK {TTP} Based
                  Approach},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2021, Boston,
                  MA, USA, December 1-3, 2021},
  pages        = {1--11},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/eCrime54498.2021.9738756},
  doi          = {10.1109/ECRIME54498.2021.9738756},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/ChierziM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/GeorgouliasPFV21,
  author       = {Dimitrios Georgoulias and
                  Jens Myrup Pedersen and
                  Morten Falch and
                  Emmanouil Vasilomanolakis},
  title        = {A qualitative mapping of Darkweb marketplaces},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2021, Boston,
                  MA, USA, December 1-3, 2021},
  pages        = {1--15},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/eCrime54498.2021.9738766},
  doi          = {10.1109/ECRIME54498.2021.9738766},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/GeorgouliasPFV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/KumarGTSL21,
  author       = {Neeraj Kumar and
                  Sukhada Ghewari and
                  Harshal Tupsamudre and
                  Manish Shukla and
                  Sachin Lodha},
  title        = {When Diversity Meets Hostility: {A} Study of Domain Squatting Abuse
                  in Online Banking},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2021, Boston,
                  MA, USA, December 1-3, 2021},
  pages        = {1--15},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/eCrime54498.2021.9738769},
  doi          = {10.1109/ECRIME54498.2021.9738769},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/KumarGTSL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/LeeN21,
  author       = {Kevin Lee and
                  Arvind Narayanan},
  title        = {Security and Privacy Risks of Number Recycling at Mobile Carriers
                  in the United States},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2021, Boston,
                  MA, USA, December 1-3, 2021},
  pages        = {1--17},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/eCrime54498.2021.9738792},
  doi          = {10.1109/ECRIME54498.2021.9738792},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/LeeN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/PeersmanPR21,
  author       = {Claudia Peersman and
                  Denny Pencheva and
                  Awais Rashid},
  title        = {Tokyo, Denver, Helsinki, Lisbon or the Professor? {A} Framework for
                  Understanding Cybercriminal Roles in Darknet Markets},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2021, Boston,
                  MA, USA, December 1-3, 2021},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/eCrime54498.2021.9738782},
  doi          = {10.1109/ECRIME54498.2021.9738782},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/PeersmanPR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/RajagulasingamT21,
  author       = {Christina Rajagulasingam and
                  Jacqui Taylor},
  title        = {The roles of self-control, need for cognition, impulsivity and viewing
                  time in deception detection using a realistic e-mail phishing task},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2021, Boston,
                  MA, USA, December 1-3, 2021},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/eCrime54498.2021.9738794},
  doi          = {10.1109/ECRIME54498.2021.9738794},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/RajagulasingamT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/RegeB21,
  author       = {Aunshul Rege and
                  Rachel Bleiman},
  title        = {Collegiate Social Engineering Capture the Flag Competition},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2021, Boston,
                  MA, USA, December 1-3, 2021},
  pages        = {1--11},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/eCrime54498.2021.9738746},
  doi          = {10.1109/ECRIME54498.2021.9738746},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/RegeB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/RoyKN21,
  author       = {Sayak Saha Roy and
                  Unique Karanjit and
                  Shirin Nilizadeh},
  title        = {Evaluating the Effectiveness of Phishing Reports on Twitter},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2021, Boston,
                  MA, USA, December 1-3, 2021},
  pages        = {1--13},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/eCrime54498.2021.9738786},
  doi          = {10.1109/ECRIME54498.2021.9738786},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/RoyKN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/WangAC21,
  author       = {Yichao Wang and
                  Budi Arief and
                  Julio C{\'{e}}sar Hern{\'{a}}ndez Castro},
  title        = {Toad in the Hole or Mapo Tofu? Comparative Analysis of English and
                  Chinese Darknet Markets},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2021, Boston,
                  MA, USA, December 1-3, 2021},
  pages        = {1--13},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/eCrime54498.2021.9738745},
  doi          = {10.1109/ECRIME54498.2021.9738745},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/WangAC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ecrime/2021,
  title        = {{APWG} Symposium on Electronic Crime Research, eCrime 2021, Boston,
                  MA, USA, December 1-3, 2021},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/eCrime54498.2021},
  doi          = {10.1109/ECRIME54498.2021},
  isbn         = {978-1-6654-8029-1},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/Barr-SmithW20,
  author       = {Frederick Barr{-}Smith and
                  Joss Wright},
  title        = {Phishing With {A} Darknet: Imitation of Onion Services},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2020, Boston,
                  MA, USA, November 16-19, 2020},
  pages        = {1--13},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/eCrime51433.2020.9493262},
  doi          = {10.1109/ECRIME51433.2020.9493262},
  timestamp    = {Mon, 09 Aug 2021 09:09:23 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/Barr-SmithW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/BitaabCOZSPKBWS20,
  author       = {Marzieh Bitaab and
                  Haehyun Cho and
                  Adam Oest and
                  Penghui Zhang and
                  Zhibo Sun and
                  Rana Pourmohamad and
                  Doowon Kim and
                  Tiffany Bao and
                  Ruoyu Wang and
                  Yan Shoshitaishvili and
                  Adam Doup{\'{e}} and
                  Gail{-}Joon Ahn},
  title        = {Scam Pandemic: How Attackers Exploit Public Fear through Phishing},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2020, Boston,
                  MA, USA, November 16-19, 2020},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/eCrime51433.2020.9493260},
  doi          = {10.1109/ECRIME51433.2020.9493260},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/BitaabCOZSPKBWS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/BurtonTSHMJ20,
  author       = {Ren{\'{e}}e Burton and
                  Vadym Tymchenko and
                  Nicholas Sundvall and
                  Minh Hoang and
                  Jim Mozley and
                  Michael Josten},
  title        = {WordyThief: {A} Malicious Spammer},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2020, Boston,
                  MA, USA, November 16-19, 2020},
  pages        = {1--11},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/eCrime51433.2020.9493261},
  doi          = {10.1109/ECRIME51433.2020.9493261},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/BurtonTSHMJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/Correia20,
  author       = {Sara Giro Correia},
  title        = {Patterns of online repeat victimisation and implications for crime
                  prevention},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2020, Boston,
                  MA, USA, November 16-19, 2020},
  pages        = {1--11},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/eCrime51433.2020.9493258},
  doi          = {10.1109/ECRIME51433.2020.9493258},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/Correia20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/CuiJBO20,
  author       = {Qian Cui and
                  Guy{-}Vincent Jourdan and
                  Gregor v. Bochmann and
                  Iosif{-}Viorel Onut},
  title        = {SemanticPhish: {A} Semantic-based Scanning System for Early Detection
                  of Phishing Attacks},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2020, Boston,
                  MA, USA, November 16-19, 2020},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/eCrime51433.2020.9493252},
  doi          = {10.1109/ECRIME51433.2020.9493252},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/CuiJBO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/DodsonBT20,
  author       = {Michael Dodson and
                  Alastair R. Beresford and
                  Daniel R. Thomas},
  title        = {When will my {PLC} support Mirai? The security economics of large-scale
                  attacks against Internet-connected {ICS} devices},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2020, Boston,
                  MA, USA, November 16-19, 2020},
  pages        = {1--14},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/eCrime51433.2020.9493257},
  doi          = {10.1109/ECRIME51433.2020.9493257},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/DodsonBT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/GananAT20,
  author       = {Carlos Hernandez Ga{\~{n}}{\'{a}}n and
                  Ugur Akyazi and
                  Elena Tsvetkova},
  title        = {Beneath the radar: Exploring the economics of business fraud via underground
                  markets},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2020, Boston,
                  MA, USA, November 16-19, 2020},
  pages        = {1--14},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/eCrime51433.2020.9493263},
  doi          = {10.1109/ECRIME51433.2020.9493263},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/GananAT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/LeverettJBGG20,
  author       = {{\'{E}}ireann Leverett and
                  Eric Jardine and
                  Erin Burns and
                  Ankit Gangwal and
                  Dan Geer},
  title        = {Averages don't characterise the heavy tails of ransoms},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2020, Boston,
                  MA, USA, November 16-19, 2020},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/eCrime51433.2020.9493256},
  doi          = {10.1109/ECRIME51433.2020.9493256},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/LeverettJBGG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/PriceE20,
  author       = {Benjamin Price and
                  Matthew Edwards},
  title        = {Resource Networks of Pet Scam Websites},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2020, Boston,
                  MA, USA, November 16-19, 2020},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/eCrime51433.2020.9493253},
  doi          = {10.1109/ECRIME51433.2020.9493253},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/PriceE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/SimpsonM20,
  author       = {Geoffrey Simpson and
                  Tyler Moore},
  title        = {Empirical Analysis of Losses from Business-Email Compromise},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2020, Boston,
                  MA, USA, November 16-19, 2020},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/eCrime51433.2020.9493250},
  doi          = {10.1109/ECRIME51433.2020.9493250},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/SimpsonM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/SimpsonMC20,
  author       = {Geoffrey Simpson and
                  Tyler Moore and
                  Richard Clayton},
  title        = {Ten years of attacks on companies using visual impersonation of domain
                  names},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2020, Boston,
                  MA, USA, November 16-19, 2020},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/eCrime51433.2020.9493251},
  doi          = {10.1109/ECRIME51433.2020.9493251},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/SimpsonMC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/SutanrikuluCG20,
  author       = {Anela Sutanrikulu and
                  Sandra Czajkowska and
                  Jens Grossklags},
  title        = {Analysis of Darknet Market Activity as a Country-Specific, Socio-Economic
                  and Technological Phenomenon},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2020, Boston,
                  MA, USA, November 16-19, 2020},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/eCrime51433.2020.9493259},
  doi          = {10.1109/ECRIME51433.2020.9493259},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/SutanrikuluCG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/XiaWLWZBXHL20,
  author       = {Pengcheng Xia and
                  Haoyu Wang and
                  Xiapu Luo and
                  Lei Wu and
                  Yajin Zhou and
                  Guangdong Bai and
                  Guoai Xu and
                  Gang Huang and
                  Xuanzhe Liu},
  title        = {Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency
                  Scams},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2020, Boston,
                  MA, USA, November 16-19, 2020},
  pages        = {1--14},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/eCrime51433.2020.9493255},
  doi          = {10.1109/ECRIME51433.2020.9493255},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/XiaWLWZBXHL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ecrime/2020,
  title        = {{APWG} Symposium on Electronic Crime Research, eCrime 2020, Boston,
                  MA, USA, November 16-19, 2020},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/eCrime51433.2020},
  doi          = {10.1109/ECRIME51433.2020},
  isbn         = {978-1-6654-2539-1},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/BhaleraoASAM19,
  author       = {Rasika Bhalerao and
                  Maxwell Aliapoulios and
                  Ilia Shumailov and
                  Sadia Afroz and
                  Damon McCoy},
  title        = {Mapping the Underground: Supervised Discovery of Cybercrime Supply
                  Chains},
  booktitle    = {2019 {APWG} Symposium on Electronic Crime Research, eCrime 2019, Pittsburgh,
                  PA, USA, November 13-15, 2019},
  pages        = {1--16},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/eCrime47957.2019.9037582},
  doi          = {10.1109/ECRIME47957.2019.9037582},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/BhaleraoASAM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/BidgoliKGW19,
  author       = {Morvareed Bidgoli and
                  Bart P. Knijnenburg and
                  Jens Grossklags and
                  Brad Wardman},
  title        = {Report Now. Report Effectively. Conceptualizing the Industry Practice
                  for Cybercrime Reporting},
  booktitle    = {2019 {APWG} Symposium on Electronic Crime Research, eCrime 2019, Pittsburgh,
                  PA, USA, November 13-15, 2019},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/eCrime47957.2019.9037577},
  doi          = {10.1109/ECRIME47957.2019.9037577},
  timestamp    = {Mon, 23 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/BidgoliKGW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/BockASMV19,
  author       = {Leon B{\"{o}}ck and
                  Nikolaos Alexopoulos and
                  Emine Saracoglu and
                  Max M{\"{u}}hlh{\"{a}}user and
                  Emmanouil Vasilomanolakis},
  title        = {Assessing the Threat of Blockchain-based Botnets},
  booktitle    = {2019 {APWG} Symposium on Electronic Crime Research, eCrime 2019, Pittsburgh,
                  PA, USA, November 13-15, 2019},
  pages        = {1--11},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/eCrime47957.2019.9037600},
  doi          = {10.1109/ECRIME47957.2019.9037600},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/BockASMV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/BurtonR19,
  author       = {Ren{\'{e}}e Burton and
                  Laura Rocha},
  title        = {Whitelists that Work: Creating Defensible Dynamic Whitelists with
                  Statistical Learning},
  booktitle    = {2019 {APWG} Symposium on Electronic Crime Research, eCrime 2019, Pittsburgh,
                  PA, USA, November 13-15, 2019},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/eCrime47957.2019.9037505},
  doi          = {10.1109/ECRIME47957.2019.9037505},
  timestamp    = {Mon, 23 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/BurtonR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/ChuaC19,
  author       = {Yi Ting Chua and
                  Ben Collier},
  title        = {Fighting the "blackheart airports": internal policing in the Chinese
                  censorship circumvention ecosystem},
  booktitle    = {2019 {APWG} Symposium on Electronic Crime Research, eCrime 2019, Pittsburgh,
                  PA, USA, November 13-15, 2019},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/eCrime47957.2019.9037500},
  doi          = {10.1109/ECRIME47957.2019.9037500},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/ChuaC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/ChuaPEOSTH19,
  author       = {Yi Ting Chua and
                  Simon Parkin and
                  Matthew Edwards and
                  Daniela Oliveira and
                  Stefan Schiffner and
                  Gareth Tyson and
                  Alice Hutchings},
  title        = {Identifying Unintended Harms of Cybersecurity Countermeasures},
  booktitle    = {2019 {APWG} Symposium on Electronic Crime Research, eCrime 2019, Pittsburgh,
                  PA, USA, November 13-15, 2019},
  pages        = {1--15},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/eCrime47957.2019.9037589},
  doi          = {10.1109/ECRIME47957.2019.9037589},
  timestamp    = {Wed, 03 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/ChuaPEOSTH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/HughesCH19,
  author       = {Jack Hughes and
                  Ben Collier and
                  Alice Hutchings},
  title        = {From playing games to committing crimes: {A} multi-technique approach
                  to predicting key actors on an online gaming forum},
  booktitle    = {2019 {APWG} Symposium on Electronic Crime Research, eCrime 2019, Pittsburgh,
                  PA, USA, November 13-15, 2019},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/eCrime47957.2019.9037586},
  doi          = {10.1109/ECRIME47957.2019.9037586},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/HughesCH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/SaadKM19,
  author       = {Muhammad Saad and
                  Aminollah Khormali and
                  Aziz Mohaisen},
  title        = {Dine and Dash: Static, Dynamic, and Economic Analysis of In-Browser
                  Cryptojacking},
  booktitle    = {2019 {APWG} Symposium on Electronic Crime Research, eCrime 2019, Pittsburgh,
                  PA, USA, November 13-15, 2019},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/eCrime47957.2019.9037576},
  doi          = {10.1109/ECRIME47957.2019.9037576},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/SaadKM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/SommestadK19,
  author       = {Teodor Sommestad and
                  Henrik Karlz{\'{e}}n},
  title        = {A meta-analysis of field experiments on phishing susceptibility},
  booktitle    = {2019 {APWG} Symposium on Electronic Crime Research, eCrime 2019, Pittsburgh,
                  PA, USA, November 13-15, 2019},
  pages        = {1--14},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/eCrime47957.2019.9037502},
  doi          = {10.1109/ECRIME47957.2019.9037502},
  timestamp    = {Mon, 23 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/SommestadK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/SperoSCB19,
  author       = {Eric Spero and
                  Milica Stojmenovic and
                  Sonia Chiasson and
                  Robert Biddle},
  title        = {Control and Understanding in Malware and Legitimate Software},
  booktitle    = {2019 {APWG} Symposium on Electronic Crime Research, eCrime 2019, Pittsburgh,
                  PA, USA, November 13-15, 2019},
  pages        = {1--11},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/eCrime47957.2019.9037597},
  doi          = {10.1109/ECRIME47957.2019.9037597},
  timestamp    = {Mon, 23 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/SperoSCB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/TatangQH19,
  author       = {Dennis Tatang and
                  Florian Quinkert and
                  Thorsten Holz},
  title        = {Below the Radar: Spotting {DNS} Tunnels in Newly Observed Hostnames
                  in the Wild},
  booktitle    = {2019 {APWG} Symposium on Electronic Crime Research, eCrime 2019, Pittsburgh,
                  PA, USA, November 13-15, 2019},
  pages        = {1--15},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/eCrime47957.2019.9037595},
  doi          = {10.1109/ECRIME47957.2019.9037595},
  timestamp    = {Mon, 23 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/TatangQH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/VetterlC19,
  author       = {Alexander Vetterl and
                  Richard Clayton},
  title        = {Honware: {A} Virtual Honeypot Framework for Capturing {CPE} and IoT
                  Zero Days},
  booktitle    = {2019 {APWG} Symposium on Electronic Crime Research, eCrime 2019, Pittsburgh,
                  PA, USA, November 13-15, 2019},
  pages        = {1--13},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/eCrime47957.2019.9037501},
  doi          = {10.1109/ECRIME47957.2019.9037501},
  timestamp    = {Tue, 10 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/VetterlC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ecrime/2019,
  title        = {2019 {APWG} Symposium on Electronic Crime Research, eCrime 2019, Pittsburgh,
                  PA, USA, November 13-15, 2019},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/9028045/proceeding},
  isbn         = {978-1-7281-6383-3},
  timestamp    = {Mon, 23 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/AlAhmadiM18,
  author       = {Bushra A. AlAhmadi and
                  Ivan Martinovic},
  title        = {MalClassifier: Malware family classification using network flow sequence
                  behaviour},
  booktitle    = {2018 {APWG} Symposium on Electronic Crime Research, eCrime 2018, San
                  Diego, CA, USA, May 15-17, 2018},
  pages        = {1--13},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ECRIME.2018.8376209},
  doi          = {10.1109/ECRIME.2018.8376209},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/AlAhmadiM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/DupuisK18,
  author       = {Marc J. Dupuis and
                  Faisal Khan},
  title        = {Effects of peer feedback on password strength},
  booktitle    = {2018 {APWG} Symposium on Electronic Crime Research, eCrime 2018, San
                  Diego, CA, USA, May 15-17, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ECRIME.2018.8376210},
  doi          = {10.1109/ECRIME.2018.8376210},
  timestamp    = {Sun, 19 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/DupuisK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/ElsayedS18,
  author       = {Yahia Elsayed and
                  Ahmed F. Shosha},
  title        = {Large scale detection of {IDN} domain name masquerading},
  booktitle    = {2018 {APWG} Symposium on Electronic Crime Research, eCrime 2018, San
                  Diego, CA, USA, May 15-17, 2018},
  pages        = {1--11},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ECRIME.2018.8376212},
  doi          = {10.1109/ECRIME.2018.8376212},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/ElsayedS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/EnbodySB18,
  author       = {Richard J. Enbody and
                  Aditya K. Sood and
                  Pranshu Bajpai},
  title        = {A key-management-based taxonomy for ransomware},
  booktitle    = {2018 {APWG} Symposium on Electronic Crime Research, eCrime 2018, San
                  Diego, CA, USA, May 15-17, 2018},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ECRIME.2018.8376213},
  doi          = {10.1109/ECRIME.2018.8376213},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/EnbodySB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/HolubO18,
  author       = {Artsiom Holub and
                  Jeremiah O'Connor},
  title        = {{COINHOARDER:} Tracking a ukrainian bitcoin phishing ring {DNS} style},
  booktitle    = {2018 {APWG} Symposium on Electronic Crime Research, eCrime 2018, San
                  Diego, CA, USA, May 15-17, 2018},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ECRIME.2018.8376207},
  doi          = {10.1109/ECRIME.2018.8376207},
  timestamp    = {Thu, 14 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/HolubO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/HouleP18,
  author       = {Cristina Houle and
                  Ruchika Pandey},
  title        = {A layered approach to defending against list-linking email bombs},
  booktitle    = {2018 {APWG} Symposium on Electronic Crime Research, eCrime 2018, San
                  Diego, CA, USA, May 15-17, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ECRIME.2018.8376214},
  doi          = {10.1109/ECRIME.2018.8376214},
  timestamp    = {Thu, 14 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/HouleP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/NunesSS18,
  author       = {Eric Nunes and
                  Paulo Shakarian and
                  Gerardo I. Simari},
  title        = {At-risk system identification via analysis of discussions on the darkweb},
  booktitle    = {2018 {APWG} Symposium on Electronic Crime Research, eCrime 2018, San
                  Diego, CA, USA, May 15-17, 2018},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ECRIME.2018.8376211},
  doi          = {10.1109/ECRIME.2018.8376211},
  timestamp    = {Thu, 14 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/NunesSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/OestSDAWW18,
  author       = {Adam Oest and
                  Yeganeh Safaei and
                  Adam Doup{\'{e}} and
                  Gail{-}Joon Ahn and
                  Brad Wardman and
                  Gary Warner},
  title        = {Inside a phisher's mind: Understanding the anti-phishing ecosystem
                  through phishing kit analysis},
  booktitle    = {2018 {APWG} Symposium on Electronic Crime Research, eCrime 2018, San
                  Diego, CA, USA, May 15-17, 2018},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ECRIME.2018.8376206},
  doi          = {10.1109/ECRIME.2018.8376206},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/OestSDAWW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/PageJBFO18,
  author       = {Sophie Le Page and
                  Guy{-}Vincent Jourdan and
                  Gregor von Bochmann and
                  Jason Flood and
                  Iosif{-}Viorel Onut},
  title        = {Using {URL} shorteners to compare phishing and malware attacks},
  booktitle    = {2018 {APWG} Symposium on Electronic Crime Research, eCrime 2018, San
                  Diego, CA, USA, May 15-17, 2018},
  pages        = {1--13},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ECRIME.2018.8376215},
  doi          = {10.1109/ECRIME.2018.8376215},
  timestamp    = {Fri, 26 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/PageJBFO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/TianGWM18,
  author       = {Hongwei Tian and
                  Stephen M. Gaffigan and
                  D. Sean West and
                  Damon McCoy},
  title        = {Bullet-proof payment processors},
  booktitle    = {2018 {APWG} Symposium on Electronic Crime Research, eCrime 2018, San
                  Diego, CA, USA, May 15-17, 2018},
  pages        = {1--11},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ECRIME.2018.8376208},
  doi          = {10.1109/ECRIME.2018.8376208},
  timestamp    = {Thu, 14 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/TianGWM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ecrime/2018,
  title        = {2018 {APWG} Symposium on Electronic Crime Research, eCrime 2018, San
                  Diego, CA, USA, May 15-17, 2018},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8372143/proceeding},
  isbn         = {978-1-5386-4922-0},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/AminiK17,
  author       = {Sara Amini and
                  Chris Kanich},
  title        = {Characterizing the impact of malware infections and remediation attempts
                  through support forum analysis},
  booktitle    = {2017 {APWG} Symposium on Electronic Crime Research, eCrime 2017, Phoenix,
                  AZ, USA, April 25-27, 2017},
  pages        = {70--78},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ECRIME.2017.7945056},
  doi          = {10.1109/ECRIME.2017.7945056},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/AminiK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/BahnsenBVVG17,
  author       = {Alejandro Correa Bahnsen and
                  Eduardo Contreras Bohorquez and
                  Sergio Villegas and
                  Javier Vargas and
                  Fabio A. Gonz{\'{a}}lez},
  title        = {Classifying phishing URLs using recurrent neural networks},
  booktitle    = {2017 {APWG} Symposium on Electronic Crime Research, eCrime 2017, Phoenix,
                  AZ, USA, April 25-27, 2017},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ECRIME.2017.7945048},
  doi          = {10.1109/ECRIME.2017.7945048},
  timestamp    = {Tue, 09 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/BahnsenBVVG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/BidgoliG17,
  author       = {Morvareed Bidgoli and
                  Jens Grossklags},
  title        = {"Hello. This is the {IRS} calling.": {A} case study on scams, extortion,
                  impersonation, and phone spoofing},
  booktitle    = {2017 {APWG} Symposium on Electronic Crime Research, eCrime 2017, Phoenix,
                  AZ, USA, April 25-27, 2017},
  pages        = {57--69},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ECRIME.2017.7945055},
  doi          = {10.1109/ECRIME.2017.7945055},
  timestamp    = {Wed, 21 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/BidgoliG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/DhimanJY17,
  author       = {Mayank Dhiman and
                  Markus Jakobsson and
                  Ting{-}Fang Yen},
  title        = {Breaking and fixing content-based filtering},
  booktitle    = {2017 {APWG} Symposium on Electronic Crime Research, eCrime 2017, Phoenix,
                  AZ, USA, April 25-27, 2017},
  pages        = {52--56},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ECRIME.2017.7945054},
  doi          = {10.1109/ECRIME.2017.7945054},
  timestamp    = {Wed, 21 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/DhimanJY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/FarooqiJIKCSFZ17,
  author       = {Shehroze Farooqi and
                  Guillaume Jourjon and
                  Muhammad Ikram and
                  Mohamed Ali K{\^{a}}afar and
                  Emiliano De Cristofaro and
                  Muhammad Zubair Shafiq and
                  Arik Friedman and
                  Fareed Zaffar},
  title        = {Characterizing key stakeholders in an online black-hat marketplace},
  booktitle    = {2017 {APWG} Symposium on Electronic Crime Research, eCrime 2017, Phoenix,
                  AZ, USA, April 25-27, 2017},
  pages        = {17--27},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ECRIME.2017.7945050},
  doi          = {10.1109/ECRIME.2017.7945050},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/FarooqiJIKCSFZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/HaslebacherOS17,
  author       = {Andreas Haslebacher and
                  Jeremiah Onaolapo and
                  Gianluca Stringhini},
  title        = {All your cards are belong to us: Understanding online carding forums},
  booktitle    = {2017 {APWG} Symposium on Electronic Crime Research, eCrime 2017, Phoenix,
                  AZ, USA, April 25-27, 2017},
  pages        = {41--51},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ECRIME.2017.7945053},
  doi          = {10.1109/ECRIME.2017.7945053},
  timestamp    = {Wed, 21 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/HaslebacherOS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/HutchingsC17,
  author       = {Alice Hutchings and
                  Richard Clayton},
  title        = {Configuring Zeus: {A} case study of online crime target selection
                  and knowledge transmission},
  booktitle    = {2017 {APWG} Symposium on Electronic Crime Research, eCrime 2017, Phoenix,
                  AZ, USA, April 25-27, 2017},
  pages        = {33--40},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ECRIME.2017.7945052},
  doi          = {10.1109/ECRIME.2017.7945052},
  timestamp    = {Tue, 10 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/HutchingsC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/KuzunoK17,
  author       = {Hiroki Kuzuno and
                  Christian Karam},
  title        = {Blockchain explorer: An analytical process and investigation environment
                  for bitcoin},
  booktitle    = {2017 {APWG} Symposium on Electronic Crime Research, eCrime 2017, Phoenix,
                  AZ, USA, April 25-27, 2017},
  pages        = {9--16},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ECRIME.2017.7945049},
  doi          = {10.1109/ECRIME.2017.7945049},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/KuzunoK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/RuefNSS17,
  author       = {Andrew Ruef and
                  Eric Nunes and
                  Paulo Shakarian and
                  Gerardo I. Simari},
  title        = {Measuring cyber attribution in games},
  booktitle    = {2017 {APWG} Symposium on Electronic Crime Research, eCrime 2017, Phoenix,
                  AZ, USA, April 25-27, 2017},
  pages        = {28--32},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ECRIME.2017.7945051},
  doi          = {10.1109/ECRIME.2017.7945051},
  timestamp    = {Wed, 21 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/RuefNSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/ThomasCB17,
  author       = {Daniel R. Thomas and
                  Richard Clayton and
                  Alastair R. Beresford},
  title        = {1000 days of {UDP} amplification DDoS attacks},
  booktitle    = {2017 {APWG} Symposium on Electronic Crime Research, eCrime 2017, Phoenix,
                  AZ, USA, April 25-27, 2017},
  pages        = {79--84},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ECRIME.2017.7945057},
  doi          = {10.1109/ECRIME.2017.7945057},
  timestamp    = {Tue, 10 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/ThomasCB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ecrime/2017,
  title        = {2017 {APWG} Symposium on Electronic Crime Research, eCrime 2017, Phoenix,
                  AZ, USA, April 25-27, 2017},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7937992/proceeding},
  isbn         = {978-1-5386-2701-3},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/BaslymanC16,
  author       = {Malak Baslyman and
                  Sonia Chiasson},
  title        = {"Smells Phishy?": An educational game about online phishing scams},
  booktitle    = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto,
                  ON, Canada, June 1-3, 2016},
  pages        = {91--101},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ECRIME.2016.7487946},
  doi          = {10.1109/ECRIME.2016.7487946},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/BaslymanC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/BidgoliKG16,
  author       = {Morvareed Bidgoli and
                  Bart P. Knijnenburg and
                  Jens Grossklags},
  title        = {When cybercrimes strike undergraduates},
  booktitle    = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto,
                  ON, Canada, June 1-3, 2016},
  pages        = {42--51},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ECRIME.2016.7487948},
  doi          = {10.1109/ECRIME.2016.7487948},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/BidgoliKG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/ButlerWP16,
  author       = {Blake Butler and
                  Brad Wardman and
                  Nate Pratt},
  title        = {{REAPER:} an automated, scalable solution for mass credential harvesting
                  and {OSINT}},
  booktitle    = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto,
                  ON, Canada, June 1-3, 2016},
  pages        = {71--80},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ECRIME.2016.7487944},
  doi          = {10.1109/ECRIME.2016.7487944},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/ButlerWP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/HutchingsCA16,
  author       = {Alice Hutchings and
                  Richard Clayton and
                  Ross J. Anderson},
  title        = {Taking down websites to prevent crime},
  booktitle    = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto,
                  ON, Canada, June 1-3, 2016},
  pages        = {102--111},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ECRIME.2016.7487947},
  doi          = {10.1109/ECRIME.2016.7487947},
  timestamp    = {Tue, 10 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/HutchingsCA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/LiaoZDA16,
  author       = {Kevin Liao and
                  Ziming Zhao and
                  Adam Doup{\'{e}} and
                  Gail{-}Joon Ahn},
  title        = {Behind closed doors: measurement and analysis of CryptoLocker ransoms
                  in Bitcoin},
  booktitle    = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto,
                  ON, Canada, June 1-3, 2016},
  pages        = {1--13},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ECRIME.2016.7487938},
  doi          = {10.1109/ECRIME.2016.7487938},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/LiaoZDA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/SundaresanMAP16,
  author       = {Srikanth Sundaresan and
                  Damon McCoy and
                  Sadia Afroz and
                  Vern Paxson},
  title        = {Profiling underground merchants based on network behavior},
  booktitle    = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto,
                  ON, Canada, June 1-3, 2016},
  pages        = {62--70},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ECRIME.2016.7487943},
  doi          = {10.1109/ECRIME.2016.7487943},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/SundaresanMAP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/VargasBVI16,
  author       = {Javier Vargas and
                  Alejandro Correa Bahnsen and
                  Sergio Villegas and
                  Daniel Ingevaldson},
  title        = {Knowing your enemies: leveraging data analysis to expose phishing
                  patterns against a major {US} financial institution},
  booktitle    = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto,
                  ON, Canada, June 1-3, 2016},
  pages        = {52--61},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ECRIME.2016.7487942},
  doi          = {10.1109/ECRIME.2016.7487942},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/VargasBVI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/WullinkMDMH16,
  author       = {Maarten Wullink and
                  Moritz M{\"{u}}ller and
                  Marco Davids and
                  Giovane C. M. Moura and
                  Cristian Hesselman},
  title        = {{ENTRADA:} enabling {DNS} big data applications},
  booktitle    = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto,
                  ON, Canada, June 1-3, 2016},
  pages        = {14--24},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ECRIME.2016.7487939},
  doi          = {10.1109/ECRIME.2016.7487939},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/WullinkMDMH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/Zhang-KennedyCO16,
  author       = {Leah Zhang{-}Kennedy and
                  Sonia Chiasson and
                  Paul C. van Oorschot},
  title        = {Revisiting password rules: facilitating human management of passwords},
  booktitle    = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto,
                  ON, Canada, June 1-3, 2016},
  pages        = {81--90},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ECRIME.2016.7487945},
  doi          = {10.1109/ECRIME.2016.7487945},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/Zhang-KennedyCO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/Zhang-KennedyFC16,
  author       = {Leah Zhang{-}Kennedy and
                  Elias Fares and
                  Sonia Chiasson and
                  Robert Biddle},
  title        = {Geo-Phisher: the design and evaluation of information visualizations
                  about internet phishing trends},
  booktitle    = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto,
                  ON, Canada, June 1-3, 2016},
  pages        = {30--41},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ECRIME.2016.7487941},
  doi          = {10.1109/ECRIME.2016.7487941},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/Zhang-KennedyFC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/ZhaoLW16,
  author       = {Xuan Zhao and
                  Jay Luan and
                  Matt Wolff},
  title        = {Evaluating randomness in cyber attack textual artifacts},
  booktitle    = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto,
                  ON, Canada, June 1-3, 2016},
  pages        = {25--29},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ECRIME.2016.7487940},
  doi          = {10.1109/ECRIME.2016.7487940},
  timestamp    = {Wed, 04 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/ZhaoLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ecrime/2016,
  title        = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto,
                  ON, Canada, June 1-3, 2016},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7486625/proceeding},
  isbn         = {978-1-5090-2922-8},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/0002KSS15,
  author       = {Ryan Johnson and
                  Nikolaos Kiourtis and
                  Angelos Stavrou and
                  Vincent Sritapan},
  title        = {Analysis of content copyright infringement in mobile application markets},
  booktitle    = {2015 {APWG} Symposium on Electronic Crime Research, eCrime 2015, Barcelona,
                  Spain, May 26-29, 2015},
  pages        = {43--52},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ECRIME.2015.7120798},
  doi          = {10.1109/ECRIME.2015.7120798},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/0002KSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/DongKBC15,
  author       = {Zheng Dong and
                  Apu Kapadia and
                  Jim Blythe and
                  L. Jean Camp},
  title        = {Beyond the lock icon: real-time detection of phishing websites using
                  public key certificates},
  booktitle    = {2015 {APWG} Symposium on Electronic Crime Research, eCrime 2015, Barcelona,
                  Spain, May 26-29, 2015},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ECRIME.2015.7120795},
  doi          = {10.1109/ECRIME.2015.7120795},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/DongKBC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/GargC15,
  author       = {Vaibhav Garg and
                  L. Jean Camp},
  title        = {Spare the rod, spoil the network security? Economic analysis of sanctions
                  online},
  booktitle    = {2015 {APWG} Symposium on Electronic Crime Research, eCrime 2015, Barcelona,
                  Spain, May 26-29, 2015},
  pages        = {59--68},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ECRIME.2015.7120800},
  doi          = {10.1109/ECRIME.2015.7120800},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/GargC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/MooreC15,
  author       = {Tyler Moore and
                  Richard Clayton},
  title        = {Which malware lures work best? Measurements from a large instant messaging
                  worm},
  booktitle    = {2015 {APWG} Symposium on Electronic Crime Research, eCrime 2015, Barcelona,
                  Spain, May 26-29, 2015},
  pages        = {69--78},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ECRIME.2015.7120801},
  doi          = {10.1109/ECRIME.2015.7120801},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/MooreC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/SantosGAG15,
  author       = {Sergio de los Santos and
                  Antonio Guzm{\'{a}}n and
                  Chema Alonso and
                  Francisco G{\'{o}}mez{-}Rodr{\'{\i}}guez},
  title        = {Chasing shuabang in apps stores},
  booktitle    = {2015 {APWG} Symposium on Electronic Crime Research, eCrime 2015, Barcelona,
                  Spain, May 26-29, 2015},
  pages        = {13--21},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ECRIME.2015.7120796},
  doi          = {10.1109/ECRIME.2015.7120796},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/SantosGAG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/SpringKS15,
  author       = {Jonathan M. Spring and
                  Sarah Kern and
                  Alec Summers},
  title        = {Global adversarial capability modeling},
  booktitle    = {2015 {APWG} Symposium on Electronic Crime Research, eCrime 2015, Barcelona,
                  Spain, May 26-29, 2015},
  pages        = {22--42},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ECRIME.2015.7120797},
  doi          = {10.1109/ECRIME.2015.7120797},
  timestamp    = {Wed, 21 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/SpringKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/WarnerRN15,
  author       = {Gary Warner and
                  Dhiraj Rajani and
                  Mike Nagy},
  title        = {Spammer success through customization and randomization of URLs},
  booktitle    = {2015 {APWG} Symposium on Electronic Crime Research, eCrime 2015, Barcelona,
                  Spain, May 26-29, 2015},
  pages        = {53--58},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ECRIME.2015.7120799},
  doi          = {10.1109/ECRIME.2015.7120799},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/WarnerRN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ecrime/2015,
  title        = {2015 {APWG} Symposium on Electronic Crime Research, eCrime 2015, Barcelona,
                  Spain, May 26-29, 2015},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7118853/proceeding},
  isbn         = {978-1-4799-8909-6},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/DewanKK14,
  author       = {Prateek Dewan and
                  Anand Kashyap and
                  Ponnurangam Kumaraguru},
  title        = {Analyzing social and stylometric features to identify spear phishing
                  emails},
  booktitle    = {2014 {APWG} Symposium on Electronic Crime Research, eCrime 2014, Birmingham,
                  AL, USA, September 23-25, 2014},
  pages        = {1--13},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ECRIME.2014.6963160},
  doi          = {10.1109/ECRIME.2014.6963160},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/DewanKK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/GuptaAK14,
  author       = {Neha Gupta and
                  Anupama Aggarwal and
                  Ponnurangam Kumaraguru},
  title        = {bit.ly/malicious: Deep dive into short {URL} based e-crime detection},
  booktitle    = {2014 {APWG} Symposium on Electronic Crime Research, eCrime 2014, Birmingham,
                  AL, USA, September 23-25, 2014},
  pages        = {14--24},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ECRIME.2014.6963161},
  doi          = {10.1109/ECRIME.2014.6963161},
  timestamp    = {Mon, 04 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/GuptaAK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/GuptaK14,
  author       = {Srishti Gupta and
                  Ponnurangam Kumaraguru},
  title        = {Emerging phishing trends and effectiveness of the anti-phishing landing
                  page},
  booktitle    = {2014 {APWG} Symposium on Electronic Crime Research, eCrime 2014, Birmingham,
                  AL, USA, September 23-25, 2014},
  pages        = {36--47},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ECRIME.2014.6963163},
  doi          = {10.1109/ECRIME.2014.6963163},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/GuptaK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/JonesM14,
  author       = {Jackie Jones and
                  Damon McCoy},
  title        = {The check is in the mail: Monetization of Craigslist buyer scams},
  booktitle    = {2014 {APWG} Symposium on Electronic Crime Research, eCrime 2014, Birmingham,
                  AL, USA, September 23-25, 2014},
  pages        = {25--35},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ECRIME.2014.6963162},
  doi          = {10.1109/ECRIME.2014.6963162},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/JonesM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/NeisiusC14,
  author       = {Jens Neisius and
                  Richard Clayton},
  title        = {Orchestrated crime: The high yield investment fraud ecosystem},
  booktitle    = {2014 {APWG} Symposium on Electronic Crime Research, eCrime 2014, Birmingham,
                  AL, USA, September 23-25, 2014},
  pages        = {48--58},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ECRIME.2014.6963164},
  doi          = {10.1109/ECRIME.2014.6963164},
  timestamp    = {Tue, 10 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/NeisiusC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ecrime/2014,
  title        = {2014 {APWG} Symposium on Electronic Crime Research, eCrime 2014, Birmingham,
                  AL, USA, September 23-25, 2014},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6945946/proceeding},
  isbn         = {978-1-4799-6509-0},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/AfrozGMG13,
  author       = {Sadia Afroz and
                  Vaibhav Garg and
                  Damon McCoy and
                  Rachel Greenstadt},
  title        = {Honor among thieves: {A} common's analysis of cybercrime economies},
  booktitle    = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco,
                  CA, USA, September 17-18, 2013},
  pages        = {1--11},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/eCRS.2013.6805778},
  doi          = {10.1109/ECRS.2013.6805778},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/AfrozGMG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/GengLWT13,
  author       = {Guang{-}Gang Geng and
                  Xiao{-}Dong Lee and
                  Wei Wang and
                  Shian{-}Shyong Tseng},
  title        = {Favicon - a clue to phishing sites detection},
  booktitle    = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco,
                  CA, USA, September 17-18, 2013},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/eCRS.2013.6805775},
  doi          = {10.1109/ECRS.2013.6805775},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/GengLWT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/GuptaLK13,
  author       = {Aditi Gupta and
                  Hemank Lamba and
                  Ponnurangam Kumaraguru},
  title        = {{\textdollar}1.00 per {RT} {\#}BostonMarathon {\#}PrayForBoston: Analyzing
                  fake content on Twitter},
  booktitle    = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco,
                  CA, USA, September 17-18, 2013},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/eCRS.2013.6805772},
  doi          = {10.1109/ECRS.2013.6805772},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/GuptaLK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/HoltCS13,
  author       = {Thomas J. Holt and
                  Yi Ting Chua and
                  Olga Smirnova},
  title        = {An exploration of the factors affecting the advertised price for stolen
                  data},
  booktitle    = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco,
                  CA, USA, September 17-18, 2013},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/eCRS.2013.6805781},
  doi          = {10.1109/ECRS.2013.6805781},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/HoltCS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/KaramiGM13,
  author       = {Mohammad Karami and
                  Shiva Ghaemi and
                  Damon McCoy},
  title        = {Folex: An analysis of an herbal and counterfeit luxury goods affiliate
                  program},
  booktitle    = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco,
                  CA, USA, September 17-18, 2013},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/eCRS.2013.6805782},
  doi          = {10.1109/ECRS.2013.6805782},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/KaramiGM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/Mahjoub13,
  author       = {Dhia Mahjoub},
  title        = {Monitoring a fast flux botnet using recursive and passive {DNS:} {A}
                  case study},
  booktitle    = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco,
                  CA, USA, September 17-18, 2013},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/eCRS.2013.6805783},
  doi          = {10.1109/ECRS.2013.6805783},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/Mahjoub13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/MoserBB13,
  author       = {Malte M{\"{o}}ser and
                  Rainer B{\"{o}}hme and
                  Dominic Breuker},
  title        = {An inquiry into money laundering tools in the Bitcoin ecosystem},
  booktitle    = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco,
                  CA, USA, September 17-18, 2013},
  pages        = {1--14},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/eCRS.2013.6805780},
  doi          = {10.1109/ECRS.2013.6805780},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/MoserBB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/Rege13,
  author       = {Aunshul Rege},
  title        = {10v3.c0ns},
  booktitle    = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco,
                  CA, USA, September 17-18, 2013},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/eCRS.2013.6805773},
  doi          = {10.1109/ECRS.2013.6805773},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/Rege13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/Spring13,
  author       = {Jonathan M. Spring},
  title        = {A notation for describing the steps in indicator expansion},
  booktitle    = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco,
                  CA, USA, September 17-18, 2013},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/eCRS.2013.6805774},
  doi          = {10.1109/ECRS.2013.6805774},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/Spring13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/Spring13a,
  author       = {Jonathan M. Spring},
  title        = {Modeling malicious domain name take-down dynamics: Why eCrime pays},
  booktitle    = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco,
                  CA, USA, September 17-18, 2013},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/eCRS.2013.6805779},
  doi          = {10.1109/ECRS.2013.6805779},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/Spring13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/VasekM13,
  author       = {Marie Vasek and
                  Tyler Moore},
  title        = {Empirical analysis of factors affecting malware {URL} detection},
  booktitle    = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco,
                  CA, USA, September 17-18, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/eCRS.2013.6805776},
  doi          = {10.1109/ECRS.2013.6805776},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/VasekM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/WardmanKW13,
  author       = {Brad Wardman and
                  Lisa Kelly and
                  Michael Weideman},
  title        = {Voice of the customer},
  booktitle    = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco,
                  CA, USA, September 17-18, 2013},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/eCRS.2013.6805771},
  doi          = {10.1109/ECRS.2013.6805771},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/WardmanKW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/ZawoadDSHBW13,
  author       = {Shams Zawoad and
                  Amit Kumar Dutta and
                  Alan P. Sprague and
                  Ragib Hasan and
                  Jason Britt and
                  Gary Warner},
  title        = {Phish-Net: Investigating phish clusters using drop email addresses},
  booktitle    = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco,
                  CA, USA, September 17-18, 2013},
  pages        = {1--13},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/eCRS.2013.6805777},
  doi          = {10.1109/ECRS.2013.6805777},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/ZawoadDSHBW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/Zhang-KennedyCB13,
  author       = {Leah Zhang{-}Kennedy and
                  Sonia Chiasson and
                  Robert Biddle},
  title        = {Password advice shouldn't be boring: Visualizing password guessing
                  attacks},
  booktitle    = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco,
                  CA, USA, September 17-18, 2013},
  pages        = {1--11},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/eCRS.2013.6805770},
  doi          = {10.1109/ECRS.2013.6805770},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/Zhang-KennedyCB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ecrime/2013,
  title        = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco,
                  CA, USA, September 17-18, 2013},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6802823},
  isbn         = {978-1-4799-1158-5},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/AggarwalRK12,
  author       = {Anupama Aggarwal and
                  Ashwin Rajadesingan and
                  Ponnurangam Kumaraguru},
  title        = {PhishAri: Automatic realtime phishing detection on twitter},
  booktitle    = {2012 eCrime Researchers Summit, eCrime 2012, Las Croabas, PR, USA,
                  October 23-24, 2012},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/eCrime.2012.6489521},
  doi          = {10.1109/ECRIME.2012.6489521},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/AggarwalRK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/BohmeM12,
  author       = {Rainer B{\"{o}}hme and
                  Tyler Moore},
  title        = {How do consumers react to cybercrime?},
  booktitle    = {2012 eCrime Researchers Summit, eCrime 2012, Las Croabas, PR, USA,
                  October 23-24, 2012},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/eCrime.2012.6489519},
  doi          = {10.1109/ECRIME.2012.6489519},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/BohmeM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/HelfrichN12,
  author       = {James N. Helfrich and
                  Rick Neff},
  title        = {Dual canonicalization: An answer to the homograph attack},
  booktitle    = {2012 eCrime Researchers Summit, eCrime 2012, Las Croabas, PR, USA,
                  October 23-24, 2012},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/eCrime.2012.6489517},
  doi          = {10.1109/ECRIME.2012.6489517},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/HelfrichN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/LevinRWK12,
  author       = {Rachel Levin and
                  Jonathan Richardson and
                  Gary Warner and
                  Kent Kerley},
  title        = {Explaining Cybercrime through the Lens of Differential Association
                  Theory, Hadidi44-2.php PayPal Case Study},
  booktitle    = {2012 eCrime Researchers Summit, eCrime 2012, Las Croabas, PR, USA,
                  October 23-24, 2012},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/eCrime.2012.6489518},
  doi          = {10.1109/ECRIME.2012.6489518},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/LevinRWK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/MahmoudCM12,
  author       = {Muhammad Mahmoud and
                  Sonia Chiasson and
                  Ashraf Matrawy},
  title        = {Does context influence responses to firewall warnings?},
  booktitle    = {2012 eCrime Researchers Summit, eCrime 2012, Las Croabas, PR, USA,
                  October 23-24, 2012},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/eCrime.2012.6489516},
  doi          = {10.1109/ECRIME.2012.6489516},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/MahmoudCM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/MoorRSO12,
  author       = {Dan Moor and
                  Siva Raj Rajagopalan and
                  Sathya Chandran Sundaramurthy and
                  Xinming Ou},
  title        = {Investigative response modeling and predictive data collection},
  booktitle    = {2012 eCrime Researchers Summit, eCrime 2012, Las Croabas, PR, USA,
                  October 23-24, 2012},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/eCrime.2012.6489520},
  doi          = {10.1109/ECRIME.2012.6489520},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/MoorRSO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/MooreC12,
  author       = {Tyler Moore and
                  Richard Clayton},
  title        = {Discovering phishing dropboxes using email metadata},
  booktitle    = {2012 eCrime Researchers Summit, eCrime 2012, Las Croabas, PR, USA,
                  October 23-24, 2012},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/eCrime.2012.6489515},
  doi          = {10.1109/ECRIME.2012.6489515},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/MooreC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ecrime/2012,
  title        = {2012 eCrime Researchers Summit, eCrime 2012, Las Croabas, PR, USA,
                  October 23-24, 2012},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6482713/proceeding},
  isbn         = {978-1-4673-2544-8},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/GargHC11,
  author       = {Vaibhav Garg and
                  Nathaniel Husted and
                  L. Jean Camp},
  title        = {The smuggling theory approach to organized digital crime},
  booktitle    = {2011 eCrime Researchers Summit, eCrime 2011, San Diego, CA, USA, November
                  7-9, 2011},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/eCrime.2011.6151980},
  doi          = {10.1109/ECRIME.2011.6151980},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/GargHC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/NeroWCW11,
  author       = {Philip J. Nero and
                  Brad Wardman and
                  Heith Copes and
                  Gary Warner},
  title        = {Phishing: Crime that pays},
  booktitle    = {2011 eCrime Researchers Summit, eCrime 2011, San Diego, CA, USA, November
                  7-9, 2011},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/eCrime.2011.6151979},
  doi          = {10.1109/ECRIME.2011.6151979},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/NeroWCW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/NevilleH11,
  author       = {Stephen W. Neville and
                  Michael Horie},
  title        = {Controlling spam and spear phishing via peered network overlays and
                  non-repudiable traceback},
  booktitle    = {2011 eCrime Researchers Summit, eCrime 2011, San Diego, CA, USA, November
                  7-9, 2011},
  pages        = {1--13},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/eCrime.2011.6151976},
  doi          = {10.1109/ECRIME.2011.6151976},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/NevilleH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/RiccardiPV11,
  author       = {Marco Riccardi and
                  Roberto Di Pietro and
                  Jorge Aguila Vila},
  title        = {Taming Zeus by leveraging its own crypto internals},
  booktitle    = {2011 eCrime Researchers Summit, eCrime 2011, San Diego, CA, USA, November
                  7-9, 2011},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/eCrime.2011.6151981},
  doi          = {10.1109/ECRIME.2011.6151981},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/RiccardiPV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/ValdezGWR11,
  author       = {Jason Valdez and
                  Mina Guirguis and
                  David Wingate and
                  Rory Rinkevich},
  title        = {An expanding reference library for Peer-to-Peer content},
  booktitle    = {2011 eCrime Researchers Summit, eCrime 2011, San Diego, CA, USA, November
                  7-9, 2011},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/eCrime.2011.6151978},
  doi          = {10.1109/ECRIME.2011.6151978},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/ValdezGWR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/WardmanSWS11,
  author       = {Brad Wardman and
                  Tommy Stallings and
                  Gary Warner and
                  Anthony Skjellum},
  title        = {High-performance content-based phishing attack detection},
  booktitle    = {2011 eCrime Researchers Summit, eCrime 2011, San Diego, CA, USA, November
                  7-9, 2011},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/eCrime.2011.6151977},
  doi          = {10.1109/ECRIME.2011.6151977},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/WardmanSWS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ecrime/2011,
  title        = {2011 eCrime Researchers Summit, eCrime 2011, San Diego, CA, USA, November
                  7-9, 2011},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6146508/proceeding},
  isbn         = {978-1-4577-1340-8},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/GaoMRR10,
  author       = {Wei Gao and
                  Thomas H. Morris and
                  Bradley Reaves and
                  Drew Richey},
  title        = {On {SCADA} control system command and response injection and intrusion
                  detection},
  booktitle    = {2010 eCrime Researchers Summit, eCrime 2010, Dallas, TX, USA, October
                  18-20, 2010},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ecrime.2010.5706699},
  doi          = {10.1109/ECRIME.2010.5706699},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/GaoMRR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/LaytonWD10,
  author       = {Robert Layton and
                  Paul A. Watters and
                  Richard Dazeley},
  title        = {Automatically determining phishing campaigns using the {USCAP} methodology},
  booktitle    = {2010 eCrime Researchers Summit, eCrime 2010, Dallas, TX, USA, October
                  18-20, 2010},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ecrime.2010.5706698},
  doi          = {10.1109/ECRIME.2010.5706698},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/LaytonWD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/PillayS10,
  author       = {Sangita Pillay and
                  Thamar Solorio},
  title        = {Authorship attribution of web forum posts},
  booktitle    = {2010 eCrime Researchers Summit, eCrime 2010, Dallas, TX, USA, October
                  18-20, 2010},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ecrime.2010.5706693},
  doi          = {10.1109/ECRIME.2010.5706693},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/PillayS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/RiccardiOLCV10,
  author       = {Marco Riccardi and
                  David Oro and
                  Jesus Luna and
                  Marco Cremonini and
                  Marc Vilanova},
  title        = {A framework for financial botnet analysis},
  booktitle    = {2010 eCrime Researchers Summit, eCrime 2010, Dallas, TX, USA, October
                  18-20, 2010},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ecrime.2010.5706697},
  doi          = {10.1109/ECRIME.2010.5706697},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/RiccardiOLCV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/TannerWSO10,
  author       = {Brian K. Tanner and
                  Gary Warner and
                  Henry Stern and
                  Scott Olechowski},
  title        = {Koobface: The evolution of the social botnet},
  booktitle    = {2010 eCrime Researchers Summit, eCrime 2010, Dallas, TX, USA, October
                  18-20, 2010},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ecrime.2010.5706694},
  doi          = {10.1109/ECRIME.2010.5706694},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/TannerWSO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/ToolanC10,
  author       = {Fergus Toolan and
                  Joe Carthy},
  title        = {Feature selection for Spam and Phishing detection},
  booktitle    = {2010 eCrime Researchers Summit, eCrime 2010, Dallas, TX, USA, October
                  18-20, 2010},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ecrime.2010.5706696},
  doi          = {10.1109/ECRIME.2010.5706696},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/ToolanC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/UnluB10,
  author       = {Seckin Anil Unlu and
                  Kemal Bicakci},
  title        = {NoTabNab: Protection against the "tabnabbing attack"},
  booktitle    = {2010 eCrime Researchers Summit, eCrime 2010, Dallas, TX, USA, October
                  18-20, 2010},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ecrime.2010.5706695},
  doi          = {10.1109/ECRIME.2010.5706695},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/UnluB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/ZadigT10,
  author       = {Sean M. Zadig and
                  Gurvirender P. Tejay},
  title        = {Securing {IS} assets through hacker deterrence: {A} case study},
  booktitle    = {2010 eCrime Researchers Summit, eCrime 2010, Dallas, TX, USA, October
                  18-20, 2010},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ecrime.2010.5706700},
  doi          = {10.1109/ECRIME.2010.5706700},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/ZadigT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ecrime/2010,
  title        = {2010 eCrime Researchers Summit, eCrime 2010, Dallas, TX, USA, October
                  18-20, 2010},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/5702590/proceeding},
  isbn         = {978-1-4244-7760-9},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/GuirguisVLV09,
  author       = {Mina Guirguis and
                  Jason Valdez and
                  Bassam El Lababedi and
                  Joseph Valdez},
  title        = {Burn Before Reading: {A} stealthy framework for combating live forensics
                  examinations},
  booktitle    = {2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October
                  20-21, 2009},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ECRIME.2009.5342613},
  doi          = {10.1109/ECRIME.2009.5342613},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/GuirguisVLV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/KnickerbockerY009,
  author       = {Paul Knickerbocker and
                  Dongting Yu and
                  Jun Li},
  title        = {Humboldt: {A} distributed phishing disruption system},
  booktitle    = {2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October
                  20-21, 2009},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ECRIME.2009.5342620},
  doi          = {10.1109/ECRIME.2009.5342620},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/KnickerbockerY009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/LaytonW09,
  author       = {Robert Layton and
                  Paul A. Watters},
  title        = {Determining provenance in phishing websites using automated conceptual
                  analysis},
  booktitle    = {2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October
                  20-21, 2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ECRIME.2009.5342614},
  doi          = {10.1109/ECRIME.2009.5342614},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/LaytonW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/LiS09,
  author       = {Shujun Li and
                  Roland Schmitz},
  title        = {A novel anti-phishing framework based on honeypots},
  booktitle    = {2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October
                  20-21, 2009},
  pages        = {1--13},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ECRIME.2009.5342609},
  doi          = {10.1109/ECRIME.2009.5342609},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/LiS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/MaYW09,
  author       = {Liping Ma and
                  John Yearwood and
                  Paul A. Watters},
  title        = {Establishing phishing provenance using orthographic features},
  booktitle    = {2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October
                  20-21, 2009},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ECRIME.2009.5342604},
  doi          = {10.1109/ECRIME.2009.5342604},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/MaYW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/OhCRU09,
  author       = {Onook Oh and
                  Rajarshi Chakraborty and
                  H. Raghav Rao and
                  Shambhu J. Upadhyaya},
  title        = {An exploration of unintended online private information disclosure
                  in educational institutions across four countries},
  booktitle    = {2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October
                  20-21, 2009},
  pages        = {1--11},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ECRIME.2009.5342606},
  doi          = {10.1109/ECRIME.2009.5342606},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/OhCRU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/ReavesM09,
  author       = {Bradley Reaves and
                  Thomas H. Morris},
  title        = {Discovery, infiltration, and denial of service in a process control
                  system wireless network},
  booktitle    = {2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October
                  20-21, 2009},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ECRIME.2009.5342612},
  doi          = {10.1109/ECRIME.2009.5342612},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/ReavesM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/ShengKACH09,
  author       = {Steve Sheng and
                  Ponnurangam Kumaraguru and
                  Alessandro Acquisti and
                  Lorrie Faith Cranor and
                  Jason I. Hong},
  title        = {Improving phishing countermeasures: An analysis of expert interviews},
  booktitle    = {2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October
                  20-21, 2009},
  pages        = {1--15},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ECRIME.2009.5342608},
  doi          = {10.1109/ECRIME.2009.5342608},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/ShengKACH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/ToolanC09,
  author       = {Fergus Toolan and
                  Joe Carthy},
  title        = {Phishing detection using classifier ensembles},
  booktitle    = {2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October
                  20-21, 2009},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ECRIME.2009.5342607},
  doi          = {10.1109/ECRIME.2009.5342607},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/ToolanC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/WardmanSW09,
  author       = {Brad Wardman and
                  Gaurang Shukla and
                  Gary Warner},
  title        = {Identifying vulnerable websites by analysis of common strings in phishing
                  URLs},
  booktitle    = {2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October
                  20-21, 2009},
  pages        = {1--13},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ECRIME.2009.5342610},
  doi          = {10.1109/ECRIME.2009.5342610},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/WardmanSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/Watters09,
  author       = {Paul A. Watters},
  title        = {Why do users trust the wrong messages? {A} behavioural model of phishing},
  booktitle    = {2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October
                  20-21, 2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ECRIME.2009.5342611},
  doi          = {10.1109/ECRIME.2009.5342611},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/Watters09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ecrime/2009,
  title        = {2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October
                  20-21, 2009},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/5339470/proceeding},
  isbn         = {978-1-4244-4625-4},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/Abu-NimehNWN08,
  author       = {Saeed Abu{-}Nimeh and
                  Dario Nappa and
                  Xinlei Wang and
                  Suku Nair},
  title        = {A distributed architecture for phishing detection using Bayesian Additive
                  Regression Trees},
  booktitle    = {2008 eCrime Researchers Summit, eCrime 2008, Atlanta, GA, USA, October
                  15-16, 2008},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ECRIME.2008.4696965},
  doi          = {10.1109/ECRIME.2008.4696965},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/Abu-NimehNWN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/HesseP08,
  author       = {Malte Hesse and
                  Norbert Pohlmann},
  title        = {Internet Situation Awareness},
  booktitle    = {2008 eCrime Researchers Summit, eCrime 2008, Atlanta, GA, USA, October
                  15-16, 2008},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ECRIME.2008.4696966},
  doi          = {10.1109/ECRIME.2008.4696966},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/HesseP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/IraniWGP08,
  author       = {Danesh Irani and
                  Steve Webb and
                  Jonathon Giffin and
                  Calton Pu},
  title        = {Evolutionary study of phishing},
  booktitle    = {2008 eCrime Researchers Summit, eCrime 2008, Atlanta, GA, USA, October
                  15-16, 2008},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ECRIME.2008.4696967},
  doi          = {10.1109/ECRIME.2008.4696967},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/IraniWGP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/KumaraguruSACH08,
  author       = {Ponnurangam Kumaraguru and
                  Steve Sheng and
                  Alessandro Acquisti and
                  Lorrie Faith Cranor and
                  Jason I. Hong},
  title        = {Lessons from a real world evaluation of anti-phishing training},
  booktitle    = {2008 eCrime Researchers Summit, eCrime 2008, Atlanta, GA, USA, October
                  15-16, 2008},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ECRIME.2008.4696970},
  doi          = {10.1109/ECRIME.2008.4696970},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/KumaraguruSACH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/MooreC08,
  author       = {Tyler Moore and
                  Richard Clayton},
  title        = {The consequence of non-cooperation in the fight against phishing},
  booktitle    = {2008 eCrime Researchers Summit, eCrime 2008, Atlanta, GA, USA, October
                  15-16, 2008},
  pages        = {1--14},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ECRIME.2008.4696968},
  doi          = {10.1109/ECRIME.2008.4696968},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/MooreC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/MyersS08,
  author       = {Steven A. Myers and
                  Sid Stamm},
  title        = {Practice {\&} prevention of home-router mid-stream injection attacks},
  booktitle    = {2008 eCrime Researchers Summit, eCrime 2008, Atlanta, GA, USA, October
                  15-16, 2008},
  pages        = {1--14},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ECRIME.2008.4696969},
  doi          = {10.1109/ECRIME.2008.4696969},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/MyersS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/Soghoian08,
  author       = {Christopher Soghoian},
  title        = {Legal risks for phishing researchers},
  booktitle    = {2008 eCrime Researchers Summit, eCrime 2008, Atlanta, GA, USA, October
                  15-16, 2008},
  pages        = {1--11},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ECRIME.2008.4696971},
  doi          = {10.1109/ECRIME.2008.4696971},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/Soghoian08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/WardmanW08,
  author       = {Brad Wardman and
                  Gary Warner},
  title        = {Automating phishing website identification through deep {MD5} matching},
  booktitle    = {2008 eCrime Researchers Summit, eCrime 2008, Atlanta, GA, USA, October
                  15-16, 2008},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ECRIME.2008.4696972},
  doi          = {10.1109/ECRIME.2008.4696972},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/WardmanW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ecrime/2008,
  title        = {2008 eCrime Researchers Summit, eCrime 2008, Atlanta, GA, USA, October
                  15-16, 2008},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/4689052/proceeding},
  isbn         = {978-1-4244-2969-1},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/Abu-NimehNWN07,
  author       = {Saeed Abu{-}Nimeh and
                  Dario Nappa and
                  Xinlei Wang and
                  Suku Nair},
  editor       = {Lorrie Faith Cranor},
  title        = {A comparison of machine learning techniques for phishing detection},
  booktitle    = {Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime
                  Researchers Summit 2007, Pittsburgh, Pennsylvania, USA, October 4-5,
                  2007},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {269},
  pages        = {60--69},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1299015.1299021},
  doi          = {10.1145/1299015.1299021},
  timestamp    = {Tue, 06 Nov 2018 11:06:53 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/Abu-NimehNWN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/DownsHC07,
  author       = {Julie S. Downs and
                  Mandy B. Holbrook and
                  Lorrie Faith Cranor},
  editor       = {Lorrie Faith Cranor},
  title        = {Behavioral response to phishing risk},
  booktitle    = {Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime
                  Researchers Summit 2007, Pittsburgh, Pennsylvania, USA, October 4-5,
                  2007},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {269},
  pages        = {37--44},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1299015.1299019},
  doi          = {10.1145/1299015.1299019},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/DownsHC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/FlorencioH07,
  author       = {Dinei A. F. Flor{\^{e}}ncio and
                  Cormac Herley},
  editor       = {Lorrie Faith Cranor},
  title        = {Evaluating a trial deployment of password re-use for phishing prevention},
  booktitle    = {Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime
                  Researchers Summit 2007, Pittsburgh, Pennsylvania, USA, October 4-5,
                  2007},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {269},
  pages        = {26--36},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1299015.1299018},
  doi          = {10.1145/1299015.1299018},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/FlorencioH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/KumaraguruRSHACH07,
  author       = {Ponnurangam Kumaraguru and
                  Yong Rhee and
                  Steve Sheng and
                  Sharique Hasan and
                  Alessandro Acquisti and
                  Lorrie Faith Cranor and
                  Jason I. Hong},
  editor       = {Lorrie Faith Cranor},
  title        = {Getting users to pay attention to anti-phishing education: evaluation
                  of retention and transfer},
  booktitle    = {Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime
                  Researchers Summit 2007, Pittsburgh, Pennsylvania, USA, October 4-5,
                  2007},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {269},
  pages        = {70--81},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1299015.1299022},
  doi          = {10.1145/1299015.1299022},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/KumaraguruRSHACH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/LiuS07,
  author       = {Changwei Liu and
                  Sid Stamm},
  editor       = {Lorrie Faith Cranor},
  title        = {Fighting unicode-obfuscated spam},
  booktitle    = {Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime
                  Researchers Summit 2007, Pittsburgh, Pennsylvania, USA, October 4-5,
                  2007},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {269},
  pages        = {45--59},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1299015.1299020},
  doi          = {10.1145/1299015.1299020},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/LiuS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/MooreC07,
  author       = {Tyler Moore and
                  Richard Clayton},
  editor       = {Lorrie Faith Cranor},
  title        = {Examining the impact of website take-down on phishing},
  booktitle    = {Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime
                  Researchers Summit 2007, Pittsburgh, Pennsylvania, USA, October 4-5,
                  2007},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {269},
  pages        = {1--13},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1299015.1299016},
  doi          = {10.1145/1299015.1299016},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/MooreC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/WeaverC07,
  author       = {Rhiannon Weaver and
                  M. Patrick Collins},
  editor       = {Lorrie Faith Cranor},
  title        = {Fishing for phishes: applying capture-recapture methods to estimate
                  phishing populations},
  booktitle    = {Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime
                  Researchers Summit 2007, Pittsburgh, Pennsylvania, USA, October 4-5,
                  2007},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {269},
  pages        = {14--25},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1299015.1299017},
  doi          = {10.1145/1299015.1299017},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/WeaverC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ecrime/2007,
  editor       = {Lorrie Faith Cranor},
  title        = {Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime
                  Researchers Summit 2007, Pittsburgh, Pennsylvania, USA, October 4-5,
                  2007},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {269},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1299015},
  doi          = {10.1145/1299015},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}