default search action
Search dblp for Publications
export results for "stream:streams/conf/ecrime:"
@inproceedings{DBLP:conf/ecrime/BayerMHDK23, author = {Jan Bayer and Sourena Maroofi and Olivier Hureau and Andrzej Duda and Maciej Korczynski}, title = {Building a Resilient Domain Whitelist to Enhance Phishing Blacklist Accuracy}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2023, Barcelona, Spain, November 15-17, 2023}, pages = {1--14}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/eCrime61234.2023.10485549}, doi = {10.1109/ECRIME61234.2023.10485549}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/BayerMHDK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/CalvoEEMOG23, author = {Albert Calvo and Santiago Escuder and Josep Escrig and Xavier Marrugat{-}Plaza and Nil Ortiz and Jordi Guijarro}, title = {Achieving High-Fidelity Explanations for Risk Exposition Assessment in the Cybersecurity Domain}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2023, Barcelona, Spain, November 15-17, 2023}, pages = {1--10}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/eCrime61234.2023.10485502}, doi = {10.1109/ECRIME61234.2023.10485502}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/CalvoEEMOG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/ChoLF23, author = {Selina Cho and Jonathan Lusthaus and Ivan Flechais}, title = {The Slippery Slope: Exploring the Parallels Between Game Cheating and Cybercrime Through Routine Activity Theory}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2023, Barcelona, Spain, November 15-17, 2023}, pages = {1--13}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/eCrime61234.2023.10485501}, doi = {10.1109/ECRIME61234.2023.10485501}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/ChoLF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/CloughE23, author = {Josh Clough and Matthew Edwards}, title = {Pump, Dump, and then What? The Long-Term Impact of Cryptocurrency Pump-and-Dump Schemes}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2023, Barcelona, Spain, November 15-17, 2023}, pages = {1--17}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/eCrime61234.2023.10485505}, doi = {10.1109/ECRIME61234.2023.10485505}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/CloughE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/DraganovicDARA23, author = {Ajka Draganovic and Savino Dambra and Javier Aldana{-}Iuit and Kevin Alejandro Roundy and Giovanni Apruzzese}, title = {"Do Users Fall for Real Adversarial Phishing?" Investigating the Human Response to Evasive Webpages}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2023, Barcelona, Spain, November 15-17, 2023}, pages = {1--14}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/eCrime61234.2023.10485552}, doi = {10.1109/ECRIME61234.2023.10485552}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/DraganovicDARA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/GeorgouliasPHFV23, author = {Dimitrios Georgoulias and Jens Myrup Pedersen and Alice Hutchings and Morten Falch and Emmanouil Vasilomanolakis}, title = {In the Market for a Botnet? An In-Depth Analysis of Botnet-Related Listings on Darkweb Marketplaces}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2023, Barcelona, Spain, November 15-17, 2023}, pages = {1--14}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/eCrime61234.2023.10485500}, doi = {10.1109/ECRIME61234.2023.10485500}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/GeorgouliasPHFV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/HaslhoferHFG23, author = {Bernhard Haslhofer and Christiane Hanslbauer and Michael Fr{\"{o}}wis and Thomas Goger}, title = {Increasing the Efficiency of Cryptoasset Investigations by Connecting the Cases}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2023, Barcelona, Spain, November 15-17, 2023}, pages = {1--10}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/eCrime61234.2023.10485550}, doi = {10.1109/ECRIME61234.2023.10485550}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/HaslhoferHFG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/ManSH23, author = {Jessica Man and Gilberto {Atondo Siu} and Alice Hutchings}, title = {Autism Disclosures and Cybercrime Discourse on a Large Underground Forum}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2023, Barcelona, Spain, November 15-17, 2023}, pages = {1--14}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/eCrime61234.2023.10485504}, doi = {10.1109/ECRIME61234.2023.10485504}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/ManSH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/MeursCCJHTA23, author = {Tom Meurs and Edward J. Cartwright and Anna Cartwright and Marianne Junger and Raphael Hoheisel and Erik Tews and Abhishta Abhishta}, title = {Ransomware Economics: {A} Two-Step Approach To Model Ransom Paid}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2023, Barcelona, Spain, November 15-17, 2023}, pages = {1--13}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/eCrime61234.2023.10485506}, doi = {10.1109/ECRIME61234.2023.10485506}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/MeursCCJHTA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/TalasH23, author = {Anna Talas and Alice Hutchings}, title = {Hacker's Paradise: Analysing Music in a Cybercrime Forum}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2023, Barcelona, Spain, November 15-17, 2023}, pages = {1--14}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/eCrime61234.2023.10485503}, doi = {10.1109/ECRIME61234.2023.10485503}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/TalasH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/ZahraeiMPD23, author = {Pouria Zahraei and Serguei A. Mokhov and Joey Paquet and Peyman Derafshkavian}, title = {A Kubernetes Underlay for OpenTDIP Forensic Computing Backend}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2023, Barcelona, Spain, November 15-17, 2023}, pages = {1--10}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/eCrime61234.2023.10485551}, doi = {10.1109/ECRIME61234.2023.10485551}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/ZahraeiMPD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ecrime/2023, title = {{APWG} Symposium on Electronic Crime Research, eCrime 2023, Barcelona, Spain, November 15-17, 2023}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/eCrime61234.2023}, doi = {10.1109/ECRIME61234.2023}, isbn = {979-8-3503-6027-1}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/CampobassoA22, author = {Michele Campobasso and Luca Allodi}, title = {THREAT/crawl: a Trainable, Highly-Reusable, and Extensible Automated Method and Tool to Crawl Criminal Underground Forums}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2022, Boston, MA, USA, November 30 - December 2, 2022}, pages = {1--13}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/eCrime57793.2022.10142081}, doi = {10.1109/ECRIME57793.2022.10142081}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/CampobassoA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/GrayCBCM22, author = {Ian W. Gray and Jack Cable and Benjamin Brown and Vlad Cuiujuclu and Damon McCoy}, title = {Money Over Morals: {A} Business Analysis of Conti Ransomware}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2022, Boston, MA, USA, November 30 - December 2, 2022}, pages = {1--12}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/eCrime57793.2022.10142119}, doi = {10.1109/ECRIME57793.2022.10142119}, timestamp = {Tue, 20 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/GrayCBCM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/KyiS22, author = {Lin Kyi and Elizabeth Stobert}, title = {"I don't really give them piece of mind": User Perceptions of Social Engineering Attacks}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2022, Boston, MA, USA, November 30 - December 2, 2022}, pages = {1--13}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/eCrime57793.2022.10142113}, doi = {10.1109/ECRIME57793.2022.10142113}, timestamp = {Tue, 20 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/KyiS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/Lopez-AguilarPS22, author = {Pablo L{\'{o}}pez{-}Aguilar and Constantinos Patsakis and Agusti Solanas}, title = {The Role of Extraversion in Phishing Victimisation: {A} Systematic Literature Review}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2022, Boston, MA, USA, November 30 - December 2, 2022}, pages = {1--10}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/eCrime57793.2022.10142078}, doi = {10.1109/ECRIME57793.2022.10142078}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/Lopez-AguilarPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/ManatovaSSC22, author = {Dalyapraz Manatova and Dewesha Sharma and Sagar Samtani and L. Jean Camp}, title = {Building and Testing a Network of Social Trust in an Underground Forum: Robust Connections and Overlapping Criminal Domains}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2022, Boston, MA, USA, November 30 - December 2, 2022}, pages = {1--12}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/eCrime57793.2022.10142120}, doi = {10.1109/ECRIME57793.2022.10142120}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/ManatovaSSC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/MeursJTA22, author = {Tom Meurs and Marianne Junger and Erik Tews and Abhishta Abhishta}, title = {Ransomware: How attacker's effort, victim characteristics and context influence ransom requested, payment and financial loss}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2022, Boston, MA, USA, November 30 - December 2, 2022}, pages = {1--13}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/eCrime57793.2022.10142138}, doi = {10.1109/ECRIME57793.2022.10142138}, timestamp = {Tue, 20 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/MeursJTA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/Mukherjee022, author = {Arghya Mukherjee and Tyler Moore}, title = {Cryptocurrency Exchange Closure Revisited (Again)}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2022, Boston, MA, USA, November 30 - December 2, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/eCrime57793.2022.10142141}, doi = {10.1109/ECRIME57793.2022.10142141}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/Mukherjee022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/RandallHVSS22, author = {Audrey Randall and Wes Hardaker and Geoffrey M. Voelker and Stefan Savage and Aaron Schulman}, title = {The Challenges of Blockchain-Based Naming Systems for Malware Defenders}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2022, Boston, MA, USA, November 30 - December 2, 2022}, pages = {1--14}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/eCrime57793.2022.10142131}, doi = {10.1109/ECRIME57793.2022.10142131}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/RandallHVSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/SiuHV022, author = {Gilberto {Atondo Siu} and Alice Hutchings and Marie Vasek and Tyler Moore}, title = {"Invest in crypto!": An analysis of investment scam advertisements found in Bitcointalk}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2022, Boston, MA, USA, November 30 - December 2, 2022}, pages = {1--12}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/eCrime57793.2022.10142100}, doi = {10.1109/ECRIME57793.2022.10142100}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/SiuHV022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/TejaswiSPMY22, author = {Bhaskar Tejaswi and Nayanamana Samarasinghe and Sajjad Pourali and Mohammad Mannan and Amr M. Youssef}, title = {Leaky Kits: The Increased Risk of Data Exposure from Phishing Kits}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2022, Boston, MA, USA, November 30 - December 2, 2022}, pages = {1--13}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/eCrime57793.2022.10142092}, doi = {10.1109/ECRIME57793.2022.10142092}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/TejaswiSPMY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ecrime/2022, title = {{APWG} Symposium on Electronic Crime Research, eCrime 2022, Boston, MA, USA, November 30 - December 2, 2022}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/eCrime57793.2022}, doi = {10.1109/ECRIME57793.2022}, isbn = {979-8-3503-0169-4}, timestamp = {Tue, 20 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/AbramovaB21, author = {Svetlana Abramova and Rainer B{\"{o}}hme}, title = {Out of the Dark: The Effect of Law Enforcement Actions on Cryptocurrency Market Prices}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2021, Boston, MA, USA, December 1-3, 2021}, pages = {1--11}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/eCrime54498.2021.9738787}, doi = {10.1109/ECRIME54498.2021.9738787}, timestamp = {Fri, 01 Apr 2022 15:15:45 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/AbramovaB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/BadaC21, author = {Maria Bada and Yi Ting Chua}, title = {Understanding Risk and Risk Perceptions of Cybercrime in Underground Forums}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2021, Boston, MA, USA, December 1-3, 2021}, pages = {1--11}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/eCrime54498.2021.9738790}, doi = {10.1109/ECRIME54498.2021.9738790}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/BadaC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/Bermudez-Villalva21, author = {Adrian Bermudez{-}Villalva and Gianluca Stringhini}, title = {The shady economy: Understanding the difference in trading activity from underground forums in different layers of the Web}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2021, Boston, MA, USA, December 1-3, 2021}, pages = {1--10}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/eCrime54498.2021.9738751}, doi = {10.1109/ECRIME54498.2021.9738751}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/Bermudez-Villalva21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/ChierziM21, author = {Veronica Chierzi and Fernando Merc{\^{e}}s}, title = {Evolution of IoT Linux Malware: {A} {MITRE} ATT{\&}CK {TTP} Based Approach}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2021, Boston, MA, USA, December 1-3, 2021}, pages = {1--11}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/eCrime54498.2021.9738756}, doi = {10.1109/ECRIME54498.2021.9738756}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/ChierziM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/GeorgouliasPFV21, author = {Dimitrios Georgoulias and Jens Myrup Pedersen and Morten Falch and Emmanouil Vasilomanolakis}, title = {A qualitative mapping of Darkweb marketplaces}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2021, Boston, MA, USA, December 1-3, 2021}, pages = {1--15}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/eCrime54498.2021.9738766}, doi = {10.1109/ECRIME54498.2021.9738766}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/GeorgouliasPFV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/KumarGTSL21, author = {Neeraj Kumar and Sukhada Ghewari and Harshal Tupsamudre and Manish Shukla and Sachin Lodha}, title = {When Diversity Meets Hostility: {A} Study of Domain Squatting Abuse in Online Banking}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2021, Boston, MA, USA, December 1-3, 2021}, pages = {1--15}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/eCrime54498.2021.9738769}, doi = {10.1109/ECRIME54498.2021.9738769}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/KumarGTSL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/LeeN21, author = {Kevin Lee and Arvind Narayanan}, title = {Security and Privacy Risks of Number Recycling at Mobile Carriers in the United States}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2021, Boston, MA, USA, December 1-3, 2021}, pages = {1--17}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/eCrime54498.2021.9738792}, doi = {10.1109/ECRIME54498.2021.9738792}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/LeeN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/PeersmanPR21, author = {Claudia Peersman and Denny Pencheva and Awais Rashid}, title = {Tokyo, Denver, Helsinki, Lisbon or the Professor? {A} Framework for Understanding Cybercriminal Roles in Darknet Markets}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2021, Boston, MA, USA, December 1-3, 2021}, pages = {1--12}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/eCrime54498.2021.9738782}, doi = {10.1109/ECRIME54498.2021.9738782}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/PeersmanPR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/RajagulasingamT21, author = {Christina Rajagulasingam and Jacqui Taylor}, title = {The roles of self-control, need for cognition, impulsivity and viewing time in deception detection using a realistic e-mail phishing task}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2021, Boston, MA, USA, December 1-3, 2021}, pages = {1--5}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/eCrime54498.2021.9738794}, doi = {10.1109/ECRIME54498.2021.9738794}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/RajagulasingamT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/RegeB21, author = {Aunshul Rege and Rachel Bleiman}, title = {Collegiate Social Engineering Capture the Flag Competition}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2021, Boston, MA, USA, December 1-3, 2021}, pages = {1--11}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/eCrime54498.2021.9738746}, doi = {10.1109/ECRIME54498.2021.9738746}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/RegeB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/RoyKN21, author = {Sayak Saha Roy and Unique Karanjit and Shirin Nilizadeh}, title = {Evaluating the Effectiveness of Phishing Reports on Twitter}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2021, Boston, MA, USA, December 1-3, 2021}, pages = {1--13}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/eCrime54498.2021.9738786}, doi = {10.1109/ECRIME54498.2021.9738786}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/RoyKN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/WangAC21, author = {Yichao Wang and Budi Arief and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, title = {Toad in the Hole or Mapo Tofu? Comparative Analysis of English and Chinese Darknet Markets}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2021, Boston, MA, USA, December 1-3, 2021}, pages = {1--13}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/eCrime54498.2021.9738745}, doi = {10.1109/ECRIME54498.2021.9738745}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/WangAC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ecrime/2021, title = {{APWG} Symposium on Electronic Crime Research, eCrime 2021, Boston, MA, USA, December 1-3, 2021}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/eCrime54498.2021}, doi = {10.1109/ECRIME54498.2021}, isbn = {978-1-6654-8029-1}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/Barr-SmithW20, author = {Frederick Barr{-}Smith and Joss Wright}, title = {Phishing With {A} Darknet: Imitation of Onion Services}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2020, Boston, MA, USA, November 16-19, 2020}, pages = {1--13}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/eCrime51433.2020.9493262}, doi = {10.1109/ECRIME51433.2020.9493262}, timestamp = {Mon, 09 Aug 2021 09:09:23 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/Barr-SmithW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/BitaabCOZSPKBWS20, author = {Marzieh Bitaab and Haehyun Cho and Adam Oest and Penghui Zhang and Zhibo Sun and Rana Pourmohamad and Doowon Kim and Tiffany Bao and Ruoyu Wang and Yan Shoshitaishvili and Adam Doup{\'{e}} and Gail{-}Joon Ahn}, title = {Scam Pandemic: How Attackers Exploit Public Fear through Phishing}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2020, Boston, MA, USA, November 16-19, 2020}, pages = {1--10}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/eCrime51433.2020.9493260}, doi = {10.1109/ECRIME51433.2020.9493260}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/BitaabCOZSPKBWS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/BurtonTSHMJ20, author = {Ren{\'{e}}e Burton and Vadym Tymchenko and Nicholas Sundvall and Minh Hoang and Jim Mozley and Michael Josten}, title = {WordyThief: {A} Malicious Spammer}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2020, Boston, MA, USA, November 16-19, 2020}, pages = {1--11}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/eCrime51433.2020.9493261}, doi = {10.1109/ECRIME51433.2020.9493261}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/BurtonTSHMJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/Correia20, author = {Sara Giro Correia}, title = {Patterns of online repeat victimisation and implications for crime prevention}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2020, Boston, MA, USA, November 16-19, 2020}, pages = {1--11}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/eCrime51433.2020.9493258}, doi = {10.1109/ECRIME51433.2020.9493258}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/Correia20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/CuiJBO20, author = {Qian Cui and Guy{-}Vincent Jourdan and Gregor v. Bochmann and Iosif{-}Viorel Onut}, title = {SemanticPhish: {A} Semantic-based Scanning System for Early Detection of Phishing Attacks}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2020, Boston, MA, USA, November 16-19, 2020}, pages = {1--12}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/eCrime51433.2020.9493252}, doi = {10.1109/ECRIME51433.2020.9493252}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/CuiJBO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/DodsonBT20, author = {Michael Dodson and Alastair R. Beresford and Daniel R. Thomas}, title = {When will my {PLC} support Mirai? The security economics of large-scale attacks against Internet-connected {ICS} devices}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2020, Boston, MA, USA, November 16-19, 2020}, pages = {1--14}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/eCrime51433.2020.9493257}, doi = {10.1109/ECRIME51433.2020.9493257}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/DodsonBT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/GananAT20, author = {Carlos Hernandez Ga{\~{n}}{\'{a}}n and Ugur Akyazi and Elena Tsvetkova}, title = {Beneath the radar: Exploring the economics of business fraud via underground markets}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2020, Boston, MA, USA, November 16-19, 2020}, pages = {1--14}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/eCrime51433.2020.9493263}, doi = {10.1109/ECRIME51433.2020.9493263}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/GananAT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/LeverettJBGG20, author = {{\'{E}}ireann Leverett and Eric Jardine and Erin Burns and Ankit Gangwal and Dan Geer}, title = {Averages don't characterise the heavy tails of ransoms}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2020, Boston, MA, USA, November 16-19, 2020}, pages = {1--12}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/eCrime51433.2020.9493256}, doi = {10.1109/ECRIME51433.2020.9493256}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/LeverettJBGG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/PriceE20, author = {Benjamin Price and Matthew Edwards}, title = {Resource Networks of Pet Scam Websites}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2020, Boston, MA, USA, November 16-19, 2020}, pages = {1--10}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/eCrime51433.2020.9493253}, doi = {10.1109/ECRIME51433.2020.9493253}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/PriceE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/SimpsonM20, author = {Geoffrey Simpson and Tyler Moore}, title = {Empirical Analysis of Losses from Business-Email Compromise}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2020, Boston, MA, USA, November 16-19, 2020}, pages = {1--7}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/eCrime51433.2020.9493250}, doi = {10.1109/ECRIME51433.2020.9493250}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/SimpsonM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/SimpsonMC20, author = {Geoffrey Simpson and Tyler Moore and Richard Clayton}, title = {Ten years of attacks on companies using visual impersonation of domain names}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2020, Boston, MA, USA, November 16-19, 2020}, pages = {1--12}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/eCrime51433.2020.9493251}, doi = {10.1109/ECRIME51433.2020.9493251}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/SimpsonMC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/SutanrikuluCG20, author = {Anela Sutanrikulu and Sandra Czajkowska and Jens Grossklags}, title = {Analysis of Darknet Market Activity as a Country-Specific, Socio-Economic and Technological Phenomenon}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2020, Boston, MA, USA, November 16-19, 2020}, pages = {1--10}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/eCrime51433.2020.9493259}, doi = {10.1109/ECRIME51433.2020.9493259}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/SutanrikuluCG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/XiaWLWZBXHL20, author = {Pengcheng Xia and Haoyu Wang and Xiapu Luo and Lei Wu and Yajin Zhou and Guangdong Bai and Guoai Xu and Gang Huang and Xuanzhe Liu}, title = {Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2020, Boston, MA, USA, November 16-19, 2020}, pages = {1--14}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/eCrime51433.2020.9493255}, doi = {10.1109/ECRIME51433.2020.9493255}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/XiaWLWZBXHL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ecrime/2020, title = {{APWG} Symposium on Electronic Crime Research, eCrime 2020, Boston, MA, USA, November 16-19, 2020}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/eCrime51433.2020}, doi = {10.1109/ECRIME51433.2020}, isbn = {978-1-6654-2539-1}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/BhaleraoASAM19, author = {Rasika Bhalerao and Maxwell Aliapoulios and Ilia Shumailov and Sadia Afroz and Damon McCoy}, title = {Mapping the Underground: Supervised Discovery of Cybercrime Supply Chains}, booktitle = {2019 {APWG} Symposium on Electronic Crime Research, eCrime 2019, Pittsburgh, PA, USA, November 13-15, 2019}, pages = {1--16}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/eCrime47957.2019.9037582}, doi = {10.1109/ECRIME47957.2019.9037582}, timestamp = {Wed, 28 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/BhaleraoASAM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/BidgoliKGW19, author = {Morvareed Bidgoli and Bart P. Knijnenburg and Jens Grossklags and Brad Wardman}, title = {Report Now. Report Effectively. Conceptualizing the Industry Practice for Cybercrime Reporting}, booktitle = {2019 {APWG} Symposium on Electronic Crime Research, eCrime 2019, Pittsburgh, PA, USA, November 13-15, 2019}, pages = {1--10}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/eCrime47957.2019.9037577}, doi = {10.1109/ECRIME47957.2019.9037577}, timestamp = {Mon, 23 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/BidgoliKGW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/BockASMV19, author = {Leon B{\"{o}}ck and Nikolaos Alexopoulos and Emine Saracoglu and Max M{\"{u}}hlh{\"{a}}user and Emmanouil Vasilomanolakis}, title = {Assessing the Threat of Blockchain-based Botnets}, booktitle = {2019 {APWG} Symposium on Electronic Crime Research, eCrime 2019, Pittsburgh, PA, USA, November 13-15, 2019}, pages = {1--11}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/eCrime47957.2019.9037600}, doi = {10.1109/ECRIME47957.2019.9037600}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/BockASMV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/BurtonR19, author = {Ren{\'{e}}e Burton and Laura Rocha}, title = {Whitelists that Work: Creating Defensible Dynamic Whitelists with Statistical Learning}, booktitle = {2019 {APWG} Symposium on Electronic Crime Research, eCrime 2019, Pittsburgh, PA, USA, November 13-15, 2019}, pages = {1--10}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/eCrime47957.2019.9037505}, doi = {10.1109/ECRIME47957.2019.9037505}, timestamp = {Mon, 23 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/BurtonR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/ChuaC19, author = {Yi Ting Chua and Ben Collier}, title = {Fighting the "blackheart airports": internal policing in the Chinese censorship circumvention ecosystem}, booktitle = {2019 {APWG} Symposium on Electronic Crime Research, eCrime 2019, Pittsburgh, PA, USA, November 13-15, 2019}, pages = {1--9}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/eCrime47957.2019.9037500}, doi = {10.1109/ECRIME47957.2019.9037500}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/ChuaC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/ChuaPEOSTH19, author = {Yi Ting Chua and Simon Parkin and Matthew Edwards and Daniela Oliveira and Stefan Schiffner and Gareth Tyson and Alice Hutchings}, title = {Identifying Unintended Harms of Cybersecurity Countermeasures}, booktitle = {2019 {APWG} Symposium on Electronic Crime Research, eCrime 2019, Pittsburgh, PA, USA, November 13-15, 2019}, pages = {1--15}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/eCrime47957.2019.9037589}, doi = {10.1109/ECRIME47957.2019.9037589}, timestamp = {Wed, 03 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/ChuaPEOSTH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/HughesCH19, author = {Jack Hughes and Ben Collier and Alice Hutchings}, title = {From playing games to committing crimes: {A} multi-technique approach to predicting key actors on an online gaming forum}, booktitle = {2019 {APWG} Symposium on Electronic Crime Research, eCrime 2019, Pittsburgh, PA, USA, November 13-15, 2019}, pages = {1--12}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/eCrime47957.2019.9037586}, doi = {10.1109/ECRIME47957.2019.9037586}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/HughesCH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/SaadKM19, author = {Muhammad Saad and Aminollah Khormali and Aziz Mohaisen}, title = {Dine and Dash: Static, Dynamic, and Economic Analysis of In-Browser Cryptojacking}, booktitle = {2019 {APWG} Symposium on Electronic Crime Research, eCrime 2019, Pittsburgh, PA, USA, November 13-15, 2019}, pages = {1--12}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/eCrime47957.2019.9037576}, doi = {10.1109/ECRIME47957.2019.9037576}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/SaadKM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/SommestadK19, author = {Teodor Sommestad and Henrik Karlz{\'{e}}n}, title = {A meta-analysis of field experiments on phishing susceptibility}, booktitle = {2019 {APWG} Symposium on Electronic Crime Research, eCrime 2019, Pittsburgh, PA, USA, November 13-15, 2019}, pages = {1--14}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/eCrime47957.2019.9037502}, doi = {10.1109/ECRIME47957.2019.9037502}, timestamp = {Mon, 23 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/SommestadK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/SperoSCB19, author = {Eric Spero and Milica Stojmenovic and Sonia Chiasson and Robert Biddle}, title = {Control and Understanding in Malware and Legitimate Software}, booktitle = {2019 {APWG} Symposium on Electronic Crime Research, eCrime 2019, Pittsburgh, PA, USA, November 13-15, 2019}, pages = {1--11}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/eCrime47957.2019.9037597}, doi = {10.1109/ECRIME47957.2019.9037597}, timestamp = {Mon, 23 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/SperoSCB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/TatangQH19, author = {Dennis Tatang and Florian Quinkert and Thorsten Holz}, title = {Below the Radar: Spotting {DNS} Tunnels in Newly Observed Hostnames in the Wild}, booktitle = {2019 {APWG} Symposium on Electronic Crime Research, eCrime 2019, Pittsburgh, PA, USA, November 13-15, 2019}, pages = {1--15}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/eCrime47957.2019.9037595}, doi = {10.1109/ECRIME47957.2019.9037595}, timestamp = {Mon, 23 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/TatangQH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/VetterlC19, author = {Alexander Vetterl and Richard Clayton}, title = {Honware: {A} Virtual Honeypot Framework for Capturing {CPE} and IoT Zero Days}, booktitle = {2019 {APWG} Symposium on Electronic Crime Research, eCrime 2019, Pittsburgh, PA, USA, November 13-15, 2019}, pages = {1--13}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/eCrime47957.2019.9037501}, doi = {10.1109/ECRIME47957.2019.9037501}, timestamp = {Tue, 10 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/VetterlC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ecrime/2019, title = {2019 {APWG} Symposium on Electronic Crime Research, eCrime 2019, Pittsburgh, PA, USA, November 13-15, 2019}, publisher = {{IEEE}}, year = {2019}, url = {https://ieeexplore.ieee.org/xpl/conhome/9028045/proceeding}, isbn = {978-1-7281-6383-3}, timestamp = {Mon, 23 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/AlAhmadiM18, author = {Bushra A. AlAhmadi and Ivan Martinovic}, title = {MalClassifier: Malware family classification using network flow sequence behaviour}, booktitle = {2018 {APWG} Symposium on Electronic Crime Research, eCrime 2018, San Diego, CA, USA, May 15-17, 2018}, pages = {1--13}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ECRIME.2018.8376209}, doi = {10.1109/ECRIME.2018.8376209}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/AlAhmadiM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/DupuisK18, author = {Marc J. Dupuis and Faisal Khan}, title = {Effects of peer feedback on password strength}, booktitle = {2018 {APWG} Symposium on Electronic Crime Research, eCrime 2018, San Diego, CA, USA, May 15-17, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ECRIME.2018.8376210}, doi = {10.1109/ECRIME.2018.8376210}, timestamp = {Sun, 19 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/DupuisK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/ElsayedS18, author = {Yahia Elsayed and Ahmed F. Shosha}, title = {Large scale detection of {IDN} domain name masquerading}, booktitle = {2018 {APWG} Symposium on Electronic Crime Research, eCrime 2018, San Diego, CA, USA, May 15-17, 2018}, pages = {1--11}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ECRIME.2018.8376212}, doi = {10.1109/ECRIME.2018.8376212}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/ElsayedS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/EnbodySB18, author = {Richard J. Enbody and Aditya K. Sood and Pranshu Bajpai}, title = {A key-management-based taxonomy for ransomware}, booktitle = {2018 {APWG} Symposium on Electronic Crime Research, eCrime 2018, San Diego, CA, USA, May 15-17, 2018}, pages = {1--12}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ECRIME.2018.8376213}, doi = {10.1109/ECRIME.2018.8376213}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/EnbodySB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/HolubO18, author = {Artsiom Holub and Jeremiah O'Connor}, title = {{COINHOARDER:} Tracking a ukrainian bitcoin phishing ring {DNS} style}, booktitle = {2018 {APWG} Symposium on Electronic Crime Research, eCrime 2018, San Diego, CA, USA, May 15-17, 2018}, pages = {1--5}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ECRIME.2018.8376207}, doi = {10.1109/ECRIME.2018.8376207}, timestamp = {Thu, 14 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/HolubO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/HouleP18, author = {Cristina Houle and Ruchika Pandey}, title = {A layered approach to defending against list-linking email bombs}, booktitle = {2018 {APWG} Symposium on Electronic Crime Research, eCrime 2018, San Diego, CA, USA, May 15-17, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ECRIME.2018.8376214}, doi = {10.1109/ECRIME.2018.8376214}, timestamp = {Thu, 14 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/HouleP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/NunesSS18, author = {Eric Nunes and Paulo Shakarian and Gerardo I. Simari}, title = {At-risk system identification via analysis of discussions on the darkweb}, booktitle = {2018 {APWG} Symposium on Electronic Crime Research, eCrime 2018, San Diego, CA, USA, May 15-17, 2018}, pages = {1--12}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ECRIME.2018.8376211}, doi = {10.1109/ECRIME.2018.8376211}, timestamp = {Thu, 14 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/NunesSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/OestSDAWW18, author = {Adam Oest and Yeganeh Safaei and Adam Doup{\'{e}} and Gail{-}Joon Ahn and Brad Wardman and Gary Warner}, title = {Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis}, booktitle = {2018 {APWG} Symposium on Electronic Crime Research, eCrime 2018, San Diego, CA, USA, May 15-17, 2018}, pages = {1--12}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ECRIME.2018.8376206}, doi = {10.1109/ECRIME.2018.8376206}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/OestSDAWW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/PageJBFO18, author = {Sophie Le Page and Guy{-}Vincent Jourdan and Gregor von Bochmann and Jason Flood and Iosif{-}Viorel Onut}, title = {Using {URL} shorteners to compare phishing and malware attacks}, booktitle = {2018 {APWG} Symposium on Electronic Crime Research, eCrime 2018, San Diego, CA, USA, May 15-17, 2018}, pages = {1--13}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ECRIME.2018.8376215}, doi = {10.1109/ECRIME.2018.8376215}, timestamp = {Fri, 26 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/PageJBFO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/TianGWM18, author = {Hongwei Tian and Stephen M. Gaffigan and D. Sean West and Damon McCoy}, title = {Bullet-proof payment processors}, booktitle = {2018 {APWG} Symposium on Electronic Crime Research, eCrime 2018, San Diego, CA, USA, May 15-17, 2018}, pages = {1--11}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ECRIME.2018.8376208}, doi = {10.1109/ECRIME.2018.8376208}, timestamp = {Thu, 14 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/TianGWM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ecrime/2018, title = {2018 {APWG} Symposium on Electronic Crime Research, eCrime 2018, San Diego, CA, USA, May 15-17, 2018}, publisher = {{IEEE}}, year = {2018}, url = {https://ieeexplore.ieee.org/xpl/conhome/8372143/proceeding}, isbn = {978-1-5386-4922-0}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/AminiK17, author = {Sara Amini and Chris Kanich}, title = {Characterizing the impact of malware infections and remediation attempts through support forum analysis}, booktitle = {2017 {APWG} Symposium on Electronic Crime Research, eCrime 2017, Phoenix, AZ, USA, April 25-27, 2017}, pages = {70--78}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ECRIME.2017.7945056}, doi = {10.1109/ECRIME.2017.7945056}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/AminiK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/BahnsenBVVG17, author = {Alejandro Correa Bahnsen and Eduardo Contreras Bohorquez and Sergio Villegas and Javier Vargas and Fabio A. Gonz{\'{a}}lez}, title = {Classifying phishing URLs using recurrent neural networks}, booktitle = {2017 {APWG} Symposium on Electronic Crime Research, eCrime 2017, Phoenix, AZ, USA, April 25-27, 2017}, pages = {1--8}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ECRIME.2017.7945048}, doi = {10.1109/ECRIME.2017.7945048}, timestamp = {Tue, 09 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/BahnsenBVVG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/BidgoliG17, author = {Morvareed Bidgoli and Jens Grossklags}, title = {"Hello. This is the {IRS} calling.": {A} case study on scams, extortion, impersonation, and phone spoofing}, booktitle = {2017 {APWG} Symposium on Electronic Crime Research, eCrime 2017, Phoenix, AZ, USA, April 25-27, 2017}, pages = {57--69}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ECRIME.2017.7945055}, doi = {10.1109/ECRIME.2017.7945055}, timestamp = {Wed, 21 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/BidgoliG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/DhimanJY17, author = {Mayank Dhiman and Markus Jakobsson and Ting{-}Fang Yen}, title = {Breaking and fixing content-based filtering}, booktitle = {2017 {APWG} Symposium on Electronic Crime Research, eCrime 2017, Phoenix, AZ, USA, April 25-27, 2017}, pages = {52--56}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ECRIME.2017.7945054}, doi = {10.1109/ECRIME.2017.7945054}, timestamp = {Wed, 21 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/DhimanJY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/FarooqiJIKCSFZ17, author = {Shehroze Farooqi and Guillaume Jourjon and Muhammad Ikram and Mohamed Ali K{\^{a}}afar and Emiliano De Cristofaro and Muhammad Zubair Shafiq and Arik Friedman and Fareed Zaffar}, title = {Characterizing key stakeholders in an online black-hat marketplace}, booktitle = {2017 {APWG} Symposium on Electronic Crime Research, eCrime 2017, Phoenix, AZ, USA, April 25-27, 2017}, pages = {17--27}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ECRIME.2017.7945050}, doi = {10.1109/ECRIME.2017.7945050}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/FarooqiJIKCSFZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/HaslebacherOS17, author = {Andreas Haslebacher and Jeremiah Onaolapo and Gianluca Stringhini}, title = {All your cards are belong to us: Understanding online carding forums}, booktitle = {2017 {APWG} Symposium on Electronic Crime Research, eCrime 2017, Phoenix, AZ, USA, April 25-27, 2017}, pages = {41--51}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ECRIME.2017.7945053}, doi = {10.1109/ECRIME.2017.7945053}, timestamp = {Wed, 21 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/HaslebacherOS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/HutchingsC17, author = {Alice Hutchings and Richard Clayton}, title = {Configuring Zeus: {A} case study of online crime target selection and knowledge transmission}, booktitle = {2017 {APWG} Symposium on Electronic Crime Research, eCrime 2017, Phoenix, AZ, USA, April 25-27, 2017}, pages = {33--40}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ECRIME.2017.7945052}, doi = {10.1109/ECRIME.2017.7945052}, timestamp = {Tue, 10 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/HutchingsC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/KuzunoK17, author = {Hiroki Kuzuno and Christian Karam}, title = {Blockchain explorer: An analytical process and investigation environment for bitcoin}, booktitle = {2017 {APWG} Symposium on Electronic Crime Research, eCrime 2017, Phoenix, AZ, USA, April 25-27, 2017}, pages = {9--16}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ECRIME.2017.7945049}, doi = {10.1109/ECRIME.2017.7945049}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/KuzunoK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/RuefNSS17, author = {Andrew Ruef and Eric Nunes and Paulo Shakarian and Gerardo I. Simari}, title = {Measuring cyber attribution in games}, booktitle = {2017 {APWG} Symposium on Electronic Crime Research, eCrime 2017, Phoenix, AZ, USA, April 25-27, 2017}, pages = {28--32}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ECRIME.2017.7945051}, doi = {10.1109/ECRIME.2017.7945051}, timestamp = {Wed, 21 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/RuefNSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/ThomasCB17, author = {Daniel R. Thomas and Richard Clayton and Alastair R. Beresford}, title = {1000 days of {UDP} amplification DDoS attacks}, booktitle = {2017 {APWG} Symposium on Electronic Crime Research, eCrime 2017, Phoenix, AZ, USA, April 25-27, 2017}, pages = {79--84}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ECRIME.2017.7945057}, doi = {10.1109/ECRIME.2017.7945057}, timestamp = {Tue, 10 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/ThomasCB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ecrime/2017, title = {2017 {APWG} Symposium on Electronic Crime Research, eCrime 2017, Phoenix, AZ, USA, April 25-27, 2017}, publisher = {{IEEE}}, year = {2017}, url = {https://ieeexplore.ieee.org/xpl/conhome/7937992/proceeding}, isbn = {978-1-5386-2701-3}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/BaslymanC16, author = {Malak Baslyman and Sonia Chiasson}, title = {"Smells Phishy?": An educational game about online phishing scams}, booktitle = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto, ON, Canada, June 1-3, 2016}, pages = {91--101}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ECRIME.2016.7487946}, doi = {10.1109/ECRIME.2016.7487946}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/BaslymanC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/BidgoliKG16, author = {Morvareed Bidgoli and Bart P. Knijnenburg and Jens Grossklags}, title = {When cybercrimes strike undergraduates}, booktitle = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto, ON, Canada, June 1-3, 2016}, pages = {42--51}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ECRIME.2016.7487948}, doi = {10.1109/ECRIME.2016.7487948}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/BidgoliKG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/ButlerWP16, author = {Blake Butler and Brad Wardman and Nate Pratt}, title = {{REAPER:} an automated, scalable solution for mass credential harvesting and {OSINT}}, booktitle = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto, ON, Canada, June 1-3, 2016}, pages = {71--80}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ECRIME.2016.7487944}, doi = {10.1109/ECRIME.2016.7487944}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/ButlerWP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/HutchingsCA16, author = {Alice Hutchings and Richard Clayton and Ross J. Anderson}, title = {Taking down websites to prevent crime}, booktitle = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto, ON, Canada, June 1-3, 2016}, pages = {102--111}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ECRIME.2016.7487947}, doi = {10.1109/ECRIME.2016.7487947}, timestamp = {Tue, 10 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/HutchingsCA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/LiaoZDA16, author = {Kevin Liao and Ziming Zhao and Adam Doup{\'{e}} and Gail{-}Joon Ahn}, title = {Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin}, booktitle = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto, ON, Canada, June 1-3, 2016}, pages = {1--13}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ECRIME.2016.7487938}, doi = {10.1109/ECRIME.2016.7487938}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/LiaoZDA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/SundaresanMAP16, author = {Srikanth Sundaresan and Damon McCoy and Sadia Afroz and Vern Paxson}, title = {Profiling underground merchants based on network behavior}, booktitle = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto, ON, Canada, June 1-3, 2016}, pages = {62--70}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ECRIME.2016.7487943}, doi = {10.1109/ECRIME.2016.7487943}, timestamp = {Wed, 28 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/SundaresanMAP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/VargasBVI16, author = {Javier Vargas and Alejandro Correa Bahnsen and Sergio Villegas and Daniel Ingevaldson}, title = {Knowing your enemies: leveraging data analysis to expose phishing patterns against a major {US} financial institution}, booktitle = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto, ON, Canada, June 1-3, 2016}, pages = {52--61}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ECRIME.2016.7487942}, doi = {10.1109/ECRIME.2016.7487942}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/VargasBVI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/WullinkMDMH16, author = {Maarten Wullink and Moritz M{\"{u}}ller and Marco Davids and Giovane C. M. Moura and Cristian Hesselman}, title = {{ENTRADA:} enabling {DNS} big data applications}, booktitle = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto, ON, Canada, June 1-3, 2016}, pages = {14--24}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ECRIME.2016.7487939}, doi = {10.1109/ECRIME.2016.7487939}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/WullinkMDMH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/Zhang-KennedyCO16, author = {Leah Zhang{-}Kennedy and Sonia Chiasson and Paul C. van Oorschot}, title = {Revisiting password rules: facilitating human management of passwords}, booktitle = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto, ON, Canada, June 1-3, 2016}, pages = {81--90}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ECRIME.2016.7487945}, doi = {10.1109/ECRIME.2016.7487945}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/Zhang-KennedyCO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/Zhang-KennedyFC16, author = {Leah Zhang{-}Kennedy and Elias Fares and Sonia Chiasson and Robert Biddle}, title = {Geo-Phisher: the design and evaluation of information visualizations about internet phishing trends}, booktitle = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto, ON, Canada, June 1-3, 2016}, pages = {30--41}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ECRIME.2016.7487941}, doi = {10.1109/ECRIME.2016.7487941}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/Zhang-KennedyFC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/ZhaoLW16, author = {Xuan Zhao and Jay Luan and Matt Wolff}, title = {Evaluating randomness in cyber attack textual artifacts}, booktitle = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto, ON, Canada, June 1-3, 2016}, pages = {25--29}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ECRIME.2016.7487940}, doi = {10.1109/ECRIME.2016.7487940}, timestamp = {Wed, 04 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/ZhaoLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ecrime/2016, title = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto, ON, Canada, June 1-3, 2016}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/xpl/conhome/7486625/proceeding}, isbn = {978-1-5090-2922-8}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/0002KSS15, author = {Ryan Johnson and Nikolaos Kiourtis and Angelos Stavrou and Vincent Sritapan}, title = {Analysis of content copyright infringement in mobile application markets}, booktitle = {2015 {APWG} Symposium on Electronic Crime Research, eCrime 2015, Barcelona, Spain, May 26-29, 2015}, pages = {43--52}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ECRIME.2015.7120798}, doi = {10.1109/ECRIME.2015.7120798}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/0002KSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/DongKBC15, author = {Zheng Dong and Apu Kapadia and Jim Blythe and L. Jean Camp}, title = {Beyond the lock icon: real-time detection of phishing websites using public key certificates}, booktitle = {2015 {APWG} Symposium on Electronic Crime Research, eCrime 2015, Barcelona, Spain, May 26-29, 2015}, pages = {1--12}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ECRIME.2015.7120795}, doi = {10.1109/ECRIME.2015.7120795}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/DongKBC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/GargC15, author = {Vaibhav Garg and L. Jean Camp}, title = {Spare the rod, spoil the network security? Economic analysis of sanctions online}, booktitle = {2015 {APWG} Symposium on Electronic Crime Research, eCrime 2015, Barcelona, Spain, May 26-29, 2015}, pages = {59--68}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ECRIME.2015.7120800}, doi = {10.1109/ECRIME.2015.7120800}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/GargC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/MooreC15, author = {Tyler Moore and Richard Clayton}, title = {Which malware lures work best? Measurements from a large instant messaging worm}, booktitle = {2015 {APWG} Symposium on Electronic Crime Research, eCrime 2015, Barcelona, Spain, May 26-29, 2015}, pages = {69--78}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ECRIME.2015.7120801}, doi = {10.1109/ECRIME.2015.7120801}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/MooreC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/SantosGAG15, author = {Sergio de los Santos and Antonio Guzm{\'{a}}n and Chema Alonso and Francisco G{\'{o}}mez{-}Rodr{\'{\i}}guez}, title = {Chasing shuabang in apps stores}, booktitle = {2015 {APWG} Symposium on Electronic Crime Research, eCrime 2015, Barcelona, Spain, May 26-29, 2015}, pages = {13--21}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ECRIME.2015.7120796}, doi = {10.1109/ECRIME.2015.7120796}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/SantosGAG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/SpringKS15, author = {Jonathan M. Spring and Sarah Kern and Alec Summers}, title = {Global adversarial capability modeling}, booktitle = {2015 {APWG} Symposium on Electronic Crime Research, eCrime 2015, Barcelona, Spain, May 26-29, 2015}, pages = {22--42}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ECRIME.2015.7120797}, doi = {10.1109/ECRIME.2015.7120797}, timestamp = {Wed, 21 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/SpringKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/WarnerRN15, author = {Gary Warner and Dhiraj Rajani and Mike Nagy}, title = {Spammer success through customization and randomization of URLs}, booktitle = {2015 {APWG} Symposium on Electronic Crime Research, eCrime 2015, Barcelona, Spain, May 26-29, 2015}, pages = {53--58}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ECRIME.2015.7120799}, doi = {10.1109/ECRIME.2015.7120799}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/WarnerRN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ecrime/2015, title = {2015 {APWG} Symposium on Electronic Crime Research, eCrime 2015, Barcelona, Spain, May 26-29, 2015}, publisher = {{IEEE}}, year = {2015}, url = {https://ieeexplore.ieee.org/xpl/conhome/7118853/proceeding}, isbn = {978-1-4799-8909-6}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/DewanKK14, author = {Prateek Dewan and Anand Kashyap and Ponnurangam Kumaraguru}, title = {Analyzing social and stylometric features to identify spear phishing emails}, booktitle = {2014 {APWG} Symposium on Electronic Crime Research, eCrime 2014, Birmingham, AL, USA, September 23-25, 2014}, pages = {1--13}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ECRIME.2014.6963160}, doi = {10.1109/ECRIME.2014.6963160}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/DewanKK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/GuptaAK14, author = {Neha Gupta and Anupama Aggarwal and Ponnurangam Kumaraguru}, title = {bit.ly/malicious: Deep dive into short {URL} based e-crime detection}, booktitle = {2014 {APWG} Symposium on Electronic Crime Research, eCrime 2014, Birmingham, AL, USA, September 23-25, 2014}, pages = {14--24}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ECRIME.2014.6963161}, doi = {10.1109/ECRIME.2014.6963161}, timestamp = {Mon, 04 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/GuptaAK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/GuptaK14, author = {Srishti Gupta and Ponnurangam Kumaraguru}, title = {Emerging phishing trends and effectiveness of the anti-phishing landing page}, booktitle = {2014 {APWG} Symposium on Electronic Crime Research, eCrime 2014, Birmingham, AL, USA, September 23-25, 2014}, pages = {36--47}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ECRIME.2014.6963163}, doi = {10.1109/ECRIME.2014.6963163}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/GuptaK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/JonesM14, author = {Jackie Jones and Damon McCoy}, title = {The check is in the mail: Monetization of Craigslist buyer scams}, booktitle = {2014 {APWG} Symposium on Electronic Crime Research, eCrime 2014, Birmingham, AL, USA, September 23-25, 2014}, pages = {25--35}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ECRIME.2014.6963162}, doi = {10.1109/ECRIME.2014.6963162}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/JonesM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/NeisiusC14, author = {Jens Neisius and Richard Clayton}, title = {Orchestrated crime: The high yield investment fraud ecosystem}, booktitle = {2014 {APWG} Symposium on Electronic Crime Research, eCrime 2014, Birmingham, AL, USA, September 23-25, 2014}, pages = {48--58}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ECRIME.2014.6963164}, doi = {10.1109/ECRIME.2014.6963164}, timestamp = {Tue, 10 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/NeisiusC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ecrime/2014, title = {2014 {APWG} Symposium on Electronic Crime Research, eCrime 2014, Birmingham, AL, USA, September 23-25, 2014}, publisher = {{IEEE}}, year = {2014}, url = {https://ieeexplore.ieee.org/xpl/conhome/6945946/proceeding}, isbn = {978-1-4799-6509-0}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/AfrozGMG13, author = {Sadia Afroz and Vaibhav Garg and Damon McCoy and Rachel Greenstadt}, title = {Honor among thieves: {A} common's analysis of cybercrime economies}, booktitle = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013}, pages = {1--11}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/eCRS.2013.6805778}, doi = {10.1109/ECRS.2013.6805778}, timestamp = {Wed, 28 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/AfrozGMG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/GengLWT13, author = {Guang{-}Gang Geng and Xiao{-}Dong Lee and Wei Wang and Shian{-}Shyong Tseng}, title = {Favicon - a clue to phishing sites detection}, booktitle = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013}, pages = {1--10}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/eCRS.2013.6805775}, doi = {10.1109/ECRS.2013.6805775}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/GengLWT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/GuptaLK13, author = {Aditi Gupta and Hemank Lamba and Ponnurangam Kumaraguru}, title = {{\textdollar}1.00 per {RT} {\#}BostonMarathon {\#}PrayForBoston: Analyzing fake content on Twitter}, booktitle = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013}, pages = {1--12}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/eCRS.2013.6805772}, doi = {10.1109/ECRS.2013.6805772}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/GuptaLK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/HoltCS13, author = {Thomas J. Holt and Yi Ting Chua and Olga Smirnova}, title = {An exploration of the factors affecting the advertised price for stolen data}, booktitle = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013}, pages = {1--10}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/eCRS.2013.6805781}, doi = {10.1109/ECRS.2013.6805781}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/HoltCS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/KaramiGM13, author = {Mohammad Karami and Shiva Ghaemi and Damon McCoy}, title = {Folex: An analysis of an herbal and counterfeit luxury goods affiliate program}, booktitle = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013}, pages = {1--9}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/eCRS.2013.6805782}, doi = {10.1109/ECRS.2013.6805782}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/KaramiGM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/Mahjoub13, author = {Dhia Mahjoub}, title = {Monitoring a fast flux botnet using recursive and passive {DNS:} {A} case study}, booktitle = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013}, pages = {1--9}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/eCRS.2013.6805783}, doi = {10.1109/ECRS.2013.6805783}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/Mahjoub13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/MoserBB13, author = {Malte M{\"{o}}ser and Rainer B{\"{o}}hme and Dominic Breuker}, title = {An inquiry into money laundering tools in the Bitcoin ecosystem}, booktitle = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013}, pages = {1--14}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/eCRS.2013.6805780}, doi = {10.1109/ECRS.2013.6805780}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/MoserBB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/Rege13, author = {Aunshul Rege}, title = {10v3.c0ns}, booktitle = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013}, pages = {1--9}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/eCRS.2013.6805773}, doi = {10.1109/ECRS.2013.6805773}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/Rege13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/Spring13, author = {Jonathan M. Spring}, title = {A notation for describing the steps in indicator expansion}, booktitle = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013}, pages = {1--6}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/eCRS.2013.6805774}, doi = {10.1109/ECRS.2013.6805774}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/Spring13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/Spring13a, author = {Jonathan M. Spring}, title = {Modeling malicious domain name take-down dynamics: Why eCrime pays}, booktitle = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013}, pages = {1--9}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/eCRS.2013.6805779}, doi = {10.1109/ECRS.2013.6805779}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/Spring13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/VasekM13, author = {Marie Vasek and Tyler Moore}, title = {Empirical analysis of factors affecting malware {URL} detection}, booktitle = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/eCRS.2013.6805776}, doi = {10.1109/ECRS.2013.6805776}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/VasekM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/WardmanKW13, author = {Brad Wardman and Lisa Kelly and Michael Weideman}, title = {Voice of the customer}, booktitle = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013}, pages = {1--7}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/eCRS.2013.6805771}, doi = {10.1109/ECRS.2013.6805771}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/WardmanKW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/ZawoadDSHBW13, author = {Shams Zawoad and Amit Kumar Dutta and Alan P. Sprague and Ragib Hasan and Jason Britt and Gary Warner}, title = {Phish-Net: Investigating phish clusters using drop email addresses}, booktitle = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013}, pages = {1--13}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/eCRS.2013.6805777}, doi = {10.1109/ECRS.2013.6805777}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/ZawoadDSHBW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/Zhang-KennedyCB13, author = {Leah Zhang{-}Kennedy and Sonia Chiasson and Robert Biddle}, title = {Password advice shouldn't be boring: Visualizing password guessing attacks}, booktitle = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013}, pages = {1--11}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/eCRS.2013.6805770}, doi = {10.1109/ECRS.2013.6805770}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/Zhang-KennedyCB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ecrime/2013, title = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013}, publisher = {{IEEE}}, year = {2013}, url = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6802823}, isbn = {978-1-4799-1158-5}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/AggarwalRK12, author = {Anupama Aggarwal and Ashwin Rajadesingan and Ponnurangam Kumaraguru}, title = {PhishAri: Automatic realtime phishing detection on twitter}, booktitle = {2012 eCrime Researchers Summit, eCrime 2012, Las Croabas, PR, USA, October 23-24, 2012}, pages = {1--12}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/eCrime.2012.6489521}, doi = {10.1109/ECRIME.2012.6489521}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/AggarwalRK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/BohmeM12, author = {Rainer B{\"{o}}hme and Tyler Moore}, title = {How do consumers react to cybercrime?}, booktitle = {2012 eCrime Researchers Summit, eCrime 2012, Las Croabas, PR, USA, October 23-24, 2012}, pages = {1--12}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/eCrime.2012.6489519}, doi = {10.1109/ECRIME.2012.6489519}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/BohmeM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/HelfrichN12, author = {James N. Helfrich and Rick Neff}, title = {Dual canonicalization: An answer to the homograph attack}, booktitle = {2012 eCrime Researchers Summit, eCrime 2012, Las Croabas, PR, USA, October 23-24, 2012}, pages = {1--10}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/eCrime.2012.6489517}, doi = {10.1109/ECRIME.2012.6489517}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/HelfrichN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/LevinRWK12, author = {Rachel Levin and Jonathan Richardson and Gary Warner and Kent Kerley}, title = {Explaining Cybercrime through the Lens of Differential Association Theory, Hadidi44-2.php PayPal Case Study}, booktitle = {2012 eCrime Researchers Summit, eCrime 2012, Las Croabas, PR, USA, October 23-24, 2012}, pages = {1--7}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/eCrime.2012.6489518}, doi = {10.1109/ECRIME.2012.6489518}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/LevinRWK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/MahmoudCM12, author = {Muhammad Mahmoud and Sonia Chiasson and Ashraf Matrawy}, title = {Does context influence responses to firewall warnings?}, booktitle = {2012 eCrime Researchers Summit, eCrime 2012, Las Croabas, PR, USA, October 23-24, 2012}, pages = {1--10}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/eCrime.2012.6489516}, doi = {10.1109/ECRIME.2012.6489516}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/MahmoudCM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/MoorRSO12, author = {Dan Moor and Siva Raj Rajagopalan and Sathya Chandran Sundaramurthy and Xinming Ou}, title = {Investigative response modeling and predictive data collection}, booktitle = {2012 eCrime Researchers Summit, eCrime 2012, Las Croabas, PR, USA, October 23-24, 2012}, pages = {1--6}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/eCrime.2012.6489520}, doi = {10.1109/ECRIME.2012.6489520}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/MoorRSO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/MooreC12, author = {Tyler Moore and Richard Clayton}, title = {Discovering phishing dropboxes using email metadata}, booktitle = {2012 eCrime Researchers Summit, eCrime 2012, Las Croabas, PR, USA, October 23-24, 2012}, pages = {1--9}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/eCrime.2012.6489515}, doi = {10.1109/ECRIME.2012.6489515}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/MooreC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ecrime/2012, title = {2012 eCrime Researchers Summit, eCrime 2012, Las Croabas, PR, USA, October 23-24, 2012}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/xpl/conhome/6482713/proceeding}, isbn = {978-1-4673-2544-8}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/GargHC11, author = {Vaibhav Garg and Nathaniel Husted and L. Jean Camp}, title = {The smuggling theory approach to organized digital crime}, booktitle = {2011 eCrime Researchers Summit, eCrime 2011, San Diego, CA, USA, November 7-9, 2011}, pages = {1--7}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/eCrime.2011.6151980}, doi = {10.1109/ECRIME.2011.6151980}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/GargHC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/NeroWCW11, author = {Philip J. Nero and Brad Wardman and Heith Copes and Gary Warner}, title = {Phishing: Crime that pays}, booktitle = {2011 eCrime Researchers Summit, eCrime 2011, San Diego, CA, USA, November 7-9, 2011}, pages = {1--10}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/eCrime.2011.6151979}, doi = {10.1109/ECRIME.2011.6151979}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/NeroWCW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/NevilleH11, author = {Stephen W. Neville and Michael Horie}, title = {Controlling spam and spear phishing via peered network overlays and non-repudiable traceback}, booktitle = {2011 eCrime Researchers Summit, eCrime 2011, San Diego, CA, USA, November 7-9, 2011}, pages = {1--13}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/eCrime.2011.6151976}, doi = {10.1109/ECRIME.2011.6151976}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/NevilleH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/RiccardiPV11, author = {Marco Riccardi and Roberto Di Pietro and Jorge Aguila Vila}, title = {Taming Zeus by leveraging its own crypto internals}, booktitle = {2011 eCrime Researchers Summit, eCrime 2011, San Diego, CA, USA, November 7-9, 2011}, pages = {1--9}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/eCrime.2011.6151981}, doi = {10.1109/ECRIME.2011.6151981}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/RiccardiPV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/ValdezGWR11, author = {Jason Valdez and Mina Guirguis and David Wingate and Rory Rinkevich}, title = {An expanding reference library for Peer-to-Peer content}, booktitle = {2011 eCrime Researchers Summit, eCrime 2011, San Diego, CA, USA, November 7-9, 2011}, pages = {1--8}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/eCrime.2011.6151978}, doi = {10.1109/ECRIME.2011.6151978}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/ValdezGWR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/WardmanSWS11, author = {Brad Wardman and Tommy Stallings and Gary Warner and Anthony Skjellum}, title = {High-performance content-based phishing attack detection}, booktitle = {2011 eCrime Researchers Summit, eCrime 2011, San Diego, CA, USA, November 7-9, 2011}, pages = {1--9}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/eCrime.2011.6151977}, doi = {10.1109/ECRIME.2011.6151977}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/WardmanSWS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ecrime/2011, title = {2011 eCrime Researchers Summit, eCrime 2011, San Diego, CA, USA, November 7-9, 2011}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/xpl/conhome/6146508/proceeding}, isbn = {978-1-4577-1340-8}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/GaoMRR10, author = {Wei Gao and Thomas H. Morris and Bradley Reaves and Drew Richey}, title = {On {SCADA} control system command and response injection and intrusion detection}, booktitle = {2010 eCrime Researchers Summit, eCrime 2010, Dallas, TX, USA, October 18-20, 2010}, pages = {1--9}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ecrime.2010.5706699}, doi = {10.1109/ECRIME.2010.5706699}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/GaoMRR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/LaytonWD10, author = {Robert Layton and Paul A. Watters and Richard Dazeley}, title = {Automatically determining phishing campaigns using the {USCAP} methodology}, booktitle = {2010 eCrime Researchers Summit, eCrime 2010, Dallas, TX, USA, October 18-20, 2010}, pages = {1--8}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ecrime.2010.5706698}, doi = {10.1109/ECRIME.2010.5706698}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/LaytonWD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/PillayS10, author = {Sangita Pillay and Thamar Solorio}, title = {Authorship attribution of web forum posts}, booktitle = {2010 eCrime Researchers Summit, eCrime 2010, Dallas, TX, USA, October 18-20, 2010}, pages = {1--7}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ecrime.2010.5706693}, doi = {10.1109/ECRIME.2010.5706693}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/PillayS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/RiccardiOLCV10, author = {Marco Riccardi and David Oro and Jesus Luna and Marco Cremonini and Marc Vilanova}, title = {A framework for financial botnet analysis}, booktitle = {2010 eCrime Researchers Summit, eCrime 2010, Dallas, TX, USA, October 18-20, 2010}, pages = {1--7}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ecrime.2010.5706697}, doi = {10.1109/ECRIME.2010.5706697}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/RiccardiOLCV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/TannerWSO10, author = {Brian K. Tanner and Gary Warner and Henry Stern and Scott Olechowski}, title = {Koobface: The evolution of the social botnet}, booktitle = {2010 eCrime Researchers Summit, eCrime 2010, Dallas, TX, USA, October 18-20, 2010}, pages = {1--10}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ecrime.2010.5706694}, doi = {10.1109/ECRIME.2010.5706694}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/TannerWSO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/ToolanC10, author = {Fergus Toolan and Joe Carthy}, title = {Feature selection for Spam and Phishing detection}, booktitle = {2010 eCrime Researchers Summit, eCrime 2010, Dallas, TX, USA, October 18-20, 2010}, pages = {1--12}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ecrime.2010.5706696}, doi = {10.1109/ECRIME.2010.5706696}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/ToolanC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/UnluB10, author = {Seckin Anil Unlu and Kemal Bicakci}, title = {NoTabNab: Protection against the "tabnabbing attack"}, booktitle = {2010 eCrime Researchers Summit, eCrime 2010, Dallas, TX, USA, October 18-20, 2010}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ecrime.2010.5706695}, doi = {10.1109/ECRIME.2010.5706695}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/UnluB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/ZadigT10, author = {Sean M. Zadig and Gurvirender P. Tejay}, title = {Securing {IS} assets through hacker deterrence: {A} case study}, booktitle = {2010 eCrime Researchers Summit, eCrime 2010, Dallas, TX, USA, October 18-20, 2010}, pages = {1--7}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ecrime.2010.5706700}, doi = {10.1109/ECRIME.2010.5706700}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/ZadigT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ecrime/2010, title = {2010 eCrime Researchers Summit, eCrime 2010, Dallas, TX, USA, October 18-20, 2010}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/xpl/conhome/5702590/proceeding}, isbn = {978-1-4244-7760-9}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/GuirguisVLV09, author = {Mina Guirguis and Jason Valdez and Bassam El Lababedi and Joseph Valdez}, title = {Burn Before Reading: {A} stealthy framework for combating live forensics examinations}, booktitle = {2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October 20-21, 2009}, pages = {1--10}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ECRIME.2009.5342613}, doi = {10.1109/ECRIME.2009.5342613}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/GuirguisVLV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/KnickerbockerY009, author = {Paul Knickerbocker and Dongting Yu and Jun Li}, title = {Humboldt: {A} distributed phishing disruption system}, booktitle = {2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October 20-21, 2009}, pages = {1--12}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ECRIME.2009.5342620}, doi = {10.1109/ECRIME.2009.5342620}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/KnickerbockerY009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/LaytonW09, author = {Robert Layton and Paul A. Watters}, title = {Determining provenance in phishing websites using automated conceptual analysis}, booktitle = {2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October 20-21, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ECRIME.2009.5342614}, doi = {10.1109/ECRIME.2009.5342614}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/LaytonW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/LiS09, author = {Shujun Li and Roland Schmitz}, title = {A novel anti-phishing framework based on honeypots}, booktitle = {2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October 20-21, 2009}, pages = {1--13}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ECRIME.2009.5342609}, doi = {10.1109/ECRIME.2009.5342609}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/LiS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/MaYW09, author = {Liping Ma and John Yearwood and Paul A. Watters}, title = {Establishing phishing provenance using orthographic features}, booktitle = {2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October 20-21, 2009}, pages = {1--10}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ECRIME.2009.5342604}, doi = {10.1109/ECRIME.2009.5342604}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/MaYW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/OhCRU09, author = {Onook Oh and Rajarshi Chakraborty and H. Raghav Rao and Shambhu J. Upadhyaya}, title = {An exploration of unintended online private information disclosure in educational institutions across four countries}, booktitle = {2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October 20-21, 2009}, pages = {1--11}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ECRIME.2009.5342606}, doi = {10.1109/ECRIME.2009.5342606}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/OhCRU09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/ReavesM09, author = {Bradley Reaves and Thomas H. Morris}, title = {Discovery, infiltration, and denial of service in a process control system wireless network}, booktitle = {2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October 20-21, 2009}, pages = {1--9}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ECRIME.2009.5342612}, doi = {10.1109/ECRIME.2009.5342612}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/ReavesM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/ShengKACH09, author = {Steve Sheng and Ponnurangam Kumaraguru and Alessandro Acquisti and Lorrie Faith Cranor and Jason I. Hong}, title = {Improving phishing countermeasures: An analysis of expert interviews}, booktitle = {2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October 20-21, 2009}, pages = {1--15}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ECRIME.2009.5342608}, doi = {10.1109/ECRIME.2009.5342608}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/ShengKACH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/ToolanC09, author = {Fergus Toolan and Joe Carthy}, title = {Phishing detection using classifier ensembles}, booktitle = {2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October 20-21, 2009}, pages = {1--9}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ECRIME.2009.5342607}, doi = {10.1109/ECRIME.2009.5342607}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/ToolanC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/WardmanSW09, author = {Brad Wardman and Gaurang Shukla and Gary Warner}, title = {Identifying vulnerable websites by analysis of common strings in phishing URLs}, booktitle = {2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October 20-21, 2009}, pages = {1--13}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ECRIME.2009.5342610}, doi = {10.1109/ECRIME.2009.5342610}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/WardmanSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/Watters09, author = {Paul A. Watters}, title = {Why do users trust the wrong messages? {A} behavioural model of phishing}, booktitle = {2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October 20-21, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ECRIME.2009.5342611}, doi = {10.1109/ECRIME.2009.5342611}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/Watters09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ecrime/2009, title = {2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October 20-21, 2009}, publisher = {{IEEE}}, year = {2009}, url = {https://ieeexplore.ieee.org/xpl/conhome/5339470/proceeding}, isbn = {978-1-4244-4625-4}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/Abu-NimehNWN08, author = {Saeed Abu{-}Nimeh and Dario Nappa and Xinlei Wang and Suku Nair}, title = {A distributed architecture for phishing detection using Bayesian Additive Regression Trees}, booktitle = {2008 eCrime Researchers Summit, eCrime 2008, Atlanta, GA, USA, October 15-16, 2008}, pages = {1--10}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ECRIME.2008.4696965}, doi = {10.1109/ECRIME.2008.4696965}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/Abu-NimehNWN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/HesseP08, author = {Malte Hesse and Norbert Pohlmann}, title = {Internet Situation Awareness}, booktitle = {2008 eCrime Researchers Summit, eCrime 2008, Atlanta, GA, USA, October 15-16, 2008}, pages = {1--9}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ECRIME.2008.4696966}, doi = {10.1109/ECRIME.2008.4696966}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/HesseP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/IraniWGP08, author = {Danesh Irani and Steve Webb and Jonathon Giffin and Calton Pu}, title = {Evolutionary study of phishing}, booktitle = {2008 eCrime Researchers Summit, eCrime 2008, Atlanta, GA, USA, October 15-16, 2008}, pages = {1--10}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ECRIME.2008.4696967}, doi = {10.1109/ECRIME.2008.4696967}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/IraniWGP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/KumaraguruSACH08, author = {Ponnurangam Kumaraguru and Steve Sheng and Alessandro Acquisti and Lorrie Faith Cranor and Jason I. Hong}, title = {Lessons from a real world evaluation of anti-phishing training}, booktitle = {2008 eCrime Researchers Summit, eCrime 2008, Atlanta, GA, USA, October 15-16, 2008}, pages = {1--12}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ECRIME.2008.4696970}, doi = {10.1109/ECRIME.2008.4696970}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/KumaraguruSACH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/MooreC08, author = {Tyler Moore and Richard Clayton}, title = {The consequence of non-cooperation in the fight against phishing}, booktitle = {2008 eCrime Researchers Summit, eCrime 2008, Atlanta, GA, USA, October 15-16, 2008}, pages = {1--14}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ECRIME.2008.4696968}, doi = {10.1109/ECRIME.2008.4696968}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/MooreC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/MyersS08, author = {Steven A. Myers and Sid Stamm}, title = {Practice {\&} prevention of home-router mid-stream injection attacks}, booktitle = {2008 eCrime Researchers Summit, eCrime 2008, Atlanta, GA, USA, October 15-16, 2008}, pages = {1--14}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ECRIME.2008.4696969}, doi = {10.1109/ECRIME.2008.4696969}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/MyersS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/Soghoian08, author = {Christopher Soghoian}, title = {Legal risks for phishing researchers}, booktitle = {2008 eCrime Researchers Summit, eCrime 2008, Atlanta, GA, USA, October 15-16, 2008}, pages = {1--11}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ECRIME.2008.4696971}, doi = {10.1109/ECRIME.2008.4696971}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/Soghoian08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/WardmanW08, author = {Brad Wardman and Gary Warner}, title = {Automating phishing website identification through deep {MD5} matching}, booktitle = {2008 eCrime Researchers Summit, eCrime 2008, Atlanta, GA, USA, October 15-16, 2008}, pages = {1--7}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ECRIME.2008.4696972}, doi = {10.1109/ECRIME.2008.4696972}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/WardmanW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ecrime/2008, title = {2008 eCrime Researchers Summit, eCrime 2008, Atlanta, GA, USA, October 15-16, 2008}, publisher = {{IEEE}}, year = {2008}, url = {https://ieeexplore.ieee.org/xpl/conhome/4689052/proceeding}, isbn = {978-1-4244-2969-1}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/Abu-NimehNWN07, author = {Saeed Abu{-}Nimeh and Dario Nappa and Xinlei Wang and Suku Nair}, editor = {Lorrie Faith Cranor}, title = {A comparison of machine learning techniques for phishing detection}, booktitle = {Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, Pittsburgh, Pennsylvania, USA, October 4-5, 2007}, series = {{ACM} International Conference Proceeding Series}, volume = {269}, pages = {60--69}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1299015.1299021}, doi = {10.1145/1299015.1299021}, timestamp = {Tue, 06 Nov 2018 11:06:53 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/Abu-NimehNWN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/DownsHC07, author = {Julie S. Downs and Mandy B. Holbrook and Lorrie Faith Cranor}, editor = {Lorrie Faith Cranor}, title = {Behavioral response to phishing risk}, booktitle = {Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, Pittsburgh, Pennsylvania, USA, October 4-5, 2007}, series = {{ACM} International Conference Proceeding Series}, volume = {269}, pages = {37--44}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1299015.1299019}, doi = {10.1145/1299015.1299019}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/DownsHC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/FlorencioH07, author = {Dinei A. F. Flor{\^{e}}ncio and Cormac Herley}, editor = {Lorrie Faith Cranor}, title = {Evaluating a trial deployment of password re-use for phishing prevention}, booktitle = {Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, Pittsburgh, Pennsylvania, USA, October 4-5, 2007}, series = {{ACM} International Conference Proceeding Series}, volume = {269}, pages = {26--36}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1299015.1299018}, doi = {10.1145/1299015.1299018}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/FlorencioH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/KumaraguruRSHACH07, author = {Ponnurangam Kumaraguru and Yong Rhee and Steve Sheng and Sharique Hasan and Alessandro Acquisti and Lorrie Faith Cranor and Jason I. Hong}, editor = {Lorrie Faith Cranor}, title = {Getting users to pay attention to anti-phishing education: evaluation of retention and transfer}, booktitle = {Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, Pittsburgh, Pennsylvania, USA, October 4-5, 2007}, series = {{ACM} International Conference Proceeding Series}, volume = {269}, pages = {70--81}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1299015.1299022}, doi = {10.1145/1299015.1299022}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/KumaraguruRSHACH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/LiuS07, author = {Changwei Liu and Sid Stamm}, editor = {Lorrie Faith Cranor}, title = {Fighting unicode-obfuscated spam}, booktitle = {Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, Pittsburgh, Pennsylvania, USA, October 4-5, 2007}, series = {{ACM} International Conference Proceeding Series}, volume = {269}, pages = {45--59}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1299015.1299020}, doi = {10.1145/1299015.1299020}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/LiuS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/MooreC07, author = {Tyler Moore and Richard Clayton}, editor = {Lorrie Faith Cranor}, title = {Examining the impact of website take-down on phishing}, booktitle = {Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, Pittsburgh, Pennsylvania, USA, October 4-5, 2007}, series = {{ACM} International Conference Proceeding Series}, volume = {269}, pages = {1--13}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1299015.1299016}, doi = {10.1145/1299015.1299016}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/MooreC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/WeaverC07, author = {Rhiannon Weaver and M. Patrick Collins}, editor = {Lorrie Faith Cranor}, title = {Fishing for phishes: applying capture-recapture methods to estimate phishing populations}, booktitle = {Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, Pittsburgh, Pennsylvania, USA, October 4-5, 2007}, series = {{ACM} International Conference Proceeding Series}, volume = {269}, pages = {14--25}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1299015.1299017}, doi = {10.1145/1299015.1299017}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/WeaverC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ecrime/2007, editor = {Lorrie Faith Cranor}, title = {Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, Pittsburgh, Pennsylvania, USA, October 4-5, 2007}, series = {{ACM} International Conference Proceeding Series}, volume = {269}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1299015}, doi = {10.1145/1299015}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.