[HTML][HTML] Behavioral analysis of cybercrime: Paving the way for effective policing strategies
This comprehensive survey paper offers a panoramic exploration of the dynamic realm of
cybercrime policing, encompassing a wide spectrum of intricacies from cybercrime …
cybercrime policing, encompassing a wide spectrum of intricacies from cybercrime …
A survey of phishing attack techniques, defence mechanisms and open research challenges
AK Jain, BB Gupta - Enterprise Information Systems, 2022 - Taylor & Francis
Phishing is an identity theft, which deceives Internet users into revealing their sensitive data,
eg, login information, credit/debit card details, and so on. Researchers have developed …
eg, login information, credit/debit card details, and so on. Researchers have developed …
Graph based anomaly detection and description: a survey
Detecting anomalies in data is a vital task, with numerous high-impact applications in areas
such as security, finance, health care, and law enforcement. While numerous techniques …
such as security, finance, health care, and law enforcement. While numerous techniques …
Realtime robust malicious traffic detection via frequency domain analysis
Machine learning (ML) based malicious traffic detection is an emerging security paradigm,
particularly for zero-day attack detection, which is complementary to existing rule based …
particularly for zero-day attack detection, which is complementary to existing rule based …
Paint it black: Evaluating the effectiveness of malware blacklists
Blacklists are commonly used to protect computer systems against the tremendous number
of malware threats. These lists include abusive hosts such as malware sites or botnet …
of malware threats. These lists include abusive hosts such as malware sites or botnet …
Manufacturing compromise: the emergence of exploit-as-a-service
We investigate the emergence of the exploit-as-a-service model for driveby browser
compromise. In this regime, attackers pay for an exploit kit or service to do the" dirty work" of …
compromise. In this regime, attackers pay for an exploit kit or service to do the" dirty work" of …
Automatically detecting vulnerable websites before they turn malicious
K Soska, N Christin - … USENIX Security Symposium (USENIX Security 14 …, 2014 - usenix.org
Significant recent research advances have made it possible to design systems that can
automatically determine with high accuracy the maliciousness of a target website. While …
automatically determine with high accuracy the maliciousness of a target website. While …
[PDF][PDF] Nazca: Detecting Malware Distribution in Large-Scale Networks.
Malware remains one of the most significant security threats on the Internet. Antivirus
solutions and blacklists, the main weapons of defense against these attacks, have only been …
solutions and blacklists, the main weapons of defense against these attacks, have only been …
Throwing darts in the dark? detecting bots with limited data using neural data augmentation
Machine learning has been widely applied to building security applications. However, many
machine learning models require the continuous supply of representative labeled data for …
machine learning models require the continuous supply of representative labeled data for …
Dial one for scam: A large-scale analysis of technical support scams
In technical support scams, cybercriminals attempt to convince users that their machines are
infected with malware and are in need of their technical support. In this process, the victims …
infected with malware and are in need of their technical support. In this process, the victims …