Victims of cybercrime in Europe: A review of victim surveys

CMM Reep-van den Bergh, M Junger - Crime science, 2018 - Springer
Objectives Review the evidence provided by victim surveys in order to provide a rough
estimate of the personal crime prevalence of the main types of cybercrime. Methods We …

Weaving tangled webs: offense, defense, and deception in cyberspace

E Gartzke, JR Lindsay - Security Studies, 2015 - Taylor & Francis
It is widely believed that cyberspace is offense dominant because of technical characteristics
that undermine deterrence and defense. This argument mistakes the ease of deception on …

Featuresmith: Automatically engineering features for malware detection by mining the security literature

Z Zhu, T Dumitraş - Proceedings of the 2016 ACM SIGSAC conference …, 2016 - dl.acm.org
Malware detection increasingly relies on machine learning techniques, which utilize multiple
features to separate the malware from the benign apps. The effectiveness of these …

Bifocals: Analyzing webview vulnerabilities in android applications

E Chin, D Wagner - … Applications: 14th International Workshop, WISA 2013 …, 2014 - Springer
WebViews allow Android developers to embed a webpage within an application, seamlessly
integrating native application code with HTML and JavaScript web content. While this rich …

Show me the money: Characterizing spam-advertised revenue

C Kanich, N Weaver, D McCoy, T Halvorson… - 20th USENIX Security …, 2011 - usenix.org
Modern spam is ultimately driven by product sales: goods purchased by customers online.
However, while this model is easy to state in the abstract, our understanding of the concrete …

Cyber conflict vs. Cyber Command: hidden dangers in the American military solution to a large-scale intelligence problem

JR Lindsay - Intelligence and National security, 2021 - Taylor & Francis
Is cyber conflict more like war, intelligence, or something else? The stakes of this debate are
not simply conceptual but institutional. United States Cyber Command emerged from the …

How do they find us? A study of geolocation tracking techniques of malicious web sites

M Mansoori, I Welch - Computers & Security, 2020 - Elsevier
Geolocation cloaking is a process in which varying and customised web content is delivered
to visiting users based on the geographical information derived from the users' system and …

Phishing detection system and method of use

L Kohavi - US Patent 11,483,343, 2022 - Google Patents
Detecting a phishing message by providing a phishing detector having a scan engine and a
fetcher, detecting a URL in the message by the scan engine, resolving the URL to a …

Priceless: The role of payments in abuse-advertised goods

D McCoy, H Dharmdasani, C Kreibich… - Proceedings of the …, 2012 - dl.acm.org
Large-scale abusive advertising is a profit-driven endeavor. Without consumers purchasing
spam-advertised Viagra, search-advertised counterfeit software or malware-advertised fake …

Assessing the validity of automated webcrawlers as data collection tools to investigate online child sexual exploitation

B Westlake, M Bouchard, R Frank - Sexual Abuse, 2017 - journals.sagepub.com
The distribution of child sexual exploitation (CE) material has been aided by the growth of
the Internet. The graphic nature and prevalence of the material has made researching and …