[HTML][HTML] A deeper look into cybersecurity issues in the wake of Covid-19: A survey
This study analyzed the Coronavirus (COVID-19) crisis from the angle of cyber-crime,
highlighting the wide spectrum of cyberattacks that occurred around the world. The modus …
highlighting the wide spectrum of cyberattacks that occurred around the world. The modus …
Business email compromise phishing detection based on machine learning: a systematic literature review
HF Atlam, O Oluwatimilehin - Electronics, 2022 - mdpi.com
The risk of cyberattacks against businesses has risen considerably, with Business Email
Compromise (BEC) schemes taking the lead as one of the most common phishing attack …
Compromise (BEC) schemes taking the lead as one of the most common phishing attack …
Understanding the state of criminological scholarship on cybercrimes
TJ Holt - Computers in Human Behavior, 2023 - Elsevier
Understanding the state of criminological scholarship on cybercrimes - ScienceDirect Skip to
main contentSkip to article Elsevier logo Journals & Books Search RegisterSign in View PDF …
main contentSkip to article Elsevier logo Journals & Books Search RegisterSign in View PDF …
Business email compromise (BEC) attacks
NS Al-Musib, FM Al-Serhani, M Humayun… - Materials Today …, 2023 - Elsevier
Cybercrime is a daily threat against organizations and partners of all sizes and with the rapid
development of technology and the great dependence on it in some transactions, a type of …
development of technology and the great dependence on it in some transactions, a type of …
Using artificial intelligence (AI) and deepfakes to deceive victims: the need to rethink current romance fraud prevention messaging
C Cross - Crime Prevention and Community Safety, 2022 - Springer
Romance fraud uses the guise of a genuine relationship to deceive a victim for a financial
gain. Each year, millions of individuals globally lose money to these approaches. Current …
gain. Each year, millions of individuals globally lose money to these approaches. Current …
A cognitive deception model for generating fake documents to curb data exfiltration in networks during cyber-attacks
The exponential increase in the compromise of sensitive and intellectual properties alludes
to the huge price the global community must pay for the digital revolution we are currently …
to the huge price the global community must pay for the digital revolution we are currently …
Machine learning in financial market surveillance: A survey
The use of machine learning for anomaly detection is a well-studied topic within various
application domains. However, the detection problem for market surveillance remains …
application domains. However, the detection problem for market surveillance remains …
[HTML][HTML] SoK: The past decade of user deception in emails and today's email clients' susceptibility to phishing techniques
User deception in emails is still one of the biggest security risks companies and end-users
face alike. Attackers try to mislead their victims when assessing whether emails are …
face alike. Attackers try to mislead their victims when assessing whether emails are …
Cybercrime victimization among Virginia businesses: frequency, vulnerabilities, and consequences of cybervictimization
ABSTRACT The Commonwealth of Virginia, USA, is one of the most vulnerable states to
cyberattacks and breaches. Analyzing data from 428 online surveys collected from Virginia …
cyberattacks and breaches. Analyzing data from 428 online surveys collected from Virginia …
Using digital open source and crowdsourced data in studies of deviance and crime
As the internet has become cheaper, faster, and more widely used, the amount of data
generated by people has increased exponentially. Much of the data is provided by users' …
generated by people has increased exponentially. Much of the data is provided by users' …