[HTML][HTML] A deeper look into cybersecurity issues in the wake of Covid-19: A survey

M Alawida, AE Omolara, OI Abiodun… - Journal of King Saud …, 2022 - Elsevier
This study analyzed the Coronavirus (COVID-19) crisis from the angle of cyber-crime,
highlighting the wide spectrum of cyberattacks that occurred around the world. The modus …

Business email compromise phishing detection based on machine learning: a systematic literature review

HF Atlam, O Oluwatimilehin - Electronics, 2022 - mdpi.com
The risk of cyberattacks against businesses has risen considerably, with Business Email
Compromise (BEC) schemes taking the lead as one of the most common phishing attack …

Understanding the state of criminological scholarship on cybercrimes

TJ Holt - Computers in Human Behavior, 2023 - Elsevier
Understanding the state of criminological scholarship on cybercrimes - ScienceDirect Skip to
main contentSkip to article Elsevier logo Journals & Books Search RegisterSign in View PDF …

Business email compromise (BEC) attacks

NS Al-Musib, FM Al-Serhani, M Humayun… - Materials Today …, 2023 - Elsevier
Cybercrime is a daily threat against organizations and partners of all sizes and with the rapid
development of technology and the great dependence on it in some transactions, a type of …

Using artificial intelligence (AI) and deepfakes to deceive victims: the need to rethink current romance fraud prevention messaging

C Cross - Crime Prevention and Community Safety, 2022 - Springer
Romance fraud uses the guise of a genuine relationship to deceive a victim for a financial
gain. Each year, millions of individuals globally lose money to these approaches. Current …

A cognitive deception model for generating fake documents to curb data exfiltration in networks during cyber-attacks

OT Taofeek, M Alawida, A Alabdulatif… - IEEE …, 2022 - ieeexplore.ieee.org
The exponential increase in the compromise of sensitive and intellectual properties alludes
to the huge price the global community must pay for the digital revolution we are currently …

Machine learning in financial market surveillance: A survey

S Tiwari, H Ramampiaro, H Langseth - IEEE Access, 2021 - ieeexplore.ieee.org
The use of machine learning for anomaly detection is a well-studied topic within various
application domains. However, the detection problem for market surveillance remains …

[HTML][HTML] SoK: The past decade of user deception in emails and today's email clients' susceptibility to phishing techniques

MF Veit, O Wiese, FL Ballreich, M Volkamer… - Computers & …, 2025 - Elsevier
User deception in emails is still one of the biggest security risks companies and end-users
face alike. Attackers try to mislead their victims when assessing whether emails are …

Cybercrime victimization among Virginia businesses: frequency, vulnerabilities, and consequences of cybervictimization

J Hawdon, K Parti, T Dearden… - Criminal Justice …, 2023 - Taylor & Francis
ABSTRACT The Commonwealth of Virginia, USA, is one of the most vulnerable states to
cyberattacks and breaches. Analyzing data from 428 online surveys collected from Virginia …

Using digital open source and crowdsourced data in studies of deviance and crime

RV Gundur, M Berry, D Taodang - … cybercrimes: Methodologies, ethics …, 2021 - Springer
As the internet has become cheaper, faster, and more widely used, the amount of data
generated by people has increased exponentially. Much of the data is provided by users' …