[HTML][HTML] A social network of crime: A review of the use of social networks for crime and the detection of crime

B Drury, SM Drury, MA Rahman, I Ullah - Online Social Networks and …, 2022 - Elsevier
Social media is used to commit and detect crimes. With automated methods, it is possible to
scale both crime and detection of crime to a large number of people. The ability of criminals …

Tracking ransomware end-to-end

DY Huang, MM Aliapoulios, VG Li… - … IEEE Symposium on …, 2018 - ieeexplore.ieee.org
Ransomware is a type of malware that encrypts the files of infected hosts and demands
payment, often in a crypto-currency like Bitcoin. In this paper, we create a measurement …

The modus operandi of transnational computer fraud: a crime script analysis in Vietnam

T Van Nguyen - Trends in Organized Crime, 2022 - Springer
This study aims to better understand transnational computer fraud in Vietnam utilizing crime
script analysis. Data from criminal profiles and in-depth interviews with investigators were …

Economic factors of vulnerability trade and exploitation

L Allodi - Proceedings of the 2017 ACM SIGSAC conference on …, 2017 - dl.acm.org
Cybercrime markets support the development and diffusion of new attack technologies,
vulnerability exploits, and malware. Whereas the revenue streams of cyber attackers have …

[PDF][PDF] The cyber security body of knowledge

D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …

Dial one for scam: A large-scale analysis of technical support scams

N Miramirkhani, O Starov, N Nikiforakis - arxiv preprint arxiv:1607.06891, 2016 - arxiv.org
In technical support scams, cybercriminals attempt to convince users that their machines are
infected with malware and are in need of their technical support. In this process, the victims …

O single {Sign-Off}, where art thou? An empirical analysis of single {Sign-On} account hijacking and session management on the web

M Ghasemisharif, A Ramesh, S Checkoway… - 27th USENIX Security …, 2018 - usenix.org
Single Sign-On (SSO) allows users to effortlessly navigate the Web and obtain a
personalized experience without the hassle of creating and managing accounts across …

Artifact modification and associated abuse detection

BM Jakobsson - US Patent 11,323,464, 2022 - Google Patents
An apparatus comprises at least one processing device comprising a processor coupled to a
memory. The processing device is configured to identify artifacts in a plurality of messages of …

" I'm a Professor, which isn't usually a dangerous job": Internet-facilitated Harassment and Its Impact on Researchers

P Doerfler, A Forte, E De Cristofaro… - Proceedings of the …, 2021 - dl.acm.org
While the Internet has dramatically increased the exposure that research can receive, it has
also facilitated harassment against scholars. To understand the impact that these attacks …

Restrained by design: The political economy of cybersecurity

JR Lindsay - Digital Policy, Regulation and Governance, 2017 - emerald.com
Purpose The empirical record of cyberattacks features much computer crime, espionage and
hacktivism, but none of the major damage feared in prevalent threat narratives. The purpose …