Large language models for forecasting and anomaly detection: A systematic literature review
This systematic literature review comprehensively examines the application of Large
Language Models (LLMs) in forecasting and anomaly detection, highlighting the current …
Language Models (LLMs) in forecasting and anomaly detection, highlighting the current …
The art of cybercrime community research
In the last decade, cybercrime has risen considerably. One key factor is the proliferation of
online cybercrime communities, where actors trade products and services, and also learn …
online cybercrime communities, where actors trade products and services, and also learn …
Crawlphish: Large-scale analysis of client-side cloaking techniques in phishing
Phishing is a critical threat to Internet users. Although an extensive ecosystem serves to
protect users, phishing websites are growing in sophistication, and they can slip past the …
protect users, phishing websites are growing in sophistication, and they can slip past the …
" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …
seemingly contradictory results and expands the boundaries of known discoveries …
Scam pandemic: How attackers exploit public fear through phishing
As the COVID-19 pandemic started triggering widespread lockdowns across the globe,
cybercriminals did not hesitate to take advantage of users' increased usage of the Internet …
cybercriminals did not hesitate to take advantage of users' increased usage of the Internet …
[PDF][PDF] Understanding and analyzing appraisal systems in the underground marketplaces
An appraisal system is a feedback mechanism that has gained popularity in underground
marketplaces. This system allows appraisers, who receive free samples from vendors, to …
marketplaces. This system allows appraisers, who receive free samples from vendors, to …
Nothing Personal: Understanding the Spread and Use of Personally Identifiable Information in the Financial Ecosystem
Online services leverage various authentication methods with differing usability and
reliability trade-offs, such as password-based or multi-factor authentication (MFA). However …
reliability trade-offs, such as password-based or multi-factor authentication (MFA). However …
All your shops are belong to us: security weaknesses in e-commerce platforms
Software as a Service (SaaS) e-commerce platforms for merchants allow individual business
owners to set up their online stores almost instantly. Prior work has shown that the checkout …
owners to set up their online stores almost instantly. Prior work has shown that the checkout …
PostCog: A tool for interdisciplinary research into underground forums at scale
Underground forums provide useful insights into cybercrime, where researchers analyse
underlying economies, key actors, their discussions and interactions, as well as different …
underlying economies, key actors, their discussions and interactions, as well as different …
A graph-based stratified sampling methodology for the analysis of (underground) forums
Researchers analyze underground forums to study abuse and cybercrime activities. Due to
the size of the forums and the domain expertise required to identify criminal discussions …
the size of the forums and the domain expertise required to identify criminal discussions …