Large language models for forecasting and anomaly detection: A systematic literature review
This systematic literature review comprehensively examines the application of Large
Language Models (LLMs) in forecasting and anomaly detection, highlighting the current …
Language Models (LLMs) in forecasting and anomaly detection, highlighting the current …
The art of cybercrime community research
In the last decade, cybercrime has risen considerably. One key factor is the proliferation of
online cybercrime communities, where actors trade products and services, and also learn …
online cybercrime communities, where actors trade products and services, and also learn …
Crawlphish: Large-scale analysis of client-side cloaking techniques in phishing
Phishing is a critical threat to Internet users. Although an extensive ecosystem serves to
protect users, phishing websites are growing in sophistication, and they can slip past the …
protect users, phishing websites are growing in sophistication, and they can slip past the …
Turning up the dial: the evolution of a cybercrime market through set-up, stable, and covid-19 eras
Trust and reputation play a core role in underground cybercrime markets, where participants
are anonymous and there is little legal recourse for dispute arbitration. These underground …
are anonymous and there is little legal recourse for dispute arbitration. These underground …
Scam pandemic: How attackers exploit public fear through phishing
As the COVID-19 pandemic started triggering widespread lockdowns across the globe,
cybercriminals did not hesitate to take advantage of users' increased usage of the Internet …
cybercriminals did not hesitate to take advantage of users' increased usage of the Internet …
[PDF][PDF] Understanding and analyzing appraisal systems in the underground marketplaces
An appraisal system is a feedback mechanism that has gained popularity in underground
marketplaces. This system allows appraisers, who receive free samples from vendors, to …
marketplaces. This system allows appraisers, who receive free samples from vendors, to …
Nothing Personal: Understanding the Spread and Use of Personally Identifiable Information in the Financial Ecosystem
Online services leverage various authentication methods with differing usability and
reliability trade-offs, such as password-based or multi-factor authentication (MFA). However …
reliability trade-offs, such as password-based or multi-factor authentication (MFA). However …
Enhancing E-commerce Recommendations: Unveiling Insights from Customer Reviews with BERTFusionDNN
In the domain of e-commerce, customer reviews wield significant influence over business
strategies. Despite the existence of various recommendation methodologies like …
strategies. Despite the existence of various recommendation methodologies like …
Sok: An evaluation of the secure end user experience on the dark net through systematic literature review
The World Wide Web (www) consists of the surface web, deep web, and Dark Web,
depending on the content shared and the access to these network layers. Dark Web consists …
depending on the content shared and the access to these network layers. Dark Web consists …
Missing the mark? Identifying child sexual abuse material forum structure and key-players based on public replies and private messaging networks
FM Gnielka, R Reichel, A Blokland, A Daser… - Humanities and Social …, 2024 - nature.com
Darknet forums dedicated to child sexual abuse material (CSAM) attract thousands of users
interacting with each other through online communications. Given finite resources, law …
interacting with each other through online communications. Given finite resources, law …