A comprehensive survey of recent internet measurement techniques for cyber security
MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …
vulnerable to its security flaws. Despite substantial efforts to address many of these …
[PDF][PDF] A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security
M Safaei Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - par.nsf.gov
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …
more vulnerable to its security flaws. Despite substantial efforts to address many of these …
Crawlphish: Large-scale analysis of client-side cloaking techniques in phishing
Phishing is a critical threat to Internet users. Although an extensive ecosystem serves to
protect users, phishing websites are growing in sophistication, and they can slip past the …
protect users, phishing websites are growing in sophistication, and they can slip past the …
[PDF][PDF] Double and nothing: Understanding and detecting cryptocurrency giveaway scams
X Li, A Yepuri, N Nikiforakis - … of the Network and Distributed System …, 2023 - par.nsf.gov
As cryptocurrencies increase in popularity and users obtain and manage their own assets,
attackers are pivoting from just abusing cryptocurrencies as a payment mechanism, to …
attackers are pivoting from just abusing cryptocurrencies as a payment mechanism, to …
Unleash the simulacrum: shifting browser realities for robust {Extension-Fingerprinting} prevention
Online tracking has garnered significant attention due to the privacy risk it poses to users.
Among the various approaches, techniques that identify which extensions are installed in a …
Among the various approaches, techniques that identify which extensions are installed in a …
Targeted and Troublesome: Tracking and Advertising on Children's Websites
On the modern web, trackers and advertisers frequently construct and monetize users'
detailed behavioral profiles without consent. Despite various studies on web tracking …
detailed behavioral profiles without consent. Despite various studies on web tracking …
{TRIDENT}: Towards Detecting and Mitigating Web-based Social Engineering Attacks
As the weakest link in cybersecurity, humans have become the main target of attackers who
take advantage of sophisticated web-based social engineering techniques. These attackers …
take advantage of sophisticated web-based social engineering techniques. These attackers …
Harpo: Learning to subvert online behavioral advertising
Online behavioral advertising, and the associated tracking paraphernalia, poses a real
privacy threat. Unfortunately, existing privacy-enhancing tools are not always effective …
privacy threat. Unfortunately, existing privacy-enhancing tools are not always effective …
Cross-Country Examination of People's Experience with Targeted Advertising on Social Media
Social media effectively connects businesses with diverse audiences. However, research
related to targeted advertising and social media is rarely done beyond Western contexts …
related to targeted advertising and social media is rarely done beyond Western contexts …
Internet-Based Social Engineering Psychology, Attacks, and Defenses: A Survey
TT Longtchi, RM Rodriguez, L Al-Shawaf… - Proceedings of the …, 2024 - ieeexplore.ieee.org
Internet-based social engineering (SE) attacks are a major cyber threat. These attacks often
serve as the first step in a sophisticated sequence of attacks that target, among other things …
serve as the first step in a sophisticated sequence of attacks that target, among other things …