A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

[PDF][PDF] A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security

M Safaei Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - par.nsf.gov
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …

SoK: Quantifying cyber risk

DW Woods, R Böhme - 2021 IEEE Symposium on Security and …, 2021 - ieeexplore.ieee.org
This paper introduces a causal model inspired by structural equation modeling that explains
cyber risk outcomes in terms of latent factors measured using reflexive indicators. First, we …

The evolution of ransomware attacks in light of recent cyber threats. How can geopolitical conflicts influence the cyber climate?

F Teichmann, SR Boticiu, BS Sergi - International Cybersecurity Law …, 2023 - Springer
This article aims to analyze the current unpredictable cyber climate. In particular, Russia's
invasion of Ukraine has heightened concerns about security incidents, and ransomware …

Catching phishers by their bait: Investigating the dutch phishing landscape through phishing kit detection

H Bijmans, T Booij, A Schwedersky… - 30th USENIX security …, 2021 - usenix.org
Off-the-shelf, easy-to-deploy phishing kits are believed to lower the threshold for criminal
entrepreneurs going phishing. That is, the practice of harvesting user credentials by tricking …

Chatspamdetector: Leveraging large language models for effective phishing email detection

T Koide, N Fukushi, H Nakano, D Chiba - arXiv preprint arXiv:2402.18093, 2024 - arxiv.org
The proliferation of phishing sites and emails poses significant challenges to existing
cybersecurity efforts. Despite advances in spam filters and email security protocols …

[PDF][PDF] Heads in the Clouds? Measuring Universities' Migration to Public Clouds: Implications for Privacy & Academic Freedom

T Fiebig, S Gürses, CH Gañán, E Kotkamp… - … on privacy enhancing …, 2023 - pure.mpg.de
With the emergence of remote education and work in universities due to COVID-19, the
'zoomification'of higher education, ie, the migration of universities to the clouds, reached the …

Leveraging synthetic data and pu learning for phishing email detection

FZ Qachfar, RM Verma, A Mukherjee - Proceedings of the Twelfth ACM …, 2022 - dl.acm.org
Imbalanced data classification has always been one of the most challenging problems in
data science especially in the cybersecurity field, where we observe an out-of-balance …

Lazy gatekeepers: a large-scale study on SPF configuration in the wild

S Czybik, M Horlboge, K Rieck - Proceedings of the 2023 ACM on …, 2023 - dl.acm.org
The Sender Policy Framework (SPF) is a basic mechanism for authorizing the use of
domains in email. In combination with other mechanisms, it serves as a cornerstone for …

[PDF][PDF] Cybercrime: a social ecology

B Collier, A Hutchings - The oxford handbook of criminology, 2023 - cl.cam.ac.uk
From its roots as niche technically-driven crimes and online subcultures, cybercrime and
online harm now dominate public debates. This chapter examines cybercrime from a …