A comprehensive survey of recent internet measurement techniques for cyber security
MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …
vulnerable to its security flaws. Despite substantial efforts to address many of these …
[PDF][PDF] A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security
M Safaei Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - par.nsf.gov
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …
more vulnerable to its security flaws. Despite substantial efforts to address many of these …
SoK: Quantifying cyber risk
This paper introduces a causal model inspired by structural equation modeling that explains
cyber risk outcomes in terms of latent factors measured using reflexive indicators. First, we …
cyber risk outcomes in terms of latent factors measured using reflexive indicators. First, we …
The evolution of ransomware attacks in light of recent cyber threats. How can geopolitical conflicts influence the cyber climate?
F Teichmann, SR Boticiu, BS Sergi - International Cybersecurity Law …, 2023 - Springer
This article aims to analyze the current unpredictable cyber climate. In particular, Russia's
invasion of Ukraine has heightened concerns about security incidents, and ransomware …
invasion of Ukraine has heightened concerns about security incidents, and ransomware …
Catching phishers by their bait: Investigating the dutch phishing landscape through phishing kit detection
Off-the-shelf, easy-to-deploy phishing kits are believed to lower the threshold for criminal
entrepreneurs going phishing. That is, the practice of harvesting user credentials by tricking …
entrepreneurs going phishing. That is, the practice of harvesting user credentials by tricking …
Chatspamdetector: Leveraging large language models for effective phishing email detection
The proliferation of phishing sites and emails poses significant challenges to existing
cybersecurity efforts. Despite advances in spam filters and email security protocols …
cybersecurity efforts. Despite advances in spam filters and email security protocols …
[PDF][PDF] Heads in the Clouds? Measuring Universities' Migration to Public Clouds: Implications for Privacy & Academic Freedom
With the emergence of remote education and work in universities due to COVID-19, the
'zoomification'of higher education, ie, the migration of universities to the clouds, reached the …
'zoomification'of higher education, ie, the migration of universities to the clouds, reached the …
Leveraging synthetic data and pu learning for phishing email detection
Imbalanced data classification has always been one of the most challenging problems in
data science especially in the cybersecurity field, where we observe an out-of-balance …
data science especially in the cybersecurity field, where we observe an out-of-balance …
Lazy gatekeepers: a large-scale study on SPF configuration in the wild
S Czybik, M Horlboge, K Rieck - Proceedings of the 2023 ACM on …, 2023 - dl.acm.org
The Sender Policy Framework (SPF) is a basic mechanism for authorizing the use of
domains in email. In combination with other mechanisms, it serves as a cornerstone for …
domains in email. In combination with other mechanisms, it serves as a cornerstone for …
[PDF][PDF] Cybercrime: a social ecology
B Collier, A Hutchings - The oxford handbook of criminology, 2023 - cl.cam.ac.uk
From its roots as niche technically-driven crimes and online subcultures, cybercrime and
online harm now dominate public debates. This chapter examines cybercrime from a …
online harm now dominate public debates. This chapter examines cybercrime from a …