The art of cybercrime community research
In the last decade, cybercrime has risen considerably. One key factor is the proliferation of
online cybercrime communities, where actors trade products and services, and also learn …
online cybercrime communities, where actors trade products and services, and also learn …
The tools and tactics used in intimate partner surveillance: An analysis of online infidelity forums
Abusers increasingly use spyware apps, account compromise, and social engineering to
surveil their intimate partners, causing substantial harms that can culminate in violence. This …
surveil their intimate partners, causing substantial harms that can culminate in violence. This …
Proactively identifying emerging hacker threats from the dark web: A diachronic graph embedding framework (d-gef)
Cybersecurity experts have appraised the total global cost of malicious hacking activities to
be $450 billion annually. Cyber Threat Intelligence (CTI) has emerged as a viable approach …
be $450 billion annually. Cyber Threat Intelligence (CTI) has emerged as a viable approach …
Self-supervised euphemism detection and identification for content moderation
Fringe groups and organizations have a long history of using euphemisms—ordinary-
sounding words with a secret meaning—to conceal what they are discussing. Nowadays …
sounding words with a secret meaning—to conceal what they are discussing. Nowadays …
Reading thieves' cant: automatically identifying and understanding dark jargons from cybercrime marketplaces
Underground communication is invaluable for understanding cybercrimes. However, it is
often obfuscated by the extensive use of dark jargons, innocently-looking terms like …
often obfuscated by the extensive use of dark jargons, innocently-looking terms like …
Euphemistic phrase detection by masked language model
It is a well-known approach for fringe groups and organizations to use euphemisms--
ordinary-sounding and innocent-looking words with a secret meaning--to conceal what they …
ordinary-sounding and innocent-looking words with a secret meaning--to conceal what they …
Automatically identifying the function and intent of posts in underground forums
The automatic classification of posts from hacking-related online forums is of potential value
for the understanding of user behaviour in social networks relating to cybercrime. We …
for the understanding of user behaviour in social networks relating to cybercrime. We …
Mapping the underground: Supervised discovery of cybercrime supply chains
Understanding the sequences of processes needed to perform a cybercrime is crucial for
effective interventions. However, generating these supply chains currently requires time …
effective interventions. However, generating these supply chains currently requires time …
Casino royale: a deep exploration of illegal online gambling
The popularity of online gambling could bring negative social impact, and many countries
ban or restrict online gambling. Taking China for example, online gambling violates Chinese …
ban or restrict online gambling. Taking China for example, online gambling violates Chinese …
Measuring ewhoring
eWhoring is the term used by offenders to refer to a type of online fraud in which cybersexual
encounters are simulated for financial gain. Perpetrators use social engineering techniques …
encounters are simulated for financial gain. Perpetrators use social engineering techniques …