A comprehensive survey of recent internet measurement techniques for cyber security
MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …
vulnerable to its security flaws. Despite substantial efforts to address many of these …
Unsolved problems in ml safety
Machine learning (ML) systems are rapidly increasing in size, are acquiring new
capabilities, and are increasingly deployed in high-stakes settings. As with other powerful …
capabilities, and are increasingly deployed in high-stakes settings. As with other powerful …
Cognition in social engineering empirical research: a systematic literature review
The interdisciplinarity of the Social Engineering (SE) domain creates crucial challenges for
the development and advancement of empirical SE research, making it particularly difficult to …
the development and advancement of empirical SE research, making it particularly difficult to …
[PDF][PDF] Sunrise to sunset: Analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale
Despite an extensive anti-phishing ecosystem, phishing attacks continue to capitalize on
gaps in detection to reach a significant volume of daily victims. In this paper, we isolate and …
gaps in detection to reach a significant volume of daily victims. In this paper, we isolate and …
{PhishTime}: Continuous longitudinal measurement of the effectiveness of anti-phishing blacklists
Due to their ubiquity in modern web browsers, anti-phishing blacklists are a key defense
against large-scale phishing attacks. However, sophistication in phishing websites—such as …
against large-scale phishing attacks. However, sophistication in phishing websites—such as …
Crawlphish: Large-scale analysis of client-side cloaking techniques in phishing
Phishing is a critical threat to Internet users. Although an extensive ecosystem serves to
protect users, phishing websites are growing in sophistication, and they can slip past the …
protect users, phishing websites are growing in sophistication, and they can slip past the …
Personalized persuasion: Quantifying susceptibility to information exploitation in spear-phishing attacks
Many cyberattacks begin with a malicious email message, known as spear phishing,
targeted at unsuspecting victims. Although security technologies have improved significantly …
targeted at unsuspecting victims. Although security technologies have improved significantly …
F-fade: Frequency factorization for anomaly detection in edge streams
Edge streams are commonly used to capture interactions in dynamic networks, such as
email, social, or computer networks. The problem of detecting anomalies or rare events in …
email, social, or computer networks. The problem of detecting anomalies or rare events in …
Scam pandemic: How attackers exploit public fear through phishing
As the COVID-19 pandemic started triggering widespread lockdowns across the globe,
cybercriminals did not hesitate to take advantage of users' increased usage of the Internet …
cybercriminals did not hesitate to take advantage of users' increased usage of the Internet …
The need for new antiphishing measures against spear-phishing attacks
L Allodi, T Chotza, E Panina… - IEEE Security & …, 2019 - ieeexplore.ieee.org
In this study, we provide extensive analysis of the (unique) characteristics of phishing and
spear-phishing attacks, argue that spear-phishing attacks cannot be well captured by current …
spear-phishing attacks, argue that spear-phishing attacks cannot be well captured by current …