A comprehensive survey of recent internet measurement techniques for cyber security
MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …
vulnerable to its security flaws. Despite substantial efforts to address many of these …
[PDF][PDF] A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security
M Safaei Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - par.nsf.gov
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …
more vulnerable to its security flaws. Despite substantial efforts to address many of these …
Efficient clustering of emails into spam and ham: The foundational study of a comprehensive unsupervised framework
The spread and adoption of spam emails in malicious activities like information and identity
theft, malware propagation, monetary and reputational damage etc. are on the rise with …
theft, malware propagation, monetary and reputational damage etc. are on the rise with …
[HTML][HTML] Classifying spam emails using agglomerative hierarchical clustering and a topic-based approach
F Jáñez-Martino, R Alaiz-Rodríguez… - Applied Soft …, 2023 - Elsevier
Spam emails are unsolicited, annoying and sometimes harmful messages which may
contain malware, phishing or hoaxes. Unlike most studies that address the design of efficient …
contain malware, phishing or hoaxes. Unlike most studies that address the design of efficient …
Phishing email strategies: understanding cybercriminals' strategies of crafting phishing emails
T Stojnic, D Vatsalan, NAG Arachchilage - Security and privacy, 2021 - Wiley Online Library
It is a known fact that cybercriminals often manipulate people to steal sensitive information.
However, there has been a lack of research in investigating cybercriminals' strategies and …
However, there has been a lack of research in investigating cybercriminals' strategies and …
“Senator, We Sell Ads”: Analysis of the 2016 Russian Facebook Ads Campaign
One of the key aspects of the United States democracy is free and fair elections that allow for
a peaceful transfer of power from one President to the next. The 2016 US presidential …
a peaceful transfer of power from one President to the next. The 2016 US presidential …
A comprehensive study of email spam botnet detection
The problem of email spam has grown significantly over the past few years. It is not just a
nuisance for users but also it is damaging for those who fall for scams and other attacks. This …
nuisance for users but also it is damaging for those who fall for scams and other attacks. This …
Botcamp: Bot-driven interactions in social campaigns
N Abu-El-Rub, A Mueen - The world wide web conference, 2019 - dl.acm.org
Bots (ie automated accounts) involve in social campaigns typically for two obvious reasons:
to inorganically sway public opinion and to build social capital exploiting the organic …
to inorganically sway public opinion and to build social capital exploiting the organic …
Threat intelligence generation using network telescope data for industrial control systems
O Cabana, AM Youssef, M Debbabi… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Industrial Control Systems (ICSs) are cyber-physical systems that offer attractive targets to
threat actors due to the scale of damages, both physical and cyber, that successful …
threat actors due to the scale of damages, both physical and cyber, that successful …
[HTML][HTML] DFRWS EU 10-year review and future directions in Digital Forensic Research
Conducting a systematic literature review and comprehensive analysis, this paper surveys
all 135 peer-reviewed articles published at the Digital Forensics Research Conference …
all 135 peer-reviewed articles published at the Digital Forensics Research Conference …