A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

[PDF][PDF] A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security

M Safaei Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - par.nsf.gov
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …

Efficient clustering of emails into spam and ham: The foundational study of a comprehensive unsupervised framework

A Karim, S Azam, B Shanmugam… - IEEE Access, 2020 - ieeexplore.ieee.org
The spread and adoption of spam emails in malicious activities like information and identity
theft, malware propagation, monetary and reputational damage etc. are on the rise with …

[HTML][HTML] Classifying spam emails using agglomerative hierarchical clustering and a topic-based approach

F Jáñez-Martino, R Alaiz-Rodríguez… - Applied Soft …, 2023 - Elsevier
Spam emails are unsolicited, annoying and sometimes harmful messages which may
contain malware, phishing or hoaxes. Unlike most studies that address the design of efficient …

Phishing email strategies: understanding cybercriminals' strategies of crafting phishing emails

T Stojnic, D Vatsalan, NAG Arachchilage - Security and privacy, 2021 - Wiley Online Library
It is a known fact that cybercriminals often manipulate people to steal sensitive information.
However, there has been a lack of research in investigating cybercriminals' strategies and …

“Senator, We Sell Ads”: Analysis of the 2016 Russian Facebook Ads Campaign

R Dutt, A Deb, E Ferrara - Advances in Data Science: Third International …, 2019 - Springer
One of the key aspects of the United States democracy is free and fair elections that allow for
a peaceful transfer of power from one President to the next. The 2016 US presidential …

A comprehensive study of email spam botnet detection

WZ Khan, MK Khan, FTB Muhaya… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
The problem of email spam has grown significantly over the past few years. It is not just a
nuisance for users but also it is damaging for those who fall for scams and other attacks. This …

Botcamp: Bot-driven interactions in social campaigns

N Abu-El-Rub, A Mueen - The world wide web conference, 2019 - dl.acm.org
Bots (ie automated accounts) involve in social campaigns typically for two obvious reasons:
to inorganically sway public opinion and to build social capital exploiting the organic …

Threat intelligence generation using network telescope data for industrial control systems

O Cabana, AM Youssef, M Debbabi… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Industrial Control Systems (ICSs) are cyber-physical systems that offer attractive targets to
threat actors due to the scale of damages, both physical and cyber, that successful …

[HTML][HTML] DFRWS EU 10-year review and future directions in Digital Forensic Research

F Breitinger, JN Hilgert, C Hargreaves… - Forensic Science …, 2024 - Elsevier
Conducting a systematic literature review and comprehensive analysis, this paper surveys
all 135 peer-reviewed articles published at the Digital Forensics Research Conference …