Systematically understanding the cyber attack business: A survey
Cyber attacks are increasingly menacing businesses. Based on the literature review and
publicly available reports, this article conducts an extensive and consistent survey of the …
publicly available reports, this article conducts an extensive and consistent survey of the …
A survey of Twitter research: Data model, graph structure, sentiment analysis and attacks
Twitter is the third most popular worldwide Online Social Network (OSN) after Facebook and
Instagram. Compared to other OSNs, it has a simple data model and a straightforward data …
Instagram. Compared to other OSNs, it has a simple data model and a straightforward data …
Cutting the gordian knot: A look under the hood of ransomware attacks
In this paper, we present the results of a long-term study of ransomware attacks that have
been observed in the wild between 2006 and 2014. We also provide a holistic view on how …
been observed in the wild between 2006 and 2014. We also provide a holistic view on how …
Tracking ransomware end-to-end
Ransomware is a type of malware that encrypts the files of infected hosts and demands
payment, often in a crypto-currency like Bitcoin. In this paper, we create a measurement …
payment, often in a crypto-currency like Bitcoin. In this paper, we create a measurement …
On the feasibility of online malware detection with performance counters
The proliferation of computers in any domain is followed by the proliferation of malware in
that domain. Systems, including the latest mobile platforms, are laden with viruses, rootkits …
that domain. Systems, including the latest mobile platforms, are laden with viruses, rootkits …
Measuring the cost of cybercrime
This chapter documents what we believe to be the first systematic study of the costs of
cybercrime. The initial workshop paper was prepared in response to a request from the UK …
cybercrime. The initial workshop paper was prepared in response to a request from the UK …
Suspended accounts in retrospect: an analysis of twitter spam
In this study, we examine the abuse of online social networks at the hands of spammers
through the lens of the tools, techniques, and support infrastructure they rely upon. To …
through the lens of the tools, techniques, and support infrastructure they rely upon. To …
{Trafficking} Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse
As web services such as Twitter, Facebook, Google, and Yahoo now dominate the daily
activities of Internet users, cyber criminals have adapted their monetization strategies to …
activities of Internet users, cyber criminals have adapted their monetization strategies to …
Measuring the changing cost of cybercrime
R Anderson, C Barton, R Böhme… - The 18th Annual …, 2019 - research.ed.ac.uk
In 2012 we presented the first systematic study of the costs of cybercrime. In this paper, we
report what has changed in the seven years since. The period has seen major platform …
report what has changed in the seven years since. The period has seen major platform …
[PDF][PDF] Double and nothing: Understanding and detecting cryptocurrency giveaway scams
X Li, A Yepuri, N Nikiforakis - … of the Network and Distributed System …, 2023 - par.nsf.gov
As cryptocurrencies increase in popularity and users obtain and manage their own assets,
attackers are pivoting from just abusing cryptocurrencies as a payment mechanism, to …
attackers are pivoting from just abusing cryptocurrencies as a payment mechanism, to …