Systematically understanding the cyber attack business: A survey

K Huang, M Siegel, S Madnick - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
Cyber attacks are increasingly menacing businesses. Based on the literature review and
publicly available reports, this article conducts an extensive and consistent survey of the …

A survey of Twitter research: Data model, graph structure, sentiment analysis and attacks

D Antonakaki, P Fragopoulou, S Ioannidis - Expert systems with …, 2021 - Elsevier
Twitter is the third most popular worldwide Online Social Network (OSN) after Facebook and
Instagram. Compared to other OSNs, it has a simple data model and a straightforward data …

Cutting the gordian knot: A look under the hood of ransomware attacks

A Kharraz, W Robertson, D Balzarotti, L Bilge… - Detection of Intrusions …, 2015 - Springer
In this paper, we present the results of a long-term study of ransomware attacks that have
been observed in the wild between 2006 and 2014. We also provide a holistic view on how …

Tracking ransomware end-to-end

DY Huang, MM Aliapoulios, VG Li… - … IEEE Symposium on …, 2018 - ieeexplore.ieee.org
Ransomware is a type of malware that encrypts the files of infected hosts and demands
payment, often in a crypto-currency like Bitcoin. In this paper, we create a measurement …

On the feasibility of online malware detection with performance counters

J Demme, M Maycock, J Schmitz, A Tang… - ACM SIGARCH …, 2013 - dl.acm.org
The proliferation of computers in any domain is followed by the proliferation of malware in
that domain. Systems, including the latest mobile platforms, are laden with viruses, rootkits …

Measuring the cost of cybercrime

R Anderson, C Barton, R Böhme, R Clayton… - The economics of …, 2013 - Springer
This chapter documents what we believe to be the first systematic study of the costs of
cybercrime. The initial workshop paper was prepared in response to a request from the UK …

Suspended accounts in retrospect: an analysis of twitter spam

K Thomas, C Grier, D Song, V Paxson - Proceedings of the 2011 ACM …, 2011 - dl.acm.org
In this study, we examine the abuse of online social networks at the hands of spammers
through the lens of the tools, techniques, and support infrastructure they rely upon. To …

{Trafficking} Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse

K Thomas, D McCoy, C Grier, A Kolcz… - 22nd USENIX Security …, 2013 - usenix.org
As web services such as Twitter, Facebook, Google, and Yahoo now dominate the daily
activities of Internet users, cyber criminals have adapted their monetization strategies to …

Measuring the changing cost of cybercrime

R Anderson, C Barton, R Böhme… - The 18th Annual …, 2019 - research.ed.ac.uk
In 2012 we presented the first systematic study of the costs of cybercrime. In this paper, we
report what has changed in the seven years since. The period has seen major platform …

[PDF][PDF] Double and nothing: Understanding and detecting cryptocurrency giveaway scams

X Li, A Yepuri, N Nikiforakis - … of the Network and Distributed System …, 2023 - par.nsf.gov
As cryptocurrencies increase in popularity and users obtain and manage their own assets,
attackers are pivoting from just abusing cryptocurrencies as a payment mechanism, to …