Search Results - "2023 APWG Symposium on Electronic Crime Research (eCrime)"

  • Showing 1 - 11 results of 11
Refine Results
  1. 1

    Ransomware Economics: A Two-Step Approach To Model Ransom Paid by Meurs, Tom, Cartwright, Edward, Cartwright, Anna, Junger, Marianne, Hoheisel, Raphael, Tews, Erik, Abhishta, Abhishta

    “…Ransomware poses a significant and pressing challenge in today's society. Mitigation efforts aim to reduce the profitability of ransomware attacks…”
    Get full text
    Conference Proceeding
  2. 2

    Pump, Dump, and then What? The Long-Term Impact of Cryptocurrency Pump-and-Dump Schemes by Clough, Josh, Edwards, Matthew

    “…The pump and dump scheme is a form of market manipulation attack in which coordinated actors drive up the price of an asset in order to sell at a higher price…”
    Get full text
    Conference Proceeding
  3. 3

    Increasing the Efficiency of Cryptoasset Investigations by Connecting the Cases by Haslhofer, Bernhard, Hanslbauer, Christiane, Frowis, Michael, Goger, Thomas

    “…Law enforcement agencies are confronted with a rapidly growing number of cryptoasset-related cases, often redundantly investigating the same cases without…”
    Get full text
    Conference Proceeding
  4. 4

    Hacker's Paradise: Analysing Music in a Cybercrime Forum by Talas, Anna, Hutchings, Alice

    “…Underground cybercrime forums have numerous discussion boards where users interact with each other. The majority of the topics revolve around technology, but a…”
    Get full text
    Conference Proceeding
  5. 5

    Autism Disclosures and Cybercrime Discourse on a Large Underground Forum by Man, Jessica, Siu, Gilberto Atondo, Hutchings, Alice

    “…Prior research on the relationship between autism and cybercrime has been inconclusive. While some research suggests those who had an autism diagnosis are more…”
    Get full text
    Conference Proceeding
  6. 6

    A Kubernetes Underlay for OpenTDIP Forensic Computing Backend by Zahraei, Pouria, Mokhov, Serguei, Paquet, Joey, Derafshkavian, Peyman

    “…We propose an underlay based on Kubernetes to enable the scalable fault tolerance of the General Intensional Programming System's distributed run-time…”
    Get full text
    Conference Proceeding
  7. 7

    Achieving High-Fidelity Explanations for Risk Exposition Assessment in the Cybersecurity Domain by Calvo, Albert, Escuder, Santiago, Escrig, Josep, Marrugat, Xavier, Ortiz, Nil, Guijarro, Jordi

    “…Understanding AI-driven systems has become fundamental, particularly when these systems are employed for critical decision-making, as is the case in the field…”
    Get full text
    Conference Proceeding
  8. 8

    Building a Resilient Domain Whitelist to Enhance Phishing Blacklist Accuracy by Bayer, Jan, Maroofi, Sourena, Hureau, Olivier, Duda, Andrzej, Korczynski, Maciej

    “…Phishing attacks constitute a significant threat to Internet users. One strategy for mitigating this threat involves the use of blocklists by Internet Service…”
    Get full text
    Conference Proceeding
  9. 9

    The Slippery Slope: Exploring the Parallels Between Game Cheating and Cybercrime Through Routine Activity Theory by Cho, Selina, Lusthaus, Jonathan, Flechais, Ivan

    “…Law enforcement agencies have expressed concerns about the potential connection between video game cheating and engagement in cybercriminal activities among…”
    Get full text
    Conference Proceeding
  10. 10

    In the Market for a Botnet? An In-Depth Analysis of Botnet-Related Listings on Darkweb Marketplaces by Georgoulias, Dimitrios, Pedersen, Jens Myrup, Hutchings, Alice, Falch, Morten, Vasilomanolakis, Emmanouil

    “…The Darkweb is highly popular and widely used for several types of cybercrime. Darkweb marketplaces in particular, are meeting places that provide anonymity,…”
    Get full text
    Conference Proceeding
  11. 11

    "Do Users Fall for Real Adversarial Phishing?" Investigating the Human Response to Evasive Webpages by Draganovic, Ajka, Dambra, Savino, Iuit, Javier Aldana, Roundy, Kevin, Apruzzese, Giovanni

    “…Phishing websites are everywhere, and countermeasures based on static blocklists cannot cope with such a threat. To address this problem, state-of-the-art…”
    Get full text
    Conference Proceeding