{PhishTime}: Continuous longitudinal measurement of the effectiveness of anti-phishing blacklists

A Oest, Y Safaei, P Zhang, B Wardman… - 29th USENIX Security …, 2020 - usenix.org
Due to their ubiquity in modern web browsers, anti-phishing blacklists are a key defense
against large-scale phishing attacks. However, sophistication in phishing websites—such as …

Cyber-organised crime. A case of moral panic?

A Lavorgna - Trends in Organized Crime, 2019 - Springer
A growing number of studies show that the advent of the Internet has transformed the
organisational life of crime, with many academic and non-academic articles and reports …

Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis

A Oest, Y Safei, A Doupé, GJ Ahn… - … on Electronic Crime …, 2018 - ieeexplore.ieee.org
Phishing attacks are becoming increasingly prevalent: 2016 saw more phishing attacks than
any previous year on record according to the Anti-Phishing Working Group. At the same …

Phishfarm: A scalable framework for measuring the effectiveness of evasion techniques against browser phishing blacklists

A Oest, Y Safaei, A Doupé, GJ Ahn… - … IEEE Symposium on …, 2019 - ieeexplore.ieee.org
Phishing attacks have reached record volumes in recent years. Simultaneously, modern
phishing websites are growing in sophistication by employing diverse cloaking techniques …

Organised cybercrime or cybercrime that is organised? An assessment of the conceptualisation of financial cybercrime as organised crime

ER Leukfeldt, A Lavorgna, ER Kleemans - European Journal on Criminal …, 2017 - Springer
Criminological research over the last couple of decades has improved our understanding of
cybercrimes. However, this body of research is regarded as still theoretically thin and not …

Cognitive triaging of phishing attacks

A Van Der Heijden, L Allodi - 28th USENIX Security Symposium …, 2019 - usenix.org
In this paper we employ quantitative measurements of cognitive vulnerability triggers in
phishing emails to predict the degree of success of an attack. To achieve this we rely on the …

[图书][B] A novel anti-phishing framework based on honeypots

S Li, R Schmitz - 2009 - ieeexplore.ieee.org
As a powerful anti-phishing tool, honeypots have been widely used by security service
providers and financial institutes to collect phishing mails, so that new phishing sites can be …

A survey of cyber crime in India

VK Gunjan, A Kumar… - 2013 15th international …, 2013 - ieeexplore.ieee.org
Cybercrime is all about the crimes in which communication channel and communication
device has been used directly or indirectly as a medium whether it is a Laptop, Desktop …

Exploring the Shift from Physical to Cybercrime at the Onset of the COVID-19 Pandemic

M Plachkinova - International Journal of Cyber Forensics and …, 2021 - conceptechint.net
The novel coronavirus has made an impact on virtually every aspect of our lives. The current
study utilizes secondary data to identify patterns and trends related to shifting crime from the …

HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle

M Akiyama, T Yagi, T Hariu, Y Kadobayashi - International Journal of …, 2018 - Springer
A web user who falsely accesses a compromised website is usually redirected to an
adversary's website and is forced to download malware after being exploited. Additionally …