The art of cybercrime community research

J Hughes, S Pastrana, A Hutchings, S Afroz… - ACM Computing …, 2024 - dl.acm.org
In the last decade, cybercrime has risen considerably. One key factor is the proliferation of
online cybercrime communities, where actors trade products and services, and also learn …

A comprehensive framework for cyber behavioral analysis based on a systematic review of cyber profiling literature

M Martineau, E Spiridon, M Aiken - Forensic Sciences, 2023 - mdpi.com
Cybercrime presents a significant threat to global society. With the number of cybercrimes
increasing year after year and the financial losses escalating, law enforcement must …

Developing a modified total interpretive structural model (M-TISM) for organizational strategic cybersecurity management

R Rajan, NP Rana, N Parameswar, S Dhir… - … Forecasting and Social …, 2021 - Elsevier
Cybersecurity is a serious issue that many organizations face these days. Therefore,
cybersecurity management is very important for any organization. Organizations should …

A text-mining based cyber-risk assessment and mitigation framework for critical analysis of online hacker forums

B Biswas, A Mukhopadhyay, S Bhattacharjee… - Decision Support …, 2022 - Elsevier
Online hacker communities are meeting spots for aspiring and seasoned cybercriminals
where they engage in technical discussions, share exploits and relevant hacking tools to be …

A hybrid framework using explainable AI (XAI) in cyber-risk management for defence and recovery against phishing attacks

B Biswas, A Mukhopadhyay, A Kumar… - Decision Support Systems, 2024 - Elsevier
Phishing and social engineering contribute to various cyber incidents such as data breaches
and ransomware attacks, financial frauds, and denial of service attacks. Often, phishers …

Characterizing eve: Analysing cybercrime actors in a large underground forum

S Pastrana, A Hutchings, A Caines… - Research in Attacks …, 2018 - Springer
Underground forums contain many thousands of active users, but the vast majority will be
involved, at most, in minor levels of deviance. The number who engage in serious criminal …

Identifying and profiling key sellers in cyber carding community: AZSecure text mining system

W Li, H Chen, JF Nunamaker Jr - Journal of Management …, 2016 - Taylor & Francis
The past few years have witnessed millions of credit/debit cards flowing through the
underground economy and ultimately causing significant financial loss. Examining key …

[HTML][HTML] Cybersecurity framework for connected and automated vehicles: A modelling perspective

SK Khan, N Shiwakoti, P Stasinopoulos, Y Chen… - Transport Policy, 2025 - Elsevier
Abstract Connected and Automated Vehicles (CAVs) cybersecurity is an inherently complex,
multi-dimensional issue that goes beyond isolated hardware or software vulnerabilities …

Predicting new hackers' criminal careers: A group-based trajectory approach

CJ Hoffman, CJ Howell, RC Perkins, D Maimon… - Computers & …, 2024 - Elsevier
The current study employs group-based trajectory modeling to assess the longitudinal attack
patterns of new hackers involved in website defacement. Specifically, we track the activity of …

HackerRank: Identifying key hackers in underground forums

C Huang, Y Guo, W Guo, Y Li - International Journal of …, 2021 - journals.sagepub.com
With the rapid development of the Internet, cybersecurity situation is becoming more and
more complex. At present, surface web and dark web contain numerous underground …