Data-driven cybersecurity incident prediction: A survey

N Sun, J Zhang, P Rimba, S Gao… - … surveys & tutorials, 2018 - ieeexplore.ieee.org
Driven by the increasing scale and high profile cybersecurity incidents related public data,
recent years we have witnessed a paradigm shift in understanding and defending against …

A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks

R Heartfield, G Loukas - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
Social engineering is used as an umbrella term for a broad spectrum of computer
exploitations that employ a variety of attack vectors and strategies to psychologically …

Measuring the longitudinal evolution of the online anonymous marketplace ecosystem

K Soska, N Christin - 24th USENIX security symposium (USENIX security …, 2015 - usenix.org
February 2011 saw the emergence of Silk Road, the first successful online anonymous
marketplace, in which buyers and sellers could transact with anonymity properties far …

Knowing your enemy: understanding and detecting malicious web advertising

Z Li, K Zhang, Y Xie, F Yu, XF Wang - … of the 2012 ACM conference on …, 2012 - dl.acm.org
With the Internet becoming the dominant channel for marketing and promotion, online
advertisements are also increasingly used for illegal purposes such as propagating …

Security analytics: Big data analytics for cybersecurity: A review of trends, techniques and tools

T Mahmood, U Afzal - 2013 2nd national conference on …, 2013 - ieeexplore.ieee.org
The rapid growth of the Internet has brought with it an exponential increase in the type and
frequency of cyber attacks. Many well-known cybersecurity solutions are in place to …

Automatically detecting vulnerable websites before they turn malicious

K Soska, N Christin - … USENIX Security Symposium (USENIX Security 14 …, 2014 - usenix.org
Significant recent research advances have made it possible to design systems that can
automatically determine with high accuracy the maliciousness of a target website. While …

Effect of infodemic regarding the illegal sale of medications on the internet: evaluation of demand and online availability of ivermectin during the COVID-19 pandemic

A Fittler, L Adeniye, Z Katz, R Bella - International Journal of …, 2021 - mdpi.com
The COVID-19 pandemic and the related infodemic generated confusion and increased
demand of various pharmaceuticals, ushering in the opportunity for illicit online vendors to …

[PDF][PDF] Nazca: Detecting Malware Distribution in Large-Scale Networks.

L Invernizzi, S Miskovic, R Torres, C Kruegel, S Saha… - NDSS, 2014 - cs.umd.edu
Malware remains one of the most significant security threats on the Internet. Antivirus
solutions and blacklists, the main weapons of defense against these attacks, have only been …

[PDF][PDF] Framing dependencies introduced by underground commoditization

K Huang, DWEBC GrierD, TJ Holt, C Kruegel… - Workshop on the …, 2015 - imchris.org
Internet crime has become increasingly dependent on the underground economy: a loose
federation of specialists selling capabilities, services, and resources explicitly tailored to the …

Toward engineering a secure android ecosystem: A survey of existing techniques

M Xu, C Song, Y Ji, MW Shih, K Lu, C Zheng… - ACM Computing …, 2016 - dl.acm.org
The openness and extensibility of Android have made it a popular platform for mobile
devices and a strong candidate to drive the Internet-of-Things. Unfortunately, these …