Abstract is missing.
- Beyond the lock icon: real-time detection of phishing websites using public key certificatesZheng Dong, Apu Kapadia, Jim Blythe, L. Jean Camp. 1-12 [doi]
- Chasing shuabang in apps storesSergio de los Santos, Antonio Guzman, Chema Alonso, Francisco Gómez-Rodríguez. 13-21 [doi]
- Global adversarial capability modelingJonathan Spring, Sarah Kern, Alec Summers. 22-42 [doi]
- Analysis of content copyright infringement in mobile application marketsRyan Johnson 0002, Nikolaos Kiourtis, Angelos Stavrou, Vincent Sritapan. 43-52 [doi]
- Spammer success through customization and randomization of URLsGary Warner, Dhiraj Rajani, Mike Nagy. 53-58 [doi]
- Spare the rod, spoil the network security? Economic analysis of sanctions onlineVaibhav Garg, L. Jean Camp. 59-68 [doi]
- Which malware lures work best? Measurements from a large instant messaging wormTyler Moore, Richard Clayton. 69-78 [doi]