Abstract is missing.
- Phish-Net: Investigating phish clusters using drop email addressesShams Zawoad, Amit Kumar Dutta, Alan P. Sprague, Ragib Hasan, Jason Britt, Gary Warner. 1-13 [doi]
- 10v3.c0nsAunshul Rege. 1-9 [doi]
- Favicon - a clue to phishing sites detectionGuang-Gang Geng, Xiao-Dong Lee, Wei Wang 0083, Shian-Shyong Tseng. 1-10 [doi]
- Folex: An analysis of an herbal and counterfeit luxury goods affiliate programMohammad Karami, Shiva Ghaemi, Damon McCoy. 1-9 [doi]
- A notation for describing the steps in indicator expansionJonathan M. Spring. 1-6 [doi]
- An inquiry into money laundering tools in the Bitcoin ecosystemMalte Möser, Rainer Böhme, Dominic Breuker. 1-14 [doi]
- $1.00 per RT #BostonMarathon #PrayForBoston: Analyzing fake content on TwitterAditi Gupta 0003, Hemank Lamba, Ponnurangam Kumaraguru. 1-12 [doi]
- Modeling malicious domain name take-down dynamics: Why eCrime paysJonathan M. Spring. 1-9 [doi]
- Monitoring a fast flux botnet using recursive and passive DNS: A case studyDhia Mahjoub. 1-9 [doi]
- Honor among thieves: A common's analysis of cybercrime economiesSadia Afroz, Vaibhav Garg, Damon McCoy, Rachel Greenstadt. 1-11 [doi]
- An exploration of the factors affecting the advertised price for stolen dataThomas J. Holt, Yi Ting Chua 0001, Olga Smirnova. 1-10 [doi]
- Voice of the customerBrad Wardman, Lisa Kelly, Michael Weideman. 1-7 [doi]
- Password advice shouldn't be boring: Visualizing password guessing attacksLeah Zhang-Kennedy, Sonia Chiasson, Robert Biddle. 1-11 [doi]
- Empirical analysis of factors affecting malware URL detectionMarie Vasek, Tyler Moore 0001. 1-8 [doi]