Abstract is missing.
- Classifying phishing URLs using recurrent neural networksAlejandro Correa Bahnsen, Eduardo Contreras Bohorquez, Sergio Villegas, Javier Vargas, Fabio A. Gonzalez. 1-8 [doi]
- Blockchain explorer: An analytical process and investigation environment for bitcoinHiroki Kuzuno, Christian Karam. 9-16 [doi]
- Characterizing key stakeholders in an online black-hat marketplaceShehroze Farooqi, Guillaume Jourjon, Muhammad Ikram, Mohamed Ali Kâafar, Emiliano De Cristofaro, Muhammad Zubair Shafiq, Arik Friedman, Fareed Zaffar. 17-27 [doi]
- Measuring cyber attribution in gamesAndrew Ruef, Eric Nunes, Paulo Shakarian, Gerardo I. Simari. 28-32 [doi]
- Configuring Zeus: A case study of online crime target selection and knowledge transmissionAlice Hutchings, Richard Clayton. 33-40 [doi]
- All your cards are belong to us: Understanding online carding forumsAndreas Haslebacher, Jeremiah Onaolapo, Gianluca Stringhini. 41-51 [doi]
- Breaking and fixing content-based filteringMayank Dhiman, Markus Jakobsson, Ting-Fang Yen. 52-56 [doi]
- "Hello. This is the IRS calling.": A case study on scams, extortion, impersonation, and phone spoofingMorvareed Bidgoli, Jens Grossklags. 57-69 [doi]
- Characterizing the impact of malware infections and remediation attempts through support forum analysisSara Amini, Chris Kanich. 70-78 [doi]
- 1000 days of UDP amplification DDoS attacksDaniel R. Thomas, Richard Clayton, Alastair R. Beresford. 79-84 [doi]