Abstract is missing.
- Fighting the "blackheart airports": internal policing in the Chinese censorship circumvention ecosystemYi Ting Chua, Ben Collier. 1-9 [doi]
- Honware: A Virtual Honeypot Framework for Capturing CPE and IoT Zero DaysAlexander Vetterl, Richard Clayton. 1-13 [doi]
- Assessing the Threat of Blockchain-based BotnetsLeon Böck, Nikolaos Alexopoulos, Emine Saracoglu, Max Mühlhäuser, Emmanouil Vasilomanolakis. 1-11 [doi]
- Below the Radar: Spotting DNS Tunnels in Newly Observed Hostnames in the WildDennis Tatang, Florian Quinkert, Thorsten Holz. 1-15 [doi]
- From playing games to committing crimes: A multi-technique approach to predicting key actors on an online gaming forumJack Hughes, Ben Collier, Alice Hutchings. 1-12 [doi]
- Mapping the Underground: Supervised Discovery of Cybercrime Supply ChainsRasika Bhalerao, Maxwell Aliapoulios, Ilia Shumailov, Sadia Afroz, Damon McCoy. 1-16 [doi]
- Whitelists that Work: Creating Defensible Dynamic Whitelists with Statistical LearningRenée Burton, Laura Rocha. 1-10 [doi]
- Dine and Dash: Static, Dynamic, and Economic Analysis of In-Browser CryptojackingMuhammad Saad, Aminollah Khormali, Aziz Mohaisen. 1-12 [doi]
- Control and Understanding in Malware and Legitimate SoftwareEric Spero, Milica Stojmenovic, Sonia Chiasson, Robert Biddle. 1-11 [doi]
- Report Now. Report Effectively. Conceptualizing the Industry Practice for Cybercrime ReportingMorvareed Bidgoli, Bart P. Knijnenburg, Jens Grossklags, Brad Wardman. 1-10 [doi]
- Identifying Unintended Harms of Cybersecurity CountermeasuresYi Ting Chua, Simon Parkin, Matthew Edwards, Daniela Oliveira, Stefan Schiffner, Gareth Tyson, Alice Hutchings. 1-15 [doi]
- A meta-analysis of field experiments on phishing susceptibilityTeodor Sommestad, Henrik Karlzén. 1-14 [doi]