Abstract is missing.
- Phishing With A Darknet: Imitation of Onion ServicesFrederick Barr-Smith, Joss Wright. 1-13 [doi]
- Empirical Analysis of Losses from Business-Email CompromiseGeoffrey Simpson, Tyler Moore 0001. 1-7 [doi]
- Resource Networks of Pet Scam WebsitesBenjamin Price, Matthew Edwards 0001. 1-10 [doi]
- Ten years of attacks on companies using visual impersonation of domain namesGeoffrey Simpson, Tyler Moore 0001, Richard Clayton. 1-12 [doi]
- SemanticPhish: A Semantic-based Scanning System for Early Detection of Phishing AttacksQian Cui, Guy-Vincent Jourdan, Gregor V. Bochmann, Iosif-Viorel Onut. 1-12 [doi]
- WordyThief: A Malicious SpammerRenée Burton, Vadym Tymchenko, Nicholas Sundvall, Minh Hoang, Jim Mozley, Michael Josten. 1-11 [doi]
- Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency ScamsPengcheng Xia, Haoyu Wang 0001, Xiapu Luo, Lei Wu 0012, Yajin Zhou, Guangdong Bai, Guoai Xu, Gang Huang 0001, Xuanzhe Liu. 1-14 [doi]
- Averages don't characterise the heavy tails of ransomsÉireann Leverett, Eric Jardine, Erin Burns, Ankit Gangwal, Dan Geer. 1-12 [doi]
- When will my PLC support Mirai? The security economics of large-scale attacks against Internet-connected ICS devicesMichael Dodson, Alastair R. Beresford, Daniel R. Thomas. 1-14 [doi]
- Analysis of Darknet Market Activity as a Country-Specific, Socio-Economic and Technological PhenomenonAnela Sutanrikulu, Sandra Czajkowska, Jens Grossklags. 1-10 [doi]
- Patterns of online repeat victimisation and implications for crime preventionSara Giro Correia. 1-11 [doi]
- Beneath the radar: Exploring the economics of business fraud via underground marketsCarlos Hernandez Gañán, Ugur Akyazi, Elena Tsvetkova. 1-14 [doi]
- Scam Pandemic: How Attackers Exploit Public Fear through PhishingMarzieh Bitaab, Haehyun Cho, Adam Oest, Penghui Zhang, Zhibo Sun, Rana Pourmohamad, Doowon Kim, Tiffany Bao, Ruoyu Wang 0001, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn. 1-10 [doi]