Abstract is missing.
- Ransomware: How attacker's effort, victim characteristics and context influence ransom requested, payment and financial lossTom Meurs, Marianne Junger, Erik Tews, Abhishta Abhishta. 1-13 [doi]
- The Challenges of Blockchain-Based Naming Systems for Malware DefendersAudrey Randall, Wes Hardaker, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman. 1-14 [doi]
- "I don't really give them piece of mind": User Perceptions of Social Engineering AttacksLin Kyi, Elizabeth Stobert. 1-13 [doi]
- Cryptocurrency Exchange Closure Revisited (Again)Arghya Mukherjee, Tyler Moore 0001. 1-8 [doi]
- Money Over Morals: A Business Analysis of Conti RansomwareIan W. Gray, Jack Cable, Benjamin Brown, Vlad Cuiujuclu, Damon McCoy. 1-12 [doi]
- THREAT/crawl: a Trainable, Highly-Reusable, and Extensible Automated Method and Tool to Crawl Criminal Underground ForumsMichele Campobasso, Luca Allodi. 1-13 [doi]
- The Role of Extraversion in Phishing Victimisation: A Systematic Literature ReviewPablo López-Aguilar, Constantinos Patsakis, Agusti Solanas. 1-10 [doi]
- Leaky Kits: The Increased Risk of Data Exposure from Phishing KitsBhaskar Tejaswi, Nayanamana Samarasinghe, Sajjad Pourali, Mohammad Mannan, Amr M. Youssef. 1-13 [doi]
- Building and Testing a Network of Social Trust in an Underground Forum: Robust Connections and Overlapping Criminal DomainsDalyapraz Manatova, Dewesha Sharma, Sagar Samtani, L. Jean Camp. 1-12 [doi]
- "Invest in crypto!": An analysis of investment scam advertisements found in BitcointalkGilberto Atondo Siu, Alice Hutchings, Marie Vasek, Tyler Moore 0001. 1-12 [doi]