Abstract is missing.
- Ransomware Economics: A Two-Step Approach To Model Ransom PaidTom Meurs, Edward J. Cartwright, Anna Cartwright 0001, Marianne Junger, Raphael Hoheisel, Erik Tews, Abhishta Abhishta. 1-13 [doi]
- Hacker's Paradise: Analysing Music in a Cybercrime ForumAnna Talas, Alice Hutchings. 1-14 [doi]
- Pump, Dump, and then What? The Long-Term Impact of Cryptocurrency Pump-and-Dump SchemesJosh Clough, Matthew Edwards 0001. 1-17 [doi]
- Achieving High-Fidelity Explanations for Risk Exposition Assessment in the Cybersecurity DomainAlbert Calvo, Santiago Escuder, Josep Escrig, Xavier Marrugat-Plaza, Nil Ortiz, Jordi Guijarro. 1-10 [doi]
- In the Market for a Botnet? An In-Depth Analysis of Botnet-Related Listings on Darkweb MarketplacesDimitrios Georgoulias, Jens Myrup Pedersen, Alice Hutchings, Morten Falch, Emmanouil Vasilomanolakis. 1-14 [doi]
- Building a Resilient Domain Whitelist to Enhance Phishing Blacklist AccuracyJan Bayer, Sourena Maroofi, Olivier Hureau, Andrzej Duda, Maciej Korczynski. 1-14 [doi]
- The Slippery Slope: Exploring the Parallels Between Game Cheating and Cybercrime Through Routine Activity TheorySelina Cho, Jonathan Lusthaus, Ivan Flechais. 1-13 [doi]
- Increasing the Efficiency of Cryptoasset Investigations by Connecting the CasesBernhard Haslhofer, Christiane Hanslbauer, Michael Fröwis, Thomas Goger. 1-10 [doi]
- Autism Disclosures and Cybercrime Discourse on a Large Underground ForumJessica Man, Gilberto Atondo Siu, Alice Hutchings. 1-14 [doi]
- A Kubernetes Underlay for OpenTDIP Forensic Computing BackendPouria Zahraei, Serguei A. Mokhov, Joey Paquet, Peyman Derafshkavian. 1-10 [doi]
- "Do Users Fall for Real Adversarial Phishing?" Investigating the Human Response to Evasive WebpagesAjka Draganovic, Savino Dambra, Javier Aldana-Iuit, Kevin Alejandro Roundy, Giovanni Apruzzese. 1-14 [doi]