Search dblp for Publications

export results for "toc:db/conf/ecrime/ecrime2013.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ecrime/AfrozGMG13,
  author       = {Sadia Afroz and
                  Vaibhav Garg and
                  Damon McCoy and
                  Rachel Greenstadt},
  title        = {Honor among thieves: {A} common's analysis of cybercrime economies},
  booktitle    = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco,
                  CA, USA, September 17-18, 2013},
  pages        = {1--11},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/eCRS.2013.6805778},
  doi          = {10.1109/ECRS.2013.6805778},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/AfrozGMG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/GengLWT13,
  author       = {Guang{-}Gang Geng and
                  Xiao{-}Dong Lee and
                  Wei Wang and
                  Shian{-}Shyong Tseng},
  title        = {Favicon - a clue to phishing sites detection},
  booktitle    = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco,
                  CA, USA, September 17-18, 2013},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/eCRS.2013.6805775},
  doi          = {10.1109/ECRS.2013.6805775},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/GengLWT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/GuptaLK13,
  author       = {Aditi Gupta and
                  Hemank Lamba and
                  Ponnurangam Kumaraguru},
  title        = {{\textdollar}1.00 per {RT} {\#}BostonMarathon {\#}PrayForBoston: Analyzing
                  fake content on Twitter},
  booktitle    = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco,
                  CA, USA, September 17-18, 2013},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/eCRS.2013.6805772},
  doi          = {10.1109/ECRS.2013.6805772},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/GuptaLK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/HoltCS13,
  author       = {Thomas J. Holt and
                  Yi Ting Chua and
                  Olga Smirnova},
  title        = {An exploration of the factors affecting the advertised price for stolen
                  data},
  booktitle    = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco,
                  CA, USA, September 17-18, 2013},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/eCRS.2013.6805781},
  doi          = {10.1109/ECRS.2013.6805781},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/HoltCS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/KaramiGM13,
  author       = {Mohammad Karami and
                  Shiva Ghaemi and
                  Damon McCoy},
  title        = {Folex: An analysis of an herbal and counterfeit luxury goods affiliate
                  program},
  booktitle    = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco,
                  CA, USA, September 17-18, 2013},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/eCRS.2013.6805782},
  doi          = {10.1109/ECRS.2013.6805782},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/KaramiGM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/Mahjoub13,
  author       = {Dhia Mahjoub},
  title        = {Monitoring a fast flux botnet using recursive and passive {DNS:} {A}
                  case study},
  booktitle    = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco,
                  CA, USA, September 17-18, 2013},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/eCRS.2013.6805783},
  doi          = {10.1109/ECRS.2013.6805783},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/Mahjoub13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/MoserBB13,
  author       = {Malte M{\"{o}}ser and
                  Rainer B{\"{o}}hme and
                  Dominic Breuker},
  title        = {An inquiry into money laundering tools in the Bitcoin ecosystem},
  booktitle    = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco,
                  CA, USA, September 17-18, 2013},
  pages        = {1--14},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/eCRS.2013.6805780},
  doi          = {10.1109/ECRS.2013.6805780},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/MoserBB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/Rege13,
  author       = {Aunshul Rege},
  title        = {10v3.c0ns},
  booktitle    = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco,
                  CA, USA, September 17-18, 2013},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/eCRS.2013.6805773},
  doi          = {10.1109/ECRS.2013.6805773},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/Rege13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/Spring13,
  author       = {Jonathan M. Spring},
  title        = {A notation for describing the steps in indicator expansion},
  booktitle    = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco,
                  CA, USA, September 17-18, 2013},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/eCRS.2013.6805774},
  doi          = {10.1109/ECRS.2013.6805774},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/Spring13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/Spring13a,
  author       = {Jonathan M. Spring},
  title        = {Modeling malicious domain name take-down dynamics: Why eCrime pays},
  booktitle    = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco,
                  CA, USA, September 17-18, 2013},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/eCRS.2013.6805779},
  doi          = {10.1109/ECRS.2013.6805779},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/Spring13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/VasekM13,
  author       = {Marie Vasek and
                  Tyler Moore},
  title        = {Empirical analysis of factors affecting malware {URL} detection},
  booktitle    = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco,
                  CA, USA, September 17-18, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/eCRS.2013.6805776},
  doi          = {10.1109/ECRS.2013.6805776},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/VasekM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/WardmanKW13,
  author       = {Brad Wardman and
                  Lisa Kelly and
                  Michael Weideman},
  title        = {Voice of the customer},
  booktitle    = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco,
                  CA, USA, September 17-18, 2013},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/eCRS.2013.6805771},
  doi          = {10.1109/ECRS.2013.6805771},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/WardmanKW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/ZawoadDSHBW13,
  author       = {Shams Zawoad and
                  Amit Kumar Dutta and
                  Alan P. Sprague and
                  Ragib Hasan and
                  Jason Britt and
                  Gary Warner},
  title        = {Phish-Net: Investigating phish clusters using drop email addresses},
  booktitle    = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco,
                  CA, USA, September 17-18, 2013},
  pages        = {1--13},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/eCRS.2013.6805777},
  doi          = {10.1109/ECRS.2013.6805777},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/ZawoadDSHBW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/Zhang-KennedyCB13,
  author       = {Leah Zhang{-}Kennedy and
                  Sonia Chiasson and
                  Robert Biddle},
  title        = {Password advice shouldn't be boring: Visualizing password guessing
                  attacks},
  booktitle    = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco,
                  CA, USA, September 17-18, 2013},
  pages        = {1--11},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/eCRS.2013.6805770},
  doi          = {10.1109/ECRS.2013.6805770},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/Zhang-KennedyCB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ecrime/2013,
  title        = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco,
                  CA, USA, September 17-18, 2013},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6802823},
  isbn         = {978-1-4799-1158-5},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}