default search action
Search dblp for Publications
export results for "toc:db/conf/ecrime/ecrime2013.bht:"
@inproceedings{DBLP:conf/ecrime/AfrozGMG13, author = {Sadia Afroz and Vaibhav Garg and Damon McCoy and Rachel Greenstadt}, title = {Honor among thieves: {A} common's analysis of cybercrime economies}, booktitle = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013}, pages = {1--11}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/eCRS.2013.6805778}, doi = {10.1109/ECRS.2013.6805778}, timestamp = {Wed, 28 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/AfrozGMG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/GengLWT13, author = {Guang{-}Gang Geng and Xiao{-}Dong Lee and Wei Wang and Shian{-}Shyong Tseng}, title = {Favicon - a clue to phishing sites detection}, booktitle = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013}, pages = {1--10}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/eCRS.2013.6805775}, doi = {10.1109/ECRS.2013.6805775}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/GengLWT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/GuptaLK13, author = {Aditi Gupta and Hemank Lamba and Ponnurangam Kumaraguru}, title = {{\textdollar}1.00 per {RT} {\#}BostonMarathon {\#}PrayForBoston: Analyzing fake content on Twitter}, booktitle = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013}, pages = {1--12}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/eCRS.2013.6805772}, doi = {10.1109/ECRS.2013.6805772}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/GuptaLK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/HoltCS13, author = {Thomas J. Holt and Yi Ting Chua and Olga Smirnova}, title = {An exploration of the factors affecting the advertised price for stolen data}, booktitle = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013}, pages = {1--10}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/eCRS.2013.6805781}, doi = {10.1109/ECRS.2013.6805781}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/HoltCS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/KaramiGM13, author = {Mohammad Karami and Shiva Ghaemi and Damon McCoy}, title = {Folex: An analysis of an herbal and counterfeit luxury goods affiliate program}, booktitle = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013}, pages = {1--9}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/eCRS.2013.6805782}, doi = {10.1109/ECRS.2013.6805782}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/KaramiGM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/Mahjoub13, author = {Dhia Mahjoub}, title = {Monitoring a fast flux botnet using recursive and passive {DNS:} {A} case study}, booktitle = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013}, pages = {1--9}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/eCRS.2013.6805783}, doi = {10.1109/ECRS.2013.6805783}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/Mahjoub13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/MoserBB13, author = {Malte M{\"{o}}ser and Rainer B{\"{o}}hme and Dominic Breuker}, title = {An inquiry into money laundering tools in the Bitcoin ecosystem}, booktitle = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013}, pages = {1--14}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/eCRS.2013.6805780}, doi = {10.1109/ECRS.2013.6805780}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/MoserBB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/Rege13, author = {Aunshul Rege}, title = {10v3.c0ns}, booktitle = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013}, pages = {1--9}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/eCRS.2013.6805773}, doi = {10.1109/ECRS.2013.6805773}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/Rege13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/Spring13, author = {Jonathan M. Spring}, title = {A notation for describing the steps in indicator expansion}, booktitle = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013}, pages = {1--6}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/eCRS.2013.6805774}, doi = {10.1109/ECRS.2013.6805774}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/Spring13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/Spring13a, author = {Jonathan M. Spring}, title = {Modeling malicious domain name take-down dynamics: Why eCrime pays}, booktitle = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013}, pages = {1--9}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/eCRS.2013.6805779}, doi = {10.1109/ECRS.2013.6805779}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/Spring13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/VasekM13, author = {Marie Vasek and Tyler Moore}, title = {Empirical analysis of factors affecting malware {URL} detection}, booktitle = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/eCRS.2013.6805776}, doi = {10.1109/ECRS.2013.6805776}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/VasekM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/WardmanKW13, author = {Brad Wardman and Lisa Kelly and Michael Weideman}, title = {Voice of the customer}, booktitle = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013}, pages = {1--7}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/eCRS.2013.6805771}, doi = {10.1109/ECRS.2013.6805771}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/WardmanKW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/ZawoadDSHBW13, author = {Shams Zawoad and Amit Kumar Dutta and Alan P. Sprague and Ragib Hasan and Jason Britt and Gary Warner}, title = {Phish-Net: Investigating phish clusters using drop email addresses}, booktitle = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013}, pages = {1--13}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/eCRS.2013.6805777}, doi = {10.1109/ECRS.2013.6805777}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/ZawoadDSHBW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/Zhang-KennedyCB13, author = {Leah Zhang{-}Kennedy and Sonia Chiasson and Robert Biddle}, title = {Password advice shouldn't be boring: Visualizing password guessing attacks}, booktitle = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013}, pages = {1--11}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/eCRS.2013.6805770}, doi = {10.1109/ECRS.2013.6805770}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/Zhang-KennedyCB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ecrime/2013, title = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013}, publisher = {{IEEE}}, year = {2013}, url = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6802823}, isbn = {978-1-4799-1158-5}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.