Content Type:Research | 8 December 2018Searching for safety: crime prevention in the era of GoogleAuthors:Megan S. Stubbs-Richardson, Austin K. Cosby, Karissa D. Bergene and Arthur G. Cosby
Content Type:Research | 29 November 2018Automatically identifying the function and intent of posts in underground forumsAuthors:Andrew Caines, Sergio Pastrana, Alice Hutchings and Paula J. Buttery
Content Type:Research | 26 November 2018To the moon: defining and detecting cryptocurrency pump-and-dumpsAuthors:Josh Kamps and Bennett Kleinberg
Content Type:Research | 23 November 2018Under and over the surface: a comparison of the use of leaked account credentials in the Dark and Surface WebAuthors:Dario Adriano Bermudez Villalva, Jeremiah Onaolapo, Gianluca Stringhini and Mirco Musolesi
Content Type:Theoretical Article | 19 November 2018Don’t shoot the messenger! A criminological and computer science perspective on coordinated vulnerability disclosureAuthors:Marleen Weulen Kranenbarg, Thomas J. Holt and Jeroen van der Ham
No hay comentarios:
Publicar un comentario