2013 Accepted eCrime Research Papers

 
Password advice shouldn't be boring: Visualizing password guessing attacks
  Leah Zhang-Kennedy ; Sonia Chiasson ; Robert Biddle
 
Voice of the customer
  Brad Wardman ; Lisa Kelly ; Michael Weideman
 
$1.00 per RT #BostonMarathon #PrayForBoston: Analyzing fake content on Twitter
  Aditi Gupta ; Hemank Lamba ; Ponnurangam Kumaraguru
 
10v3.c0ns
  Aunshul Rege
 
A notation for describing the steps in indicator expansion
  Jonathan M. Spring
 
Favicon - a clue to phishing sites detection
  Guang-Gang Geng ; Xiao-Dong Lee ; Wei Wang ; Shian-Shyong Tseng
 
Empirical analysis of factors affecting malware URL detection
  Marie Vasek ; Tyler Moore
 
Phish-Net: Investigating phish clusters using drop email addresses
  Shams Zawoad ; Amit Kumar Dutta ; Alan Sprague ; Ragib Hasan ; Jason Britt ; Gary Warner
 
Honor among thieves: A common's analysis of cybercrime economies
  Sadia Afroz ; Vaibhav Garg ; Damon McCoy ; Rachel Greenstadt
 
Modeling malicious domain name take-down dynamics: Why eCrime pays
  Jonathan M. Spring
 
An inquiry into money laundering tools in the Bitcoin ecosystem
  Malte Möser ; Rainer Böhme ; Dominic Breuker
 
An exploration of the factors affecting the advertised price for stolen data
  Thomas J. Holt ; Yi-Ting Chua ; Olga Smirnova
 
Folex: An analysis of an herbal and counterfeit luxury goods affiliate program
  Mohammad Karami ; Shiva Ghaemi ; Damon Mccoy
 
Monitoring a fast flux botnet using recursive and passive DNS: A case study
  Dhia Mahjoub