- Home
- Publications
- Publication Search
- Publication Details
Title
Systematically Understanding the Cyber Attack Business
Authors
Keywords
-
Journal
ACM COMPUTING SURVEYS
Volume 51, Issue 4, Pages 1-36
Publisher
Association for Computing Machinery (ACM)
Online
2018-07-06
DOI
10.1145/3199674
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Shifting to Mobile: Network-based Empirical Study of Mobile Vulnerability Market
- (2017) Keman Huang et al. IEEE Transactions on Services Computing
- *droid
- (2016) Bradley Reaves et al. ACM COMPUTING SURVEYS
- Performance and Security Improvements for Tor
- (2016) Mashael Alsabah et al. ACM COMPUTING SURVEYS
- Enhancing comparison shopping agents through ordering and gradual information disclosure
- (2016) Chen Hajaj et al. AUTONOMOUS AGENTS AND MULTI-AGENT SYSTEMS
- Mules, Seals, and Attacking Tools: Analyzing 12 Online Marketplaces
- (2016) Ziming Zhao et al. IEEE SECURITY & PRIVACY
- Identifying and Profiling Key Sellers in Cyber Carding Community: AZSecure Text Mining System
- (2016) Weifeng Li et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- Economic and Policy Implications of Restricted Patch Distribution
- (2016) Karthik Kannan et al. MANAGEMENT SCIENCE
- A Taxonomy of Attacks and a Survey of Defence Mechanisms for Semantic Social Engineering Attacks
- (2015) Ryan Heartfield et al. ACM COMPUTING SURVEYS
- Securing Android
- (2015) Sufatrio et al. ACM COMPUTING SURVEYS
- Web Service Composition
- (2015) Angel Lagares Lemos et al. ACM COMPUTING SURVEYS
- Multimodal Data Fusion: An Overview of Methods, Challenges, and Prospects
- (2015) Dana Lahat et al. PROCEEDINGS OF THE IEEE
- Mobile Application Testing: A Tutorial
- (2014) Jerry Gao et al. COMPUTER
- Analyzing and defending against web-based malware
- (2013) Jian Chang et al. ACM COMPUTING SURVEYS
- The Compleat Story of Phish
- (2013) Hilarie Orman IEEE INTERNET COMPUTING
- Crimeware-as-a-service—A survey of commoditized crimeware in the underground market
- (2013) Aditya K. Sood et al. International Journal of Critical Infrastructure Protection
- A survey on automated dynamic malware-analysis techniques and tools
- (2012) Manuel Egele et al. ACM COMPUTING SURVEYS
- The state of phishing attacks
- (2011) Jason Hong COMMUNICATIONS OF THE ACM
- The cyber threat landscape: Challenges and future research directions
- (2011) Kim-Kwang Raymond Choo COMPUTERS & SECURITY
Add your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload NowAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started