Mariam Nouh (University of Oxford); Jason R. C. Nurse (University of Kent); Helena Webb, Michael Goldsmith (University of Oxford)
Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement
View More Papers
Analyzing and Creating Malicious URLs: A Comparative Study on...
Vincent Drury (IT-Security Research Group, RWTH Aachen University), Rene Roepke (Learning Technologies Research Group, RWTH Aachen University), Ulrik Schroeder (Learning Technologies Research Group, RWTH Aachen University), Ulrike Meyer (IT-Security Research Group, RWTH Aachen University)
Read MoreMacOS versus Microsoft Windows: A Study on the Cybersecurity...
Cem Topcuoglu (Northeastern University), Andrea Martinez (Florida International University), Abbas Acar (Florida International University), Selcuk Uluagac (Florida International University), Engin Kirda (Northeastern University)
Read MoreSoK: A Proposal for Incorporating Gamified Cybersecurity Awareness in...
June De La Cruz (INSPIRIT Lab, University of Denver), Sanchari Das (INSPIRIT Lab, University of Denver)
Read MoreAnalyzing the Patterns and Behavior of Users When Detecting...
Nick Ceccio, Naman Gupta, Majed Almansoori, Rahul Chatterjee (University of Wisconsin-Madison)
Read More