Developing a Hierarchical Model for Unraveling Conspiracy Theories.
|
Diverse Misinformation: Impacts of Human Biases on Detection of Deepfakes on Networks.
|
Human Dimensions of Animal Exploitation: Towards Understanding the International Wildlife Trade and Selfie-Tourism on Twitter.
|
Limits of Individual Consent and Models of Distributed Consent in Online Social Networks.
|
Stick It to The Man: Correcting for Non-Cooperative Behavior of Subjects in Experiments on Social Networks.
|
Game of FAME: Automatic Detection of FAke MEmes.
|
SocialHEISTing: Understanding Stolen Facebook Accounts. |
Master of Sheets: A Tale of Compromised Cloud Documents. |
Under and Over the Surface: A Comparison of the Use of Leaked Account Credentials in the Dark and Surface Web. |
BABELTOWER: How Language Affects Criminal Activity in Stolen Webmail Accounts. |
The Cause of All Evils: Assessing Causality Between User Actions and Malware Activity. |
Kek, Cucks, and God Emperor Trump: A Measurement Study of 4chan's Politically Incorrect Forum and Its Effect on the Web. |
All Your Cards Are Belong to Us: Understanding Online Carding Forums. |
What's in a Name? Understanding Profile Name Reuse on Twitter. |
Flipping 419 Cybercrime Scams: Targeting the Weak and the Vulnerable. |
What Happens After You Are Pwnd: Understanding the Use of Leaked Webmail Credentials in the Wild. |
What's Your Major Threat? On the Differences Between the Network Behavior of Targeted and Commodity Malware. |
Honey Sheets: What Happens to Leaked Google Spreadsheets? |
Why Allowing Profile Name Reuse Is a Bad Idea. |
Harvesting Wild Honey from Webmail Beehives. |
A Methodology to Assess Malware Causality in Network Activities. |
Diverse Misinformation: Impacts of Human Biases on Detection of Deepfakes on Networks. |
Honeypot Boulevard: Understanding Malicious Activity via Decoy Accounts. |