- Blockchain Technology Applications and Security
- Cybercrime and Law Enforcement Studies
- Spam and Phishing Detection
- FinTech, Crowdfunding, Digital Finance
- Advanced Malware Detection Techniques
- Crime, Illicit Activities, and Governance
- Network Security and Intrusion Detection
- Information and Cyber Security
- User Authentication and Security Systems
- Hate Speech and Cyberbullying Detection
- Web Application Security Vulnerabilities
- Artificial Intelligence in Healthcare and Education
- Scientific Computing and Data Management
- Regional Development and Policy
- Italian Fascism and Post-war Society
- Multimedia Communication and Technology
- Banking stability, regulation, efficiency
- Law in Society and Culture
- Digital Platforms and Economics
- Adversarial Robustness in Machine Learning
- Software Testing and Debugging Techniques
- Digital Games and Media
- Complex Systems and Time Series Analysis
- Digital Rights Management and Security
- Economic, financial, and policy analysis
University College London
2018-2024
The London College
2024
University of New Mexico
2018-2019
University of Tulsa
2015-2017
Southern Methodist University
2012-2015
In 2012 we presented the rst systematic study of costs cybercrime. this paper, we report what has changed in seven years since. The period seen major platform evolution, with mobile phone replacing PC and laptop as consumer terminal of choice, Android Windows, many services moving to cloud. The use social networks become extremely widespread. executive summary is that about half all property crime, by volume value, is now online. We hypothesised in that might be so; it established...
The surge of interest in cryptocurrencies has been accompanied by a proliferation fraud. This paper examines pump and dump schemes. recent explosion nearly 2,000 an unregulated environment expanded the scope for abuse. We quantify cryptocurrency schemes on Discord Telegram, two popular group-messaging platforms. joined all relevant Telegram groups/channels identified thousands different pumps. Our findings provide first measure such pumps empirically document important properties this ecosystem.
We describe a case-control study to identify risk factors that are associated with higher rates of webserver compromise. inspect random sample around 200,000 webservers and automatically attributes hypothesized affect the susceptibility compromise, notably content management system (CMS) type. then cross-list this information data on hacked serve phishing pages or redirect unlicensed online pharmacies. find running WordPress Joomla more likely be than those not any CMS, servers Apache Nginx...
Abstract Issues The sale of illicit drugs online has expanded to mainstream social media apps. These platforms provide access a wide audience, especially children and adolescents. Research is in its infancy scattered due the multidisciplinary aspects phenomena. Approach We present systematic scoping review on advertisement young people. Peer‐reviewed studies written English, Spanish French were searched for period 2015 2022. extracted data users, studied, rate posts, terminology used study...
Sharing incident data among Internet operators is widely seen as an important strategy in combating cybercrime. However, little work has been done to quantify the positive benefits of such sharing. To that end, we report on observational study URLs blacklisted for distributing malware non-profit anti-malware organization StopBadware shared with requesting web hosting providers. Our dataset comprises over 28,000 41 organizations between 2010 and 2015. We show sharing immediate effect cleaning...
![Figure][1] Given the narrow lens through which online payment system known as Bitcoin is typically presented, casual observers could be forgiven for mistaking it a white, libertarian cult revolving around idol Satoshi Nakamoto. Much of media coverage digital currency
This paper investigates the evolution of investment scam lures and scam-related keywords in cryptocurrency online forum Bitcointalk over a period 12 years. Our findings show shift found within posts forum, where "Ponzi" was most popular frequently mentioned 2014 2018 "HYIP" appeared more often 2021. We also identify that financial principle is tactic likely to be used lure people into scams from 2015 until 2017, coinciding with when commonly keyword. followed by transition authority...
Thousands of new cryptocurrencies have been introduced in recent years. Most are with a so-called "whitepaper" containing mix technical documentation, legal boilerplate and marketing material. Notably, many proposed currencies reuse text from previous established cryptocurrencies. We analyze the whitepapers 1 260 actively traded 2 039 ICOs. develop two measures similarity. Moderately similar papers portion paper, often disclaimers. By contrast, some highly appear to copy most text. 4% coin...
Many organizations, from antivirus companies to motivated volunteers, maintain blacklists of URLs suspected distributing malware in order protect users. Detection rates can vary widely, but it is not known why. We posit that much variation be explained by differences the type and themselves. To end, we conducted an empirical analysis 722 submitted Malware Domain List (MDL) over 6 months 2012-2013. ran each URL through VirusTotal, a tool allowed us check against 38 different blacklists,...