<--- Back to Details
First PageDocument Content
Computer crimes / Crimes / Social engineering / Spam / Identity theft / Phishing / Credit card fraud / Email spam / Organized crime / Cybercrime / Spamming / Internet
Date: 2012-06-08 17:16:25
Computer crimes
Crimes
Social engineering
Spam
Identity theft
Phishing
Credit card fraud
Email spam
Organized crime
Cybercrime
Spamming
Internet

Measuring the Cost of Cybercrime Ross Anderson 1 Chris Barton 2 Rainer B¨ohme 3 Richard Clayton 4 Michel J.G. van Eeten 5

Add to Reading List

Source URL: cseweb.ucsd.edu

Download Document from Source Website

File Size: 403,53 KB

Share Document on Facebook

Similar Documents

Click Trajectories: End-to-End Analysis of the Spam Value Chain

Click Trajectories: End-to-End Analysis of the Spam Value Chain

DocID: 1xVUj - View Document

Effect of Spam on Hashtag Recommendation for Tweets Surendra Sedhai Aixin Sun  Nanyang Technological University, Nanyang Avenue, Singapore

Effect of Spam on Hashtag Recommendation for Tweets Surendra Sedhai Aixin Sun Nanyang Technological University, Nanyang Avenue, Singapore

DocID: 1xVU9 - View Document

Can One Tamper with the Sample API? - Toward Neutralizing Bias from Spam and Bot Content Fred Morstatter, Harsh Dani, Justin Sampson, and Huan Liu Arizona State University, Tempe, AZ, USA  {fred.morstatter, harsh.dani, j

Can One Tamper with the Sample API? - Toward Neutralizing Bias from Spam and Bot Content Fred Morstatter, Harsh Dani, Justin Sampson, and Huan Liu Arizona State University, Tempe, AZ, USA {fred.morstatter, harsh.dani, j

DocID: 1xUgz - View Document

PDF Document

DocID: 1xyjp - View Document

DOC Document

DocID: 1xsO0 - View Document