ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1708.04866
  4. Cited By
Economic Factors of Vulnerability Trade and Exploitation
v1v2v3v4v5 (latest)

Economic Factors of Vulnerability Trade and Exploitation

16 August 2017
Luca Allodi
ArXiv (abs)PDFHTML

Papers citing "Economic Factors of Vulnerability Trade and Exploitation"

17 / 17 papers shown
Title
The Cyber Alliance Game: How Alliances Influence Cyber-Warfare
The Cyber Alliance Game: How Alliances Influence Cyber-Warfare
Gergely Benkő
Gergely Biczók
28
0
0
08 Oct 2024
Inferring Discussion Topics about Exploitation of Vulnerabilities from
  Underground Hacking Forums
Inferring Discussion Topics about Exploitation of Vulnerabilities from Underground Hacking Forums
Felipe Moreno Vera
40
0
0
07 May 2024
A Graph-based Stratified Sampling Methodology for the Analysis of
  (Underground) Forums
A Graph-based Stratified Sampling Methodology for the Analysis of (Underground) Forums
Giorgio Di Tizio
Gilberto Atondo Siu
Alice Hutchings
Fabio Massacci
34
0
0
18 Aug 2023
Cream Skimming the Underground: Identifying Relevant Information Points
  from Online Forums
Cream Skimming the Underground: Identifying Relevant Information Points from Online Forums
Felipe Moreno Vera
M. Nogueira
Cainã Figueiredo
Daniel S. Menasché
Miguel Bicudo
Ashton Woiwood
Enrico Lovat
Anton Kocheturov
L. P. D. Aguiar
63
3
0
03 Aug 2023
You Can Tell a Cybercriminal by the Company they Keep: A Framework to
  Infer the Relevance of Underground Communities to the Threat Landscape
You Can Tell a Cybercriminal by the Company they Keep: A Framework to Infer the Relevance of Underground Communities to the Threat Landscape
Michele Campobasso
Radu Radulescu
Sylvan Brons
Luca Allodi
36
6
0
09 Jun 2023
Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring
  Profile Sales on an Active, Leading Criminal Market for User Impersonation at
  Scale
Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring Profile Sales on an Active, Leading Criminal Market for User Impersonation at Scale
Michele Campobasso
Luca Allodi
33
3
0
06 Mar 2023
THREAT/crawl: a Trainable, Highly-Reusable, and Extensible Automated
  Method and Tool to Crawl Criminal Underground Forums
THREAT/crawl: a Trainable, Highly-Reusable, and Extensible Automated Method and Tool to Crawl Criminal Underground Forums
Michele Campobasso
Luca Allodi
32
7
0
07 Dec 2022
Software Updates Strategies: a Quantitative Evaluation against Advanced
  Persistent Threats
Software Updates Strategies: a Quantitative Evaluation against Advanced Persistent Threats
Giorgio Di Tizio
Michele Armellini
Fabio Massacci
AAML
61
10
0
16 May 2022
Technical Report -- Expected Exploitability: Predicting the Development
  of Functional Vulnerability Exploits
Technical Report -- Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits
Octavian Suciu
Connor Nelson
Zhuo Lyu
Tiffany Bao
Tudor Dumitras
78
41
0
15 Feb 2021
DAHash: Distribution Aware Tuning of Password Hashing Costs
DAHash: Distribution Aware Tuning of Password Hashing Costs
Wenjie Bai
Jeremiah Blocki
40
7
0
25 Jan 2021
CARONTE: Crawling Adversarial Resources Over Non-Trusted, High-Profile
  Environments
CARONTE: Crawling Adversarial Resources Over Non-Trusted, High-Profile Environments
Michele Campobasso
Pavlo Burda
Luca Allodi
28
10
0
17 Sep 2020
Impersonation-as-a-Service: Characterizing the Emerging Criminal
  Infrastructure for User Impersonation at Scale
Impersonation-as-a-Service: Characterizing the Emerging Criminal Infrastructure for User Impersonation at Scale
Michele Campobasso
Luca Allodi
44
36
0
09 Sep 2020
On the Economics of Offline Password Cracking
On the Economics of Offline Password Cracking
Jeremiah Blocki
B. Harsha
Samson Zhou
53
71
0
09 Jun 2020
Mining user interaction patterns in the darkweb to predict enterprise
  cyber incidents
Mining user interaction patterns in the darkweb to predict enterprise cyber incidents
Soumajyoti Sarkar
Mohammad Almukaynizi
Jana Shakarian
Paulo Shakarian
13
16
0
24 Sep 2019
DARKMENTION: A Deployed System to Predict Enterprise-Targeted External
  Cyberattacks
DARKMENTION: A Deployed System to Predict Enterprise-Targeted External Cyberattacks
Mohammed Almukaynizi
E. Marin
Eric Nunes
Paulo Shakarian
Gerardo Simari
Dipsy Kapoor
Timothy Siedlecki
21
21
0
30 Oct 2018
A Bug Bounty Perspective on the Disclosure of Web Vulnerabilities
A Bug Bounty Perspective on the Disclosure of Web Vulnerabilities
Jukka Ruohonen
Luca Allodi
29
1
0
24 May 2018
Towards Realistic Threat Modeling: Attack Commodification, Irrelevant
  Vulnerabilities, and Unrealistic Assumptions
Towards Realistic Threat Modeling: Attack Commodification, Irrelevant Vulnerabilities, and Unrealistic Assumptions
Luca Allodi
S. Etalle
26
13
0
14 Jan 2018
1