ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2009.04344
  4. Cited By
Impersonation-as-a-Service: Characterizing the Emerging Criminal
  Infrastructure for User Impersonation at Scale
v1v2 (latest)

Impersonation-as-a-Service: Characterizing the Emerging Criminal Infrastructure for User Impersonation at Scale

9 September 2020
Michele Campobasso
Luca Allodi
ArXiv (abs)PDFHTML

Papers citing "Impersonation-as-a-Service: Characterizing the Emerging Criminal Infrastructure for User Impersonation at Scale"

10 / 10 papers shown
Title
Evaluation Scheme to Analyze Keystroke Dynamics Methods
Evaluation Scheme to Analyze Keystroke Dynamics Methods
Anastasia Dimaratos
Daniela Pöhn
53
1
0
23 Jul 2024
SoK: Web Authentication in the Age of End-to-End Encryption
SoK: Web Authentication in the Age of End-to-End Encryption
Jenny Blessing
Daniel Hugenroth
Ross J. Anderson
A. Beresford
81
1
0
26 Jun 2024
Is It Really You Who Forgot the Password? When Account Recovery Meets
  Risk-Based Authentication
Is It Really You Who Forgot the Password? When Account Recovery Meets Risk-Based Authentication
Andre Büttner
Andreas Thue Pedersen
Stephan Wiefling
Nils Gruschka
Luigi Lo Iacono
91
0
0
18 Mar 2024
Malware Finances and Operations: a Data-Driven Study of the Value Chain
  for Infections and Compromised Access
Malware Finances and Operations: a Data-Driven Study of the Value Chain for Infections and Compromised Access
Juha Nurmi
Mikko S. Niemelä
B. Brumley
28
0
0
27 Jun 2023
You Can Tell a Cybercriminal by the Company they Keep: A Framework to
  Infer the Relevance of Underground Communities to the Threat Landscape
You Can Tell a Cybercriminal by the Company they Keep: A Framework to Infer the Relevance of Underground Communities to the Threat Landscape
Michele Campobasso
Radu Radulescu
Sylvan Brons
Luca Allodi
48
6
0
09 Jun 2023
Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring
  Profile Sales on an Active, Leading Criminal Market for User Impersonation at
  Scale
Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring Profile Sales on an Active, Leading Criminal Market for User Impersonation at Scale
Michele Campobasso
Luca Allodi
38
3
0
06 Mar 2023
THREAT/crawl: a Trainable, Highly-Reusable, and Extensible Automated
  Method and Tool to Crawl Criminal Underground Forums
THREAT/crawl: a Trainable, Highly-Reusable, and Extensible Automated Method and Tool to Crawl Criminal Underground Forums
Michele Campobasso
Luca Allodi
35
7
0
07 Dec 2022
Pump Up Password Security! Evaluating and Enhancing Risk-Based
  Authentication on a Real-World Large-Scale Online Service
Pump Up Password Security! Evaluating and Enhancing Risk-Based Authentication on a Real-World Large-Scale Online Service
Stephan Wiefling
Paul René Jørgensen
Sigurd Thunem
Luigi Lo Iacono
97
24
0
30 Jun 2022
FIDO2 With Two Displays-Or How to Protect Security-Critical Web
  Transactions Against Malware Attacks
FIDO2 With Two Displays-Or How to Protect Security-Critical Web Transactions Against Malware Attacks
Timon Hackenjos
Benedikt Wagner
Julian Herr
Jochen Rill
Marek Wehmer
Niklas Goerke
Ingmar Baumgart
33
0
0
27 Jun 2022
What's in Score for Website Users: A Data-driven Long-term Study on
  Risk-based Authentication Characteristics
What's in Score for Website Users: A Data-driven Long-term Study on Risk-based Authentication Characteristics
Stephan Wiefling
Markus Dürmuth
Luigi Lo Iacono
64
21
0
26 Jan 2021
1