2013 Accepted Research Papers

Password advice shouldn't be boring: Visualizing password guessing attacks
  Leah Zhang-Kennedy ; Sonia Chiasson ; Robert Biddle
Voice of the customer
  Brad Wardman ; Lisa Kelly ; Michael Weideman
$1.00 per RT #BostonMarathon #PrayForBoston: Analyzing fake content on Twitter
  Aditi Gupta ; Hemank Lamba ; Ponnurangam Kumaraguru
  Aunshul Rege
A notation for describing the steps in indicator expansion
  Jonathan M. Spring
Favicon - a clue to phishing sites detection
  Guang-Gang Geng ; Xiao-Dong Lee ; Wei Wang ; Shian-Shyong Tseng
Empirical analysis of factors affecting malware URL detection
  Marie Vasek ; Tyler Moore
Phish-Net: Investigating phish clusters using drop email addresses
  Shams Zawoad ; Amit Kumar Dutta ; Alan Sprague ; Ragib Hasan ; Jason Britt ; Gary Warner
Honor among thieves: A common's analysis of cybercrime economies
  Sadia Afroz ; Vaibhav Garg ; Damon McCoy ; Rachel Greenstadt
Modeling malicious domain name take-down dynamics: Why eCrime pays
  Jonathan M. Spring
An inquiry into money laundering tools in the Bitcoin ecosystem
  Malte Möser ; Rainer Böhme ; Dominic Breuker
An exploration of the factors affecting the advertised price for stolen data
  Thomas J. Holt ; Yi-Ting Chua ; Olga Smirnova
Folex: An analysis of an herbal and counterfeit luxury goods affiliate program
  Mohammad Karami ; Shiva Ghaemi ; Damon Mccoy
Monitoring a fast flux botnet using recursive and passive DNS: A case study
  Dhia Mahjoub