Skip to main content

Cyber-Crime: New Trends, Challenges and Detection

Societies in today’s world are becoming more and more dependent on open networks such as Internet where commercial activities, business transactions and government services are realized. This has led to the fast development of new cyber threats and information security issues which are utilized by cyber criminals.

Edited by: Yali Liu, Wojciech Mazurczyk, Krzysztof Szczypiorski and Hui Tian

  1. Research

    Edge-based image steganography

    This paper proposes a novel steganography technique, where edges in the cover image have been used to embed messages. Amount of data to be embedded plays an important role on the selection of edges, i.e., the ...

    Saiful Islam, Mangat R Modi and Phalguni Gupta

    EURASIP Journal on Information Security 2014 2014:8

    Published on: 27 April 2014

  2. Research

    How can sliding HyperLogLog and EWMA detect port scan attacks in IP traffic?

    IP networks are constantly targeted by new techniques of denial of service attacks (SYN flooding, port scan, UDP flooding, etc), causing service disruption and considerable financial damage. The on-line detect...

    Yousra Chabchoub, Raja Chiky and Betul Dogan

    EURASIP Journal on Information Security 2014 2014:5

    Published on: 7 February 2014

  3. Research

    Inside the scam jungle: a closer look at 419 scam email operations

    419 scam (also referred to as Nigerian scam) is a popular form of fraud in which the fraudster tricks the victim into paying a certain amount of money under the promise of a future, larger payoff.

    Jelena Isacenkova, Olivier Thonnard, Andrei Costin, Aurélien Francillon and David Balzarotti

    EURASIP Journal on Information Security 2014 2014:4

    Published on: 22 January 2014

  4. Research

    A quality metric for IDS signatures: in the wild the size matters

    The manual forensics investigation of security incidents is an opaque process that involves the collection and correlation of diverse evidence. In this work we first conduct a complex experiment to expand our ...

    Elias Raftopoulos and Xenofontas Dimitropoulos

    EURASIP Journal on Information Security 2013 2013:7

    Published on: 20 December 2013

  5. Research

    Do private and portable web browsers leave incriminating evidence?: a forensic analysis of residual artifacts from private and portable web browsing sessions

    The Internet is an essential tool for everyday tasks. Aside from common use, the option to browse the Internet privately is a desirable attribute. However, this can create a problem when private Internet sessi...

    Donny J Ohana and Narasimha Shashidhar

    EURASIP Journal on Information Security 2013 2013:6

    Published on: 21 November 2013

  6. Research

    Cross-country analysis of spambots

    Spam is a vector for cybercrime and commonly legally prohibited. Why do certain national jurisdictions produce a higher percentage of spam than others despite its prohibition? Why do some countries have a high...

    Vaibhav Garg, Thomas Koster and Linda Jean Camp

    EURASIP Journal on Information Security 2013 2013:3

    Published on: 30 October 2013

  7. Research

    Detection and analysis of the Chameleon WiFi access point virus

    This paper analyses and proposes a novel detection strategy for the 'Chameleon’ WiFi AP-AP virus. Previous research has considered virus construction, likely virus behaviour and propagation methods. The resear...

    Jonny Milliken, Valerio Selis and Alan Marshall

    EURASIP Journal on Information Security 2013 2013:2

    Published on: 17 October 2013