default search action
Alice Hutchings
Person information
- affiliation: University of Cambridge, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Jack Hughes, Sergio Pastrana, Alice Hutchings, Sadia Afroz, Sagar Samtani, Weifeng Li, Ericsson Santana Marin:
The Art of Cybercrime Community Research. ACM Comput. Surv. 56(6): 155:1-155:26 (2024) - [j6]Alice Hutchings:
The Amplification of Online Deviancy Through the Language of Violent Crime, War, and Aggression. IEEE Secur. Priv. 22(2): 81-84 (2024) - [c31]Marilyne Ordekian, Gilberto Atondo Siu, Alice Hutchings, Marie Vasek:
Investigating Wrench Attacks: Physical Attacks Targeting Cryptocurrency Users. AFT 2024: 24:1-24:24 - [c30]Jonah Gibbon, Tina Marjanov, Alice Hutchings, John Aston:
Measuring the Unmeasurable: Estimating True Population of Hidden Online Communities. EuroS&P Workshops 2024: 56-66 - [c29]Anh V. Vu, Alice Hutchings, Ross J. Anderson:
No Easy Way Out: the Effectiveness of Deplatforming an Extremist Forum to Suppress Hate and Harassment. SP 2024: 717-734 - [c28]Anh V. Vu, Daniel R. Thomas, Ben Collier, Alice Hutchings, Richard Clayton, Ross J. Anderson:
Getting Bored of Cyberwar: Exploring the Role of Low-level Cybercrime Actors in the Russia-Ukraine Conflict. WWW 2024: 1596-1607 - [i7]Luis Adan Saavedra, Hridoy S. Dutta, Alastair R. Beresford, Alice Hutchings:
ModZoo: A Large-Scale Study of Modded Android Apps and their Markets. CoRR abs/2402.19180 (2024) - [i6]Ceren Kocaogullar, Tina Marjanov, Ivan Petrov, Ben Laurie, Al Cutter, Christoph Kern, Alice Hutchings, Alastair R. Beresford:
Confidential Computing Transparency. CoRR abs/2409.03720 (2024) - 2023
- [j5]Linda Zhou, Andrew Caines, Ildiko Pete, Alice Hutchings:
Automated hate speech detection and span extraction in underground hacking and extremist forums. Nat. Lang. Eng. 29(5): 1247-1274 (2023) - [j4]Giorgio Di Tizio, Gilberto Atondo Siu, Alice Hutchings, Fabio Massacci:
A Graph-Based Stratified Sampling Methodology for the Analysis of (Underground) Forums. IEEE Trans. Inf. Forensics Secur. 18: 5473-5483 (2023) - [c27]Kieron Ivy Turk, Alice Hutchings:
Click Here to Exit: An Evaluation of Quick Exit Buttons. CHI 2023: 547:1-547:15 - [c26]Dimitrios Georgoulias, Jens Myrup Pedersen, Alice Hutchings, Morten Falch, Emmanouil Vasilomanolakis:
In the Market for a Botnet? An In-Depth Analysis of Botnet-Related Listings on Darkweb Marketplaces. eCrime 2023: 1-14 - [c25]Jessica Man, Gilberto Atondo Siu, Alice Hutchings:
Autism Disclosures and Cybercrime Discourse on a Large Underground Forum. eCrime 2023: 1-14 - [c24]Anna Talas, Alice Hutchings:
Hacker's Paradise: Analysing Music in a Cybercrime Forum. eCrime 2023: 1-14 - [c23]Gilberto Atondo Siu, Alice Hutchings:
"Get a higher return on your savings!": Comparing adverts for cryptocurrency investment scams across platforms. EuroS&P Workshops 2023: 158-169 - [c22]Jack Hughes, Alice Hutchings:
Digital Drift and the Evolution of a Large Cybercrime Forum. EuroS&P Workshops 2023: 183-193 - [c21]Sharad Agarwal, Gilberto Atondo Siu, Marilyne Ordekian, Alice Hutchings, Enrico Mariconti, Marie Vasek:
Short Paper: DeFi Deception - Uncovering the Prevalence of Rugpulls in Cryptocurrency Projects. FC (1) 2023: 363-372 - [c20]Kieron Ivy Turk, Alice Hutchings, Alastair R. Beresford:
Can't Keep Them Away: The Failures of Anti-stalking Protocols in Personal Item Tracking Devices. Security Protocols Workshop 2023: 78-88 - [d1]Giorgio Di Tizio, Gilberto Atondo Siu, Alice Hutchings, Fabio Massacci:
A graph-based representation of the Hack Forums using Neo4j. Zenodo, 2023 - [i5]Anh V. Vu, Alice Hutchings, Ross J. Anderson:
No Easy Way Out: The Effectiveness of Deplatforming an Extremist Forum to Suppress Hate and Harassment. CoRR abs/2304.07037 (2023) - [i4]Giorgio Di Tizio, Gilberto Atondo Siu, Alice Hutchings, Fabio Massacci:
A Graph-based Stratified Sampling Methodology for the Analysis of (Underground) Forums. CoRR abs/2308.09413 (2023) - [i3]Kieron Ivy Turk, Alice Hutchings:
Stop Following Me! Evaluating the Effectiveness of Anti-Stalking Features of Personal Item Tracking Devices. CoRR abs/2312.07157 (2023) - 2022
- [c19]Gilberto Atondo Siu, Alice Hutchings, Marie Vasek, Tyler Moore:
"Invest in crypto!": An analysis of investment scam advertisements found in Bitcointalk. eCrime 2022: 1-12 - [c18]Ildiko Pete, Jack Hughes, Andrew Caines, Anh V. Vu, Harshad Gupta, Alice Hutchings, Ross J. Anderson, Paula Buttery:
PostCog: A tool for interdisciplinary research into underground forums at scale. EuroS&P Workshops 2022: 93-104 - [i2]Anh V. Vu, Daniel R. Thomas, Ben Collier, Alice Hutchings, Richard Clayton, Ross J. Anderson:
Getting Bored of Cyberwar: Exploring the Role of the Cybercrime Underground in the Russia-Ukraine Conflict. CoRR abs/2208.10629 (2022) - 2021
- [c17]Gilberto Atondo Siu, Ben Collier, Alice Hutchings:
Follow the money: The relationship between currency exchange and illicit behaviour in an underground forum. EuroS&P Workshops 2021: 191-201 - 2020
- [c16]Jack Hughes, Seth Aycock, Andrew Caines, Paula Buttery, Alice Hutchings:
Detecting Trending Terms in Cybersecurity Forum Discussions. W-NUT@EMNLP 2020: 107-115 - [c15]Luca Allodi, Alice Hutchings, Fabio Massacci, Sergio Pastrana, Marie Vasek:
WACCO 2020: the 2nd Workshop on Attackers and Cybercrime Operations Co-held with IEEE European Symposium on Security and Privacy 2020. EuroS&P Workshops 2020: 427 - [c14]Anh V. Vu, Jack Hughes, Ildiko Pete, Ben Collier, Yi Ting Chua, Ilia Shumailov, Alice Hutchings:
Turning Up the Dial: the Evolution of a Cybercrime Market Through Set-up, Stable, and Covid-19 Eras. Internet Measurement Conference 2020: 551-566
2010 – 2019
- 2019
- [c13]Yi Ting Chua, Simon Parkin, Matthew Edwards, Daniela Oliveira, Stefan Schiffner, Gareth Tyson, Alice Hutchings:
Identifying Unintended Harms of Cybersecurity Countermeasures. eCrime 2019: 1-15 - [c12]Jack Hughes, Ben Collier, Alice Hutchings:
From playing games to committing crimes: A multi-technique approach to predicting key actors on an online gaming forum. eCrime 2019: 1-12 - [c11]Alice Hutchings, Sergio Pastrana:
Understanding eWhoring. EuroS&P 2019: 201-214 - [c10]Alice Hutchings, Ben Collier:
Inside out: Characterising Cybercrimes Committed Inside and Outside the Workplace. EuroS&P Workshops 2019: 481-490 - [c9]Ben Collier, Daniel R. Thomas, Richard Clayton, Alice Hutchings:
Booting the Booters: Evaluating the Effects of Police Interventions in the Market for Denial-of-Service Attacks. Internet Measurement Conference 2019: 50-64 - [c8]Sergio Pastrana, Alice Hutchings, Daniel R. Thomas, Juan Tapiador:
Measuring eWhoring. Internet Measurement Conference 2019: 463-477 - [i1]Alice Hutchings, Sergio Pastrana:
Understanding eWhoring. CoRR abs/1905.04576 (2019) - 2018
- [c7]Andrew Caines, Sergio Pastrana, Alice Hutchings, Paula Buttery:
Aggressive language in an online hacking forum. ALW 2018: 66-74 - [c6]Sergio Pastrana, Alice Hutchings, Andrew Caines, Paula Buttery:
Characterizing Eve: Analysing Cybercrime Actors in a Large Underground Forum. RAID 2018: 207-227 - [c5]Sergio Pastrana, Daniel R. Thomas, Alice Hutchings, Richard Clayton:
CrimeBB: Enabling Cybercrime Research on Underground Forums at Scale. WWW 2018: 1845-1854 - 2017
- [j3]Ingolf Becker, Alice Hutchings, Ruba Abu-Salma, Ross J. Anderson, Nicholas Bohm, Steven J. Murdoch, M. Angela Sasse, Gianluca Stringhini:
International comparison of bank fraud reimbursement: customer perceptions and contractual terms. J. Cybersecur. 3(2): 109-125 (2017) - [c4]Alice Hutchings, Richard Clayton:
Configuring Zeus: A case study of online crime target selection and knowledge transmission. eCrime 2017: 33-40 - [c3]Daniel R. Thomas, Sergio Pastrana, Alice Hutchings, Richard Clayton, Alastair R. Beresford:
Ethical issues in research using datasets of illicit origin. Internet Measurement Conference 2017: 445-462 - 2016
- [j2]Thomas J. Holt, Olga Smirnova, Alice Hutchings:
Examining signals of trust in criminal markets online. J. Cybersecur. 2(2): 137-145 (2016) - [c2]Alice Hutchings, Richard Clayton, Ross J. Anderson:
Taking down websites to prevent crime. eCrime 2016: 102-111 - [c1]Steven J. Murdoch, Ingolf Becker, Ruba Abu-Salma, Ross J. Anderson, Nicholas Bohm, Alice Hutchings, M. Angela Sasse, Gianluca Stringhini:
Are Payment Card Contracts Unfair? (Short Paper). Financial Cryptography 2016: 600-608 - 2015
- [j1]Nektarios Leontiadis, Alice Hutchings:
Scripting the crime commission process in the illicit online prescription drug trade. J. Cybersecur. 1(1): 81-92 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-10 22:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint