Follow
Daniel R. Thomas
Daniel R. Thomas
Senior Lecturer (Associate Professor), University of Strathclyde
Verified email at strath.ac.uk - Homepage
Title
Cited by
Cited by
Year
Crimebb: Enabling cybercrime research on underground forums at scale
S Pastrana, DR Thomas, A Hutchings, R Clayton
Proceedings of the 2018 World Wide Web Conference, 1845-1854, 2018
1552018
Security metrics for the Android ecosystem
DR Thomas, AR Beresford, A Rice
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in …, 2015
1392015
Ethical issues in research using datasets of illicit origin
DR Thomas, S Pastrana, A Hutchings, R Clayton, AR Beresford
Proceedings of the 2017 Internet Measurement Conference, 445-462, 2017
802017
1000 days of UDP amplification DDoS attacks
DR Thomas, R Clayton, AR Beresford
2017 APWG Symposium on Electronic Crime Research (eCrime), 79-84, 2017
752017
The lifetime of Android API vulnerabilities: case study on the JavaScript-to-Java interface
DR Thomas, AR Beresford, T Coudray, T Sutcliffe, A Taylor
Security Protocols XXIII, 2015
622015
Booting the booters: Evaluating the effects of police interventions in the market for denial-of-service attacks
B Collier, DR Thomas, R Clayton, A Hutchings
Proceedings of the internet measurement conference, 50-64, 2019
532019
Cybercrime is (often) boring: Infrastructure and alienation in a deviant subculture
B Collier, R Clayton, A Hutchings, D Thomas
The British Journal of Criminology 61 (5), 1407-1423, 2021
432021
Measuring ewhoring
S Pastrana, A Hutchings, D Thomas, J Tapiador
Proceedings of the Internet Measurement Conference, 463-477, 2019
372019
Influence, infrastructure, and recentering cybercrime policing: evaluating emerging approaches to online law enforcement through a market for cybercrime services
B Collier, DR Thomas, R Clayton, A Hutchings, YT Chua
Policing and Society 32 (1), 103-124, 2022
342022
Cybercrime is (often) boring: maintaining the infrastructure of cybercrime economies
B Collier, R Clayton, A Hutchings, D Thomas
342020
Influence government: Exploring practices, ethics, and power in the use of targeted advertising by the UK state
B Collier, G Flynn, J Stewart, D Thomas
Big data & society 9 (1), 20539517221078756, 2022
212022
When will my PLC support Mirai? The security economics of large-scale attacks against Internet-connected ICS devices
M Dodson, AR Beresford, DR Thomas
2020 APWG Symposium on Electronic Crime Research (eCrime), 1-14, 2020
172020
Getting bored of cyberwar: Exploring the role of the cybercrime underground in the Russia-Ukraine conflict
AV Vu, DR Thomas, B Collier, A Hutchings, R Clayton, RJ Anderson
CoRR, 2022
72022
Uraniborg’s device preloaded app risks scoring metrics
B Lau, J Zhang, AR Bereford, D Thomas, R Mayrhofer
Institute of Networks and Security: Linz, Austria, 2020
72020
Device Analyzer: a privacy-aware platform to support research on the Android ecosystem
DT Wagner, DR Thomas, AR Beresford, A Rice
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and …, 2015
72015
UK cybercrime, victims and reporting: A systematic review
J Sikra, KV Renaud, DR Thomas
Commonwealth Cybercrime Journal 1 (1), 28-59, 2023
62023
Better authentication: password revolution by evolution
DR Thomas, AR Beresford
Security Protocols XXII: 22nd International Workshop, Cambridge, UK, March …, 2014
52014
Influence government, platform power and the patchwork profile: Exploring the appropriation of targeted advertising infrastructures for government behaviour change campaigns
B Collier, J Stewart, S Horgan, DR Thomas, L Wilson
First Monday 29 (2), 2024
42024
Getting bored of cyberwar: Exploring the role of civilian hacktivists in the Russia-Ukraine conflict
AV Vu, DR Thomas, B Collier, A Hutchings, R Clayton, R Anderson
arXiv preprint arXiv:2208.10629, 2022
42022
Ghost trace on the wire? Using key evidence for informed decisions
DA Vasile, M Kleppmann, DR Thomas, AR Beresford
Security Protocols XXVII: 27th International Workshop, Cambridge, UK, April …, 2020
42020
The system can't perform the operation now. Try again later.
Articles 1–20