Crime pays if you are just an average hacker

W. Shim, L. Allodi, F. Massacci

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

2 Citations (Scopus)


The following topics are dealt with: access control; wireless networks; hybrid-network intrusion detection system; cloud computing; database audit; forensic analysis algorithm; complex networks; resilient hybrid overlay model; smart grid; malware classification; author identification; image visualization based malware detection; steganography; audio encryption; computational intelligence; static software checking; and memory corruption vulnerabilities.
Original languageEnglish
Title of host publicationProceedings of the 2012 ASE International Conference on Cyber Security, CyberSecurity 2012
Number of pages7
Publication statusPublished - 2013
Externally publishedYes
Event2012 ASE International Conference on Cyber Security - Washington, United States
Duration: 14 Dec 201216 Dec 2012


Conference2012 ASE International Conference on Cyber Security
CountryUnited States


  • black markets
  • exploit kits
  • game theory
  • security

Fingerprint Dive into the research topics of 'Crime pays if you are just an average hacker'. Together they form a unique fingerprint.

Cite this