David Maimon

Orcid: 0000-0003-1492-2762

According to our database1, David Maimon authored at least 15 papers between 2012 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
"Cutie, click on the link": A forensic analysis of URLs.
Comput. Hum. Behav., 2025

2024
Predicting new hackers' criminal careers: A group-based trajectory approach.
Comput. Secur., February, 2024

2022
Parental guardianship and online sexual grooming of teenagers: A honeypot experiment.
Comput. Hum. Behav., 2022

2021
Restrictive deterrence and the scope of hackers' reoffending: Findings from two randomized field trials.
Comput. Hum. Behav., 2021

Identifying Darknet Vendor Wallets by Matching Feedback Reviews with Bitcoin Transactions.
Proceedings of the 2021 International Conference on Data Mining, 2021

2020
Towards an Experimental Testbed to Study CyberWorm Behaviors in Large Scale Networks.
Proceedings of the WiNTECH@MobiCom 2020: Proceedings of the 14th International Workshop on Wireless Network Testbeds, 2020

Illicit Activity Detection in Large-Scale Dark and Opaque Web Social Networks.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2019
Python Scrapers for Scraping Cryptomarkets on Tor.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

Predictably Deterrable? The Case of System Trespassers.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

Characteristics of Bitcoin Transactions on Cryptomarkets.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

2017
Re-thinking Online Offenders' SKRAM: Individual Traits and Situational Motivations as Additional Risk Factors for Predicting Cyber Attacks.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

On the relevance of social media platforms in predicting the volume and patterns of web defacement attacks.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

Detection of hacking behaviors and communication patterns on social media.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

2015
Hackers Topology Matter Geography: Mapping the Dynamics of Repeated System Trespassing Events Networks.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2012
Are Computer Focused Crimes Impacted by System Configurations? An Empirical Study.
Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering, 2012


  Loading...