{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T19:47:15Z","timestamp":1768420035326,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,20]],"date-time":"2020-04-20T00:00:00Z","timestamp":1587340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,20]]},"DOI":"10.1145\/3366423.3380162","type":"proceedings-article","created":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T08:11:44Z","timestamp":1588579904000},"page":"816-826","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Go See a Specialist? Predicting Cybercrime Sales on Online Anonymous Markets from Vendor and Product Characteristics"],"prefix":"10.1145","author":[{"given":"Rolf","family":"van Wegberg","sequence":"first","affiliation":[{"name":"Delft University of Technology"}]},{"given":"Fieke","family":"Miedema","sequence":"additional","affiliation":[{"name":"Delft University of Technology"}]},{"given":"Ugur","family":"Akyazi","sequence":"additional","affiliation":[{"name":"Delft University of Technology"}]},{"given":"Arman","family":"Noroozian","sequence":"additional","affiliation":[{"name":"Delft University of Technology"}]},{"given":"Bram","family":"Klievink","sequence":"additional","affiliation":[{"name":"Leiden University"}]},{"given":"Michel","family":"van Eeten","sequence":"additional","affiliation":[{"name":"Delft University of Technology"}]}],"member":"320","published-online":{"date-parts":[[2020,4,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2436643"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Judith Aldridge and David D\u00e9cary-H\u00e9tu. 2016. Hidden wholesale: The drug diffusing capacity of online drug cryptomarkets. International Journal of Drug Policy(2016). https:\/\/doi.org\/10.1016\/j.drugpo.2016.04.020 Judith Aldridge and David D\u00e9cary-H\u00e9tu. 2016. Hidden wholesale: The drug diffusing capacity of online drug cryptomarkets. International Journal of Drug Policy(2016). https:\/\/doi.org\/10.1016\/j.drugpo.2016.04.020","DOI":"10.1016\/j.drugpo.2016.04.020"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Luca Allodi. 2017. Economic Factors of Vulnerability Trade and Exploitation: Empirical Evidence from a Prominent Russian Cybercrime Market. In CCS\u201917. https:\/\/doi.org\/10.1145\/3133956.3133960 arxiv:1708.04866 Luca Allodi. 2017. Economic Factors of Vulnerability Trade and Exploitation: Empirical Evidence from a Prominent Russian Cybercrime Market. In CCS\u201917. https:\/\/doi.org\/10.1145\/3133956.3133960 arxiv:1708.04866","DOI":"10.1145\/3133956.3133960"},{"key":"e_1_3_2_1_4_1","volume-title":"Measuring Pay-per-Install: The Commoditization of Malware Distribution. In Usenix Security Symposium.","author":"Caballero Juan","year":"2011"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488408"},{"key":"e_1_3_2_1_6_1","volume-title":"An EU-focused analysis of drug supply on the online anonymous marketplace ecosystem","author":"Christin Nicolas","year":"2017"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1080\/17440572.2013.801015"},{"key":"e_1_3_2_1_8_1","volume-title":"Criminals and signals: An assessment of criminal performance in the carding underworld. Security Journal","author":"D\u00e9cary-H\u00e9tu David","year":"2016"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1177\/1079063210375975"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1177\/002224298705100201"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1177\/0093854812457921"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2017.7945053"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Thomas\u00a0J. Holt Olga Smirnova and Alice Hutchings. 2016. Examining signals of trust in criminal markets online. Journal of Cybersecurity(2016). https:\/\/doi.org\/10.1093\/cybsec\/tyw007 Thomas\u00a0J. Holt Olga Smirnova and Alice Hutchings. 2016. Examining signals of trust in criminal markets online. Journal of Cybersecurity(2016). https:\/\/doi.org\/10.1093\/cybsec\/tyw007","DOI":"10.1093\/cybsec\/tyw007"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1093\/bjc\/azu106"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the Eighth International AAAI Conference on Weblogs and Social Media, 216\u2013225","author":"Hutto C.J.","year":"2014"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Rutger Leukfeldt Edward Kleemans and Wouter Stol. 2017. The Use of Online Crime Markets by Cybercriminal Networks: A View From Within. American Behavioral Scientist(2017) 000276421773426. https:\/\/doi.org\/10.1177\/0002764217734267 Rutger Leukfeldt Edward Kleemans and Wouter Stol. 2017. The Use of Online Crime Markets by Cybercriminal Networks: A View From Within. American Behavioral Scientist(2017) 000276421773426. https:\/\/doi.org\/10.1177\/0002764217734267","DOI":"10.1177\/0002764217734267"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","volume-title":"Industry of Anonymity: Inside the Business of Cybercrime","author":"Lusthaus Jonathan","DOI":"10.4159\/9780674989047"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Jonathan Lusthaus and Federico Varese. 2017. Offline and Local: The Hidden Face of Cybercrime. Policing: A Journal of Policy and Practice(2017). https:\/\/doi.org\/10.1093\/police\/pax042 Jonathan Lusthaus and Federico Varese. 2017. Offline and Local: The Hidden Face of Cybercrime. Policing: A Journal of Policy and Practice(2017). https:\/\/doi.org\/10.1093\/police\/pax042","DOI":"10.1093\/police\/pax042"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1177\/1057567717709498"},{"key":"e_1_3_2_1_20_1","volume-title":"Assessing market competition and vendors","author":"Paquet-Clouston Masarah","year":"2018"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2013.01.002"},{"key":"e_1_3_2_1_22_1","volume-title":"Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem. 24th USENIX Security SymposiumAugust","author":"Soska Kyle","year":"2015"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Marie\u00a0Claire Van Hout and Tim Bingham. 2013. \u2019Silk Road\u2019 the virtual drug marketplace: A single case study of user experiences. 385\u2013391\u00a0pages. https:\/\/doi.org\/10.1016\/j.drugpo.2013.01.005 Marie\u00a0Claire Van Hout and Tim Bingham. 2013. \u2019Silk Road\u2019 the virtual drug marketplace: A single case study of user experiences. 385\u2013391\u00a0pages. https:\/\/doi.org\/10.1016\/j.drugpo.2013.01.005","DOI":"10.1016\/j.drugpo.2013.01.005"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/3277203.3277279"},{"key":"e_1_3_2_1_25_1","volume-title":"Evolution of the Darknet Workshop at the Web Science Conference (WebSci 18)","author":"van Wegberg R.S.","year":"2018"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10610-017-9336-3"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","first-page":"1387","DOI":"10.1111\/j.1556-4029.2008.00873.x","article-title":"Toward a Quantitative Typology of Burglars: A Latent Profile Analysis of Career Offenders","volume":"53","author":"Vaughn G.","year":"2008","journal-title":"Journal of Forensic Sciences"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2008.10.014"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"J.K. Vermunt and J. Magidson. 2002. Latent class cluster analysis. In Applied latent class analysis J.\u00a0Hagenaars and A.\u00a0McCutcheon (Eds.). Cambridge University Press United Kingdom 89\u2013106. Pagination: 476. J.K. Vermunt and J. Magidson. 2002. Latent class cluster analysis. In Applied latent class analysis J.\u00a0Hagenaars and A.\u00a0McCutcheon (Eds.). Cambridge University Press United Kingdom 89\u2013106. Pagination: 476.","DOI":"10.1017\/CBO9780511499531.004"},{"key":"e_1_3_2_1_30_1","unstructured":"J.K. Vermunt and J. Magidson. 2016. Guide for Latent GOLD 5.1: Basic Advanced and Syntax. Technical Report. Statistical Innovations Inc. Belmont MA. J.K. Vermunt and J. Magidson. 2016. Guide for Latent GOLD 5.1: Basic Advanced and Syntax. Technical Report. Statistical Innovations Inc. Belmont MA."}],"event":{"name":"WWW '20: The Web Conference 2020","location":"Taipei Taiwan","acronym":"WWW '20","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of The Web Conference 2020"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366423.3380162","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3366423.3380162","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:00Z","timestamp":1750199580000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366423.3380162"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,20]]},"references-count":30,"alternative-id":["10.1145\/3366423.3380162","10.1145\/3366423"],"URL":"https:\/\/doi.org\/10.1145\/3366423.3380162","relation":{},"subject":[],"published":{"date-parts":[[2020,4,20]]},"assertion":[{"value":"2020-04-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}