Deliverables Demonstrators, pilots, prototypes (4) Optimal model system A system that, given the characteristics of a particular malware, will compute how close it is to the optimal model and estimate its maximum profitability, and the threat it poses. Training session 1 A First Training Session will be held to share the training modules with the project partners responsible for the validation. Project website Project website up and running since the beginning of the project updated regularly Training session 2 The targets of the second training session will be students at police colleges/academies and experienced police officers actively engaged in Internet forensics who can function as trainers and facilitators at their home organizations. Documents, reports (13) Design of the analysis system and specifications This report will present the functional requirements and the technical specification derived from them. Ethical and privacy monitoring and evaluation of RAMSES platform Report on ethical and privacy considerations. Final report on other cryptocurrencies This report will collect both the analysis on the usage of alternate cryptocurrencies in cybercrime, and the data and insights gained by applying the methodologies we developed for Bitcoin to other relevant cryptocurrencies. Ethical Protocol Internal Protocol for ethical procedures for the consortium to follow with regards to ensuring adequate ethical standards are met and that data protection measures are taken. Social and ethical implications of digital surveillance A concise briefing paper for Law Enforcement Agencies to inform them of the various social and ethical implications of digital surveillance practices within forensic investigation online. Economic improvements over the existing models Report detailing all possible economic improvements over the existing models Dissemination materials and final report A collection of the dissemination materials such as the project brochure, publications of the project results and the presentations at the conferences and at the other forums. Each material will be made available throughout the project at different times, although a compilation will be provided at the end. Besides, a final report will be prepared that will include detailed information on the procedures and the outcomes of the project. This final report will be published as a hard copy and be made available in digital format. Along with the final report, a conference will be organized to expose the results of the project to the relevant audience and stakeholders. Establishment of RAMSES Advisory Board and sub committees Report with the Sub Committees members Training material and plan of training sessions for law enforcement agents Digital training materials will facilitate practice and revision through e-learning platforms, both before and after the training sessions. Stakeholders identification and liaison activities A report on the stakeholders and the liaison activities with other relevant European projects and initiatives. Findings on economic modelling of malware as a business model Report with findings on economic modelling of malware as a business model. Report on the use and prevalence of image and video steganography over Social Media Report on the use and prevalence of image and video steganography over Social Media Overview of existing approaches and best practices for digital surveillance by Law Enforcement Agencies Overview on current knowledge and best practices for digital surveillance by LEAs. Publications Other (5) Economic Analysis of Ransomware Author(s): Julio Hernandez-Castro, Edward Cartwright, and Anna Stepanova Published in: Issue 20. March 2017, 2017 Publisher: University of Kent EU-Projekt RAMSES: Internetbetrug effektiv bekämpfen Author(s): Holger Nitsch, Sarina Ronert Published in: Europa in Reichweite Die Bayerische Forschungsallianz stellt sich vor, Issue 2017, 2017, Page(s) 20 Publisher: Bayerisyche Forschungsallianz GmbH Economic analysis reveals cyber-criminals make bad business People. Author(s): Max Metzger Published in: SC Cybercrime, Issue 31. May 2017, 2017 Publisher: SC Media UK An Analysis of Bitcoin Laundry Services Author(s): Thibault de Balthasar Julio Hernandez-Castro Published in: Nordic Conference on Secure IT Systems, Issue November 2017, 2017, Page(s) 297-312 Publisher: Springer A Supervised Auto-Tuning Approach for a Banking Fraud Detection System Author(s): Michele Carminati, Luca Valentini, Stefano Zanero Published in: Cyber Security Cryptography and Machine Learning, Issue Vol. 10332, 2017, Page(s) 215-233 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-60080-2_17 Peer reviewed articles (7) Online masquerade detection resistant to mimicry Author(s): Jorge Maestre Vidal, Ana Lucila Sandoval Orozco, Luis Javier García Villalba Published in: Expert Systems with Applications, Issue Volume 61, 1. November 2016, 2017, Page(s) 162-180, ISSN 0957-4174 Publisher: Pergamon Press Ltd. An algorithm to find relationships between web vulnerabilities Author(s): Román Muñoz, Fernando & García Villalba, Luis. Published in: The Journal of Supercomputing, 2018, ISSN 1573-0484 Publisher: Springer Enlargement of Vulnerable Web Applications for Testing Author(s): Fernando Román Muñoz, Iván Israel Sabido Cortes, Luis Javier García Villalba Published in: The Journal of Supercomputing, 2017, Page(s) 1-20, ISSN 0920-8542 Publisher: Kluwer Academic Publishers Analyzing the traffic of penetration testing tools with an IDS Author(s): Fernando Román Muñoz, Esteban Alejandro Armas Vega, Luis Javier García Villalba Published in: The Journal of Supercomputing, 2016, Page(s) 1-16, ISSN 0920-8542 Publisher: Kluwer Academic Publishers Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks Author(s): Javier Portela, Luis García Villalba, Alejandra Silva Trujillo, Ana Sandoval Orozco, Tai-Hoon Kim Published in: Sensors, Issue 16/11, 2016, Page(s) 1832, ISSN 1424-8220 Publisher: Multidisciplinary Digital Publishing Institute (MDPI) DOI: 10.3390/s16111832 Certifiably Biased: An In-Depth Analysis of a Common Criteria EAL4+ Certified TRNG Author(s): Darren Hurley-Smith, Julio Hernandez-Castro Published in: IEEE Transactions on Information Forensics and Security, Issue 13/4, 2018, Page(s) 1031-1041, ISSN 1556-6013 Publisher: Institute of Electrical and Electronics Engineers DOI: 10.1109/TIFS.2017.2777342 Security Evaluation of a Banking Fraud Analysis System Author(s): Michele Carminati, Mario Polino, Andrea Continella, Andrea Lanzi, Federico Maggi, Stefano Zanero Published in: ACM Transactions on Privacy and Security, Issue 21/3, 2018, Page(s) 1-31, ISSN 2471-2566 Publisher: ACM Transactions on Privacy and Security (TOPS) DOI: 10.1145/3178370 Searching for OpenAIRE data... There was an error trying to search data from OpenAIRE No results available