Works matching DE "CYBERCRIMINALS"
1
- International Journal of Legal Information, 2019, v. 47, n. 2, p. 70, doi. 10.1017/jli.2019.22
- Article
2
- Maryland Law Review, 2023, v. 82, n. 4, p. 1001
- Article
3
- IM + io, 2023, n. 3, p. 12
- Article
4
- International Journal on Criminology, 2016, v. 4, n. 1, p. 33, doi. 10.18278/ijc.4.1.2
- Article
5
- Seybold Report: Analyzing Publishing Technologies, 2022, v. 22, n. 2, p. 2
- Article
6
- Engineering, Technology & Applied Science Research, 2024, v. 14, n. 6, p. 17599, doi. 10.48084/etasr.8195
- Article
7
- Engineering, Technology & Applied Science Research, 2021, v. 11, n. 6, p. 7944, doi. 10.48084/etasr.4600
- Article
8
- Journal of Software: Evolution & Process, 2024, v. 36, n. 8, p. 1, doi. 10.1002/smr.2651
- Nabi, Maria;
- Ilyas, Muhammad;
- Ahmad, Jamil
- Article
9
- Revista Logos Ciencia & Tecnologia, 2023, v. 15, n. 2, p. 162, doi. 10.22335/rlct.v15i2.1768
- Toro-Álvarez, Marlon Mike
- Article
10
- Religions, 2019, v. 10, n. 3, p. 146, doi. 10.3390/rel10030146
- Article
11
- British Journal of Criminology, 2023, v. 63, n. 2, p. 384, doi. 10.1093/bjc/azac021
- Cook, Steven;
- Giommoni, Luca;
- Pareja, Nicolas Trajtenberg;
- Levi, Michael;
- Williams, Matthew L
- Article
12
- British Journal of Criminology, 2021, v. 61, n. 5, p. 1407, doi. 10.1093/bjc/azab026
- Collier, Ben;
- Clayton, Richard;
- Hutchings, Alice;
- Thomas, Daniel
- Article
13
- British Journal of Criminology, 2017, v. 57, n. 3, p. 704, doi. 10.1093/bjc/azw009
- LEUKFELDT, E. RUTGER;
- KLEEMANS, EDWARD R.;
- STOL, WOUTER P.
- Article
14
- International Journal of Next-Generation Computing, 2020, v. 11, n. 1, p. 1
- K. J., Latesh Kumar;
- H. U., Leena
- Article
15
- Science & Military Journal, 2014, v. 9, n. 1, p. 63
- Article
16
- Risk Management & Insurance Review, 2018, v. 21, n. 3, p. 435, doi. 10.1111/rmir.12109
- Marotta, Angelica;
- McShane, Michael
- Article
17
- Publishing Research Quarterly, 2017, v. 33, n. 2, p. 183, doi. 10.1007/s12109-017-9509-4
- Dadkhah, Mehdi;
- Borchardt, Glenn;
- Lagzian, Mohammad;
- Bianciardi, Giorgio
- Article
18
- i-Manager's Journal on Digital Forensics & Cyber Security (JDF), 2023, v. 1, n. 2, p. 36, doi. 10.26634/jdf.1.2.19459
- Article
19
- European Law Enforcement Research Bulletin, 2021, n. 21, p. 81
- Wright, David;
- Garstka, Krzysztof;
- Kumar, Richa
- Article
21
- AARMS: Academic & Applied Research in Military & Public Management Science, 2018, v. 17, n. 3, p. 47, doi. 10.32565/aarms.2018.3.3
- Article
22
- AARMS: Academic & Applied Research in Military & Public Management Science, 2018, v. 17, n. 3, p. 19, doi. 10.32565/aarms.2018.3.2
- ANTOLIŠ, Krunoslav;
- VARJAČĆ, Ivancica;
- JELENSKI, Mario
- Article
23
- Horizons Series A, 2021, v. 29, p. 239, doi. 10.20544/HORIZONS.A.29.2.21.P20
- Nikoloska, Svetlana;
- Gjosheva-Krsteski, Marija
- Article
24
- International Journal of Network Management, 2018, v. 28, n. 5, p. 1, doi. 10.1002/nem.2038
- Molina Zarca, Alejandro;
- Bernal Bernabe, Jorge;
- Farris, Ivan;
- Khettab, Yacine;
- Taleb, Tarik;
- Skarmeta, Antonio
- Article
25
- Trípodos, 2016, n. 39, p. 13
- Belim, Célia;
- Garcia, Helena
- Article
26
- Social Science Computer Review, 2022, v. 40, n. 4, p. 892, doi. 10.1177/0894439321994623
- Dupont, Benoît;
- Lusthaus, Jonathan
- Article
27
- Social Science Computer Review, 2018, v. 36, n. 5, p. 591, doi. 10.1177/0894439317730296
- Article
28
- Journal of Tax Practice & Procedure, 2017, v. 19, n. 3, p. 43
- Article
29
- Washington Quarterly, 2020, v. 43, n. 2, p. 159, doi. 10.1080/0163660X.2020.1770970
- Article
30
- Washington Quarterly, 2019, v. 42, n. 1, p. 131, doi. 10.1080/0163660X.2019.1593665
- Article
31
- Chicago Journal of International Law, 2023, v. 24, n. 1, p. 187
- Article
32
- Chicago Journal of International Law, 2023, v. 23, n. 2, p. 187
- Article
33
- Law & World, 2024, v. 10, n. 2, p. 193, doi. 10.36475/10.2.14
- Article
34
- FUPRE Journal of Scientific & Industrial Research, 2024, v. 8, n. 4, p. 352
- EDJE, E. A.;
- EDE, H. E.;
- OMEDE, E. U.;
- ATONUJE, E.;
- OGEH, C.
- Article
35
- Police Practice & Research, 2018, v. 19, n. 6, p. 582, doi. 10.1080/15614263.2018.1507895
- Cai, Tianji;
- Du, Li;
- Xin, Yanyu;
- Chang, Lennon Y.C.
- Article
36
- Police Practice & Research, 2016, v. 17, n. 2, p. 183, doi. 10.1080/15614263.2015.1128163
- Article
37
- Ecomomic Review / Ekonomické Rozhl'ady, 2018, v. 47, n. 4, p. 491
- OOGARAH-HANUMAN, VANISHA;
- LI LUEN CHING, YANNI CK;
- PATWAN, ANNICK YEUNG;
- CHETTY, DAREN
- Article
38
- European Journal on Criminal Policy & Research, 2016, v. 22, n. 1, p. 127, doi. 10.1007/s10610-015-9277-7
- Rashkovski, Dragi;
- Naumovski, Vasko;
- Naumovski, Goce
- Article
39
- Coastal Business Journal, 2021, v. 18, n. 1, p. 21
- Article
40
- Plans & Trusts, 2019, v. 37, n. 3, p. 8
- Lye, Rishan;
- Rizek, Bishara;
- Veld, David
- Article
41
- Library Philosophy & Practice, 2020, p. 1
- Kalu, Chidi Onuoha;
- Chidi-Kalu, Esther I.;
- Okidi, Ijeoma Ann Achi;
- Usiedo, Blessing Anegbemente
- Article
42
- Telecommunication Systems, 2018, v. 69, n. 3, p. 365, doi. 10.1007/s11235-018-0437-1
- Laka, Pawel;
- Mazurczyk, Wojciech
- Article
43
- Information (2078-2489), 2024, v. 15, n. 1, p. 27, doi. 10.3390/info15010027
- Alawida, Moatsum;
- Abu Shawar, Bayan;
- Abiodun, Oludare Isaac;
- Mehmood, Abid;
- Omolara, Abiodun Esther;
- Al Hwaitat, Ahmad K.
- Article
44
- EURASIP Journal on Information Security, 2014, v. 2014, n. 1, p. 1, doi. 10.1186/s13635-014-0014-4
- Drew, Jake M.;
- Moore, Tyler
- Article
45
- Information Security Journal: A Global Perspective, 2017, v. 26, n. 3, p. 105, doi. 10.1080/19393555.2017.1308583
- Article
46
- Information Security Journal: A Global Perspective, 2015, v. 24, n. 4-6, p. 79, doi. 10.1080/19393555.2015.1058994
- Article
47
- Information Security Journal: A Global Perspective, 2014, v. 23, n. 4-6, p. 172, doi. 10.1080/19393555.2014.931491
- Article
48
- Journal of Applied Security Research, 2019, v. 14, n. 1, p. 106, doi. 10.1080/19361610.2019.1545278
- Omotosho, Adebayo;
- Ayemlo Haruna, Benjamin;
- Mikail Olaniyi, Olayemi
- Article
49
- Journal of Applied Security Research, 2018, v. 13, n. 3, p. 267, doi. 10.1080/19361610.2018.1463133
- Article
50
- California Western Law Review, 2024, v. 61, n. 1, p. 43
- PHILLIPS, JuSTINE;
- TOLTZIS, AVI;
- FANOUS, VICTORIA;
- LALSINGHANI, GAURAV
- Article