Works matching DE "CYBERCRIMINALS"
Results: 292
National Cyber Governance Awareness Policy and Framework.
- Published in:
- International Journal of Legal Information, 2019, v. 47, n. 2, p. 70, doi. 10.1017/jli.2019.22
- By:
- Publication type:
- Article
CYBERSECURITY AND DATA BREACH HARMS: THEORY AND REALITY.
- Published in:
- Maryland Law Review, 2023, v. 82, n. 4, p. 1001
- By:
- Publication type:
- Article
Enhancement of Security and Performance in Cryptography during Implication of Intrusion Detection System.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 5470
- By:
- Publication type:
- Article
Fortifying Email Security: A Machine Learning Approach.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 3772
- By:
- Publication type:
- Article
Risikofaktor Mensch.
- Published in:
- IM + io, 2023, n. 3, p. 12
- By:
- Publication type:
- Article
The Use of Social Networks by Criminal Gangs.
- Published in:
- International Journal on Criminology, 2016, v. 4, n. 1, p. 33, doi. 10.18278/ijc.4.1.2
- By:
- Publication type:
- Article
FBI Warns Public Cybercriminals Using QR Codes to Steal and Spread Malware.
- Published in:
- Seybold Report: Analyzing Publishing Technologies, 2022, v. 22, n. 2, p. 2
- Publication type:
- Article
SMART Model: A Robust Approach for Cyber Criminal Identification using Smartphone Data.
- Published in:
- Engineering, Technology & Applied Science Research, 2024, v. 14, n. 6, p. 17599, doi. 10.48084/etasr.8195
- By:
- Publication type:
- Article
Anti-Phishing Awareness Delivery Methods .
- Published in:
- Engineering, Technology & Applied Science Research, 2021, v. 11, n. 6, p. 7944, doi. 10.48084/etasr.4600
- By:
- Publication type:
- Article
Challenges and solutions in the development of blockchain applications: Extraction from SLR and empirical study.
- Published in:
- Journal of Software: Evolution & Process, 2024, v. 36, n. 8, p. 1, doi. 10.1002/smr.2651
- By:
- Publication type:
- Article
El control del cibercrimen. Análisis exploratorio de sentencias y medidas de supervisión.
- Published in:
- Revista Logos Ciencia & Tecnologia, 2023, v. 15, n. 2, p. 162, doi. 10.22335/rlct.v15i2.1768
- By:
- Publication type:
- Article
Where Is the Money? The Intersectionality of the Spirit World and the Acquisition of Wealth.
- Published in:
- Religions, 2019, v. 10, n. 3, p. 146, doi. 10.3390/rel10030146
- By:
- Publication type:
- Article
Fear of Economic Cybercrime Across Europe: A Multilevel Application of Routine Activity Theory.
- Published in:
- British Journal of Criminology, 2023, v. 63, n. 2, p. 384, doi. 10.1093/bjc/azac021
- By:
- Publication type:
- Article
Cybercrime is (often) boring: Infrastructure and alienation in a deviant subculture.
- Published in:
- British Journal of Criminology, 2021, v. 61, n. 5, p. 1407, doi. 10.1093/bjc/azab026
- By:
- Publication type:
- Article
CYBERCRIMINAL NETWORKS, SOCIAL TIES AND ONLINE FORUMS: SOCIAL TIES VERSUS DIGITAL TIES WITHIN PHISHING AND MALWARE NETWORKS.
- Published in:
- British Journal of Criminology, 2017, v. 57, n. 3, p. 704, doi. 10.1093/bjc/azw009
- By:
- Publication type:
- Article
Pre-Encryption Ransomware Detection (PERD) Taxonomy, and Research Directions: Systematic Literature Review.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 9, p. 165, doi. 10.14569/ijacsa.2024.0150917
- By:
- Publication type:
- Article
A Comprehensive Analysis of Network Security Attack Classification using Machine Learning Algorithms.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 4, p. 1269, doi. 10.14569/ijacsa.2024.01504127
- By:
- Publication type:
- Article
Enhancing Cryptojacking Detection Through Hybrid Black Widow Optimization and Generative Adversarial Networks.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 3, p. 871, doi. 10.14569/ijacsa.2024.0150387
- By:
- Publication type:
- Article
NGEN Firewall Security Augmentation using Brooks-Iyengar and Random Forest Classfier method: by Predicting Cyber Threats from: Darkweb/Deepweb Data.
- Published in:
- International Journal of Next-Generation Computing, 2020, v. 11, n. 1, p. 1
- By:
- Publication type:
- Article
MODELLING OF THE INVESTIGATION OF CYBERCRIME.
- Published in:
- Science & Military Journal, 2014, v. 9, n. 1, p. 63
- By:
- Publication type:
- Article
DENIAL OF SERVICE ATTACKS USING THE EXAMPLE OF CROATIAN HOSTERS.
- Published in:
- Annals of DAAAM & Proceedings, 2023, v. 34, p. 88, doi. 10.2507/34th.daaam.proceedings.013
- By:
- Publication type:
- Article
Integrating a Proactive Technique Into a Holistic Cyber Risk Management Approach.
- Published in:
- Risk Management & Insurance Review, 2018, v. 21, n. 3, p. 435, doi. 10.1111/rmir.12109
- By:
- Publication type:
- Article
Academic Journals Plagued by Bogus Impact Factors.
- Published in:
- Publishing Research Quarterly, 2017, v. 33, n. 2, p. 183, doi. 10.1007/s12109-017-9509-4
- By:
- Publication type:
- Article
AN EXTENSIVE OVERVIEW ON DARK WEB.
- Published in:
- i-Manager's Journal on Digital Forensics & Cyber Security (JDF), 2023, v. 1, n. 2, p. 36, doi. 10.26634/jdf.1.2.19459
- By:
- Publication type:
- Article
RISING TO THE PROLIFERATION OF CYBERCRIME CHALLENGING LAW ENFORCEMENT AGENCIES ACROSS EUROPE.
- Published in:
- European Law Enforcement Research Bulletin, 2021, n. 21, p. 81
- By:
- Publication type:
- Article
Study of social engineering attacks in Romania 2019.
- Published in:
- Scientific Bulletin 'Mircea cel Batran' Naval Academy, 2020, v. 23, n. 1, p. 263, doi. 10.21279/1454-864X-20-I1-037
- By:
- Publication type:
- Article
Germany ∙ Recent Decisions from German Courts in Facebook Scraping Cases: Compensation of Non-Material Damages or Not?
- Published in:
- 2023
- By:
- Publication type:
- Report
Social Media and Terrorism.
- Published in:
- AARMS: Academic & Applied Research in Military & Public Management Science, 2018, v. 17, n. 3, p. 47, doi. 10.32565/aarms.2018.3.3
- By:
- Publication type:
- Article
Combating Cyber Crime.
- Published in:
- AARMS: Academic & Applied Research in Military & Public Management Science, 2018, v. 17, n. 3, p. 19, doi. 10.32565/aarms.2018.3.2
- By:
- Publication type:
- Article
CHARACTERISTICS AND TECHNIQUES OF CRIMINAL INVESTIGATION OF COMPUTER FINANCIAL CRIME.
- Published in:
- Horizons Series A, 2021, v. 29, p. 239, doi. 10.20544/HORIZONS.A.29.2.21.P20
- By:
- Publication type:
- Article
Data Privacy Rights and Bankers’ Business Interests in Nigeria: Reflections on Opportunities, Challenges and Legal Reforms.
- Published in:
- Malaysian Journal of Law & Society, 2022, v. 30, p. 3, doi. 10.17576/juum-2022-30-01
- By:
- Publication type:
- Article
Botnet detection based on network flow summary and deep learning.
- Published in:
- International Journal of Network Management, 2018, v. 28, n. 6, p. N.PAG, doi. 10.1002/nem.2039
- By:
- Publication type:
- Article
Enhancing IoT security through network softwarization and virtual security appliances.
- Published in:
- International Journal of Network Management, 2018, v. 28, n. 5, p. 1, doi. 10.1002/nem.2038
- By:
- Publication type:
- Article
A collaborative policy-based security scheme to enforce resource access controlling mechanism.
- Published in:
- Wireless Networks (10220038), 2020, v. 26, n. 4, p. 2537, doi. 10.1007/s11276-019-01984-x
- By:
- Publication type:
- Article
Psychological Insights into the Behavior of Cybercriminals: A Theoretical Perspective.
- Published in:
- Pakistan Journal of Criminology, 2024, v. 16, n. 2, p. 263, doi. 10.62271/pjc.16.2.263.276
- By:
- Publication type:
- Article
'To Be, or Not To Be a Cyberterrorist', That Is the Question! The Political Communication of al-Qaeda and Islamic State on Social Networks.
- Published in:
- Trípodos, 2016, n. 39, p. 13
- By:
- Publication type:
- Article
Countering Distrust in Illicit Online Networks: The Dispute Resolution Strategies of Cybercriminals.
- Published in:
- Social Science Computer Review, 2022, v. 40, n. 4, p. 892, doi. 10.1177/0894439321994623
- By:
- Publication type:
- Article
Profiling Cybercriminals.
- Published in:
- Social Science Computer Review, 2018, v. 36, n. 5, p. 591, doi. 10.1177/0894439317730296
- By:
- Publication type:
- Article
5G and GDPR can be boon to cybercriminals, says GlobalData.
- Published in:
- ComputerWorld Hong Kong, 2018, p. 58
- Publication type:
- Article
INTERPOL: AI will change cybersecurity landscape in a few years.
- Published in:
- ComputerWorld Hong Kong, 2016, p. 88
- By:
- Publication type:
- Article
Cybercriminals target user systems.
- Published in:
- ComputerWorld Hong Kong, 2015, p. 20
- Publication type:
- Article
Security 2013: how bad is it? Let's all count: 1-2-3-4-5-6...
- Published in:
- ComputerWorld Hong Kong, 2013, p. 47
- By:
- Publication type:
- Article
Preventing and Minimizing the Effects of a Data Breach.
- Published in:
- Journal of Tax Practice & Procedure, 2017, v. 19, n. 6, p. 17
- By:
- Publication type:
- Article
IRS Website Tools for Tax Practitioners.
- Published in:
- Journal of Tax Practice & Procedure, 2017, v. 19, n. 3, p. 43
- By:
- Publication type:
- Article
A Strategic Cyber No-First-Use Policy? Addressing the US Cyber Strategy Problem.
- Published in:
- Washington Quarterly, 2020, v. 43, n. 2, p. 159, doi. 10.1080/0163660X.2020.1770970
- By:
- Publication type:
- Article
Is Cyber Strategy Possible?
- Published in:
- Washington Quarterly, 2019, v. 42, n. 1, p. 131, doi. 10.1080/0163660X.2019.1593665
- By:
- Publication type:
- Article
The Honeypot Stings Back: Entrapment in the Age of Cybercrime and a Proposed Pathway Forward.
- Published in:
- Chicago Journal of International Law, 2023, v. 24, n. 1, p. 187
- By:
- Publication type:
- Article
The Honeypot Stings Back: Entrapment in the Age of Cybercrime and a Proposed Pathway Forward.
- Published in:
- Chicago Journal of International Law, 2023, v. 23, n. 2, p. 187
- By:
- Publication type:
- Article
COMMERCE IN THE SHADOWS: OMMERCE IN THE SHADOWS: EXPLORING DARK WEB XPLORING DARK WEB BLACK MARKETS.
- Published in:
- Law & World, 2024, v. 10, n. 2, p. 193, doi. 10.36475/10.2.14
- By:
- Publication type:
- Article
Anomaly-based Intrusion Detection Techniques in Internet of Things Ecosystem: A Review.
- Published in:
- FUPRE Journal of Scientific & Industrial Research, 2024, v. 8, n. 4, p. 352
- By:
- Publication type:
- Article