Works matching DE "CYBERCRIMINALS"


Results: 286
    1
    2
    3
    4

    Fortifying Email Security: A Machine Learning Approach.

    Published in:
    Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 3772
    By:
    • Begum, Shaik Salma;
    • Pavani, Ananta;
    • Naidu, Gedela Narasimha;
    • Sandeep, Gonela;
    • Pavan, Devu
    Publication type:
    Article
    5

    Risikofaktor Mensch.

    Published in:
    IM + io, 2023, n. 3, p. 12
    By:
    • Scheer, August-Wilhelm
    Publication type:
    Article
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24

    AN EXTENSIVE OVERVIEW ON DARK WEB.

    Published in:
    i-Manager's Journal on Digital Forensics & Cyber Security (JDF), 2023, v. 1, n. 2, p. 36, doi. 10.26634/jdf.1.2.19459
    By:
    • BHAWNA;
    • SINGH, BISMAN
    Publication type:
    Article
    25
    26

    Study of social engineering attacks in Romania 2019.

    Published in:
    Scientific Bulletin 'Mircea cel Batran' Naval Academy, 2020, v. 23, n. 1, p. 263, doi. 10.21279/1454-864X-20-I1-037
    By:
    • MOINESCU, Radu;
    • RĂCUCIU, Ciprian;
    • EFTIMIE, Sergiu;
    • GLĂVAN, Dragoş
    Publication type:
    Article
    28

    Social Media and Terrorism.

    Published in:
    AARMS: Academic & Applied Research in Military & Public Management Science, 2018, v. 17, n. 3, p. 47, doi. 10.32565/aarms.2018.3.3
    By:
    • BÁNYÁSZ, Péter
    Publication type:
    Article
    29

    Combating Cyber Crime.

    Published in:
    AARMS: Academic & Applied Research in Military & Public Management Science, 2018, v. 17, n. 3, p. 19, doi. 10.32565/aarms.2018.3.2
    By:
    • ANTOLIŠ, Krunoslav;
    • VARJAČĆ, Ivancica;
    • JELENSKI, Mario
    Publication type:
    Article
    30
    31
    32
    33
    34
    35
    36
    37
    38

    Profiling Cybercriminals.

    Published in:
    Social Science Computer Review, 2018, v. 36, n. 5, p. 591, doi. 10.1177/0894439317730296
    By:
    • Kigerl, Alex
    Publication type:
    Article
    39
    40
    41
    42
    43
    44
    45
    46

    Is Cyber Strategy Possible?

    Published in:
    Washington Quarterly, 2019, v. 42, n. 1, p. 131, doi. 10.1080/0163660X.2019.1593665
    By:
    • Hoffman, Wyatt
    Publication type:
    Article
    47
    48
    49
    50