Works matching DE "COMPUTER crimes"
Results: 3022
Criminal Investigation of Advance Fee Fraud.
- Published in:
- Journal of Criminal Investigation & Criminology / Revija za Kriminalistiko in Kriminologijo, 2013, v. 64, n. 2, p. 1
- By:
- Publication type:
- Article
Internetna študija poznavanja kibernetskih groženj in strahu pred kibernetsko kriminaliteto.
- Published in:
- Journal of Criminal Investigation & Criminology / Revija za Kriminalistiko in Kriminologijo, 2011, v. 62, n. 3, p. 242
- By:
- Publication type:
- Article
Uporaba interneta v teroristične namene.
- Published in:
- Journal of Criminal Investigation & Criminology / Revija za Kriminalistiko in Kriminologijo, 2009, v. 60, n. 3, p. 211
- By:
- Publication type:
- Article
Virtualnost, (ne)moralnost in škodljivost: normativna vprašanja nekaterih oblik kibernetične kriminalitete.
- Published in:
- Journal of Criminal Investigation & Criminology / Revija za Kriminalistiko in Kriminologijo, 2009, v. 60, n. 3, p. 191
- By:
- Publication type:
- Article
Kriminaliteta v letu 2007.
- Published in:
- Journal of Criminal Investigation & Criminology / Revija za Kriminalistiko in Kriminologijo, 2008, v. 59, n. 2, p. 99
- By:
- Publication type:
- Article
Fear of Cybercrime in Europe: Examining the Effects of Victimization and Vulnerabilities.
- Published in:
- Psychiatry, Psychology & Law, 2017, v. 24, n. 3, p. 323, doi. 10.1080/13218719.2017.1315785
- By:
- Publication type:
- Article
National Cyber Governance Awareness Policy and Framework.
- Published in:
- International Journal of Legal Information, 2019, v. 47, n. 2, p. 70, doi. 10.1017/jli.2019.22
- By:
- Publication type:
- Article
Policy Development and Frameworks for Cyber Security in Corporates and Law Firms.
- Published in:
- International Journal of Legal Information, 2018, v. 46, n. 3, p. 137, doi. 10.1017/jli.2018.41
- By:
- Publication type:
- Article
Hacker Trading.
- Published in:
- Style, 1999, v. 33, n. 2, p. 283
- By:
- Publication type:
- Article
Anonymous in Portmanteaupia.
- Published in:
- Social Alternatives, 2012, v. 31, n. 2, p. 27
- By:
- Publication type:
- Article
Lawless: The Secret Rules That Govern Our Digital Lives.
- Published in:
- 2020
- By:
- Publication type:
- Book Review
Hate Crimes in Cyberspace. Cambridge.
- Published in:
- 2015
- By:
- Publication type:
- Book Review
Internet Crimes, Torts and Scams: Investigation and Remedies.
- Published in:
- 2010
- By:
- Publication type:
- Book Review
Online Grooming: Factores de Riesgo y Modus Operandi a Partir de un Análisis de Sentencias Españolas.
- Published in:
- Anuario de Psicología Jurídica, 2024, v. 34, n. 1, p. 119, doi. 10.5093/apj2023a9
- By:
- Publication type:
- Article
The security of machine learning.
- Published in:
- Machine Learning, 2010, v. 81, n. 2, p. 121, doi. 10.1007/s10994-010-5188-5
- By:
- Publication type:
- Article
Assessing the Links of Sexting, Cybervictimization, Depression, and Suicidal Ideation Among University Students.
- Published in:
- 2018
- By:
- Publication type:
- journal article
Potential cyberterrorism via a multimedia smart phone based on a web 2.0 application via ubiquitous Wi- Fi access points and the corresponding digital forensics.
- Published in:
- Multimedia Systems, 2011, v. 17, n. 4, p. 341, doi. 10.1007/s00530-010-0216-7
- By:
- Publication type:
- Article
Feature Selection Based Correlation Attack on HTTPS Secure Searching.
- Published in:
- Wireless Personal Communications, 2018, v. 103, n. 4, p. 2995, doi. 10.1007/s11277-018-5989-6
- By:
- Publication type:
- Article
Performance Comparison and Detection Analysis in Snort and Suricata Environment.
- Published in:
- Wireless Personal Communications, 2017, v. 94, n. 2, p. 241, doi. 10.1007/s11277-016-3209-9
- By:
- Publication type:
- Article
Secure Provenance for Data Forensics with Efficient Revocation of Anonymous Credentials in Cloud Computing.
- Published in:
- Wireless Personal Communications, 2016, v. 90, n. 3, p. 1497, doi. 10.1007/s11277-016-3406-6
- By:
- Publication type:
- Article
An Ontology-driven Model for Digital Forensics Investigations of Computer Incidents under the Ubiquitous Computing Environments.
- Published in:
- Wireless Personal Communications, 2011, v. 56, n. 1, p. 5, doi. 10.1007/s11277-009-9886-x
- By:
- Publication type:
- Article
The future of cryptocurrencies: Bitcoin and beyond.
- Published in:
- Nature, 2015, v. 526, n. 7571, p. 21, doi. 10.1038/526021a
- By:
- Publication type:
- Article
القرصنة الإلكترونية على مواقع الإنترنت دراسة تطبيقية على عينة من مواقع مرافق المعلومات المصرية.
- Published in:
- Egyptian Journal of Information Sciences, 2023, v. 10, n. 2, p. 32
- By:
- Publication type:
- Article
Perundungan di Dunia Maya sebagai Perilaku Menyimpang: Analisis Isi Komentar dalam Konten Youtube Keke Bukan Boneka pada Kanal Rahmawati Kekeyi Putri Cantikka.
- Published in:
- Jurnal Kawistara, 2022, v. 12, n. 2, p. 243, doi. 10.22146/kawistara.72335
- By:
- Publication type:
- Article
Criminalizing Cybercrimes: Italian and Polish Experiences.
- Published in:
- Bialystok Legal Studies / Bialostockie Studia Prawnicze, 2021, v. 26, n. 3, p. 171, doi. 10.15290/bsp.2021.26.03.09
- By:
- Publication type:
- Article
Improving Intrusion Detection in UAV Communication Using an LSTM-SMOTE Classification Method.
- Published in:
- Journal of Cybersecurity (2579-0072), 2022, v. 4, n. 4, p. 287, doi. 10.32604/jcs.2023.042486
- By:
- Publication type:
- Article
Phishing Attacks in Social Engineering: A Review.
- Published in:
- Journal of Cybersecurity (2579-0072), 2022, v. 4, n. 4, p. 239, doi. 10.32604/jcs.2023.041095
- By:
- Publication type:
- Article
Discovering the Common Traits of Cybercrimes in Pakistan Using Associative Classification with Ant Colony Optimization.
- Published in:
- Journal of Cybersecurity (2579-0072), 2022, v. 4, n. 4, p. 201, doi. 10.32604/jcs.2022.038791
- By:
- Publication type:
- Article
CRIMINAL INVESTIGATION OF CYBER CRIME.
- Published in:
- Criminalistic Theory & Practice / Kriminalistička Teorija & Praksa, 2020, v. 13, n. 1, p. 72
- By:
- Publication type:
- Article
Guidelines and Resources for Conducting an Environmental Crime Investigation in the United States
- Published in:
- 2002
- By:
- Publication type:
- Editorial
ARTIFICIAL INTELLIGENCE IN CYBERSECURITY: EXAMINING LIABILITY, CRIME DYNAMICS, AND PREVENTIVE STRATEGIES.
- Published in:
- EU & Comparative Law Issues & Challenges Series (ECLIC), 2024, n. 8, p. 730
- By:
- Publication type:
- Article
FORENSE DIGITAL APLICADA AO COMBATE DE CRIMES CIBERNÉTICOS: UMA REVISÃO.
- Published in:
- Revista Foco (Interdisciplinary Studies Journal), 2024, v. 17, n. 7, p. 1, doi. 10.54751/revistafoco.v17n7-152
- By:
- Publication type:
- Article
A CRIMINALIZAÇÃO DO STALKING NO BRASIL.
- Published in:
- Revista Foco (Interdisciplinary Studies Journal), 2024, v. 17, n. 4, p. 1, doi. 10.54751/revistafoco.v17n4-059
- By:
- Publication type:
- Article
DIREITO PENAL CIBERNÉTICO: DA EVOLUÇÃO LEGISLATIVA À NECESSIDADE DE TIPIFICAÇÃO DE CRIMES CIBERNÉTICOS PRÓPRIOS.
- Published in:
- Revista Foco (Interdisciplinary Studies Journal), 2023, v. 16, n. 6, p. 1, doi. 10.54751/revistafoco.v16n6-028
- By:
- Publication type:
- Article
SECURITY ASPECTS OF DIGITAL TRANSACTIONS E-COMMERCE AND MCOMMERCE IMPLEMENTATIONS.
- Published in:
- Knowledge: International Journal, 2022, v. 54, n. 1, p. 105
- By:
- Publication type:
- Article
BIG DATA ANALYSIS TECHNIQUES OVER ATTACKS IN TOURISM INDUSTRY DURING A PANDEMIC CORONAVIRUS COVID 19.
- Published in:
- Knowledge: International Journal, 2020, v. 41, n. 1, p. 239
- By:
- Publication type:
- Article
A review of cyber security risks of power systems: from static to dynamic false data attacks.
- Published in:
- Protection & Control of Modern Power Systems, 2020, v. 5, n. 1, p. N.PAG, doi. 10.1186/s41601-020-00164-w
- By:
- Publication type:
- Article
CRÓNICA DE ACTUALIDAD.
- Published in:
- Anuario de Propiedad Intelectual, 2018, n. 2017, p. 255
- By:
- Publication type:
- Article
Uploading garbage files to the DOI system of a journal: a new type of misconduct.
- Published in:
- Learned Publishing, 2014, v. 27, n. 4, p. 275, doi. 10.1087/20140406
- By:
- Publication type:
- Article
Standing in the Age of Data Breaches: A CONSUMER-FRIENDLY FRAMEWORK TO PLEADING FUTURE INJURY AND PROVIDING EQUITABLE RELIEF TO DATA BREACH VICTIMS.
- Published in:
- Brooklyn Law Review, 2023, v. 88, n. 3, p. 923
- By:
- Publication type:
- Article
Breaching and Entering.
- Published in:
- Brooklyn Law Review, 2015, v. 81, n. 1, p. 405
- By:
- Publication type:
- Article
PEELING BACK THE ONION OF CYBER ESPIONAGE AFTER TALLINN 2.0.
- Published in:
- Maryland Law Review, 2019, v. 78, n. 2, p. 205
- By:
- Publication type:
- Article
Priority on Cybersecurity.
- Published in:
- Journal: American Water Works Association, 2019, v. 111, n. 3, p. 11, doi. 10.1002/awwa.1246
- By:
- Publication type:
- Article
Secure Storage of Data using Hybrid Cryptography.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2, Part 2, p. 1802
- By:
- Publication type:
- Article
Cyber Hygiene in Higher Educational Institutes.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part1, p. 31
- By:
- Publication type:
- Article
Know URL: Machine Learning-based Chrome Extension for Detection of URL Phishing.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2023, v. 9, n. 1, p. 499
- By:
- Publication type:
- Article
A Survey on Classical and Quantum Cryptography.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2018, v. 4, n. 2, p. 55
- By:
- Publication type:
- Article
China Cyber Warfare and Cyber Force.
- Published in:
- Tamkang Journal of International Affairs, 2019, v. 22, n. 3, p. 119, doi. 10.6185/TJIA.V.201901_22(3).0003
- By:
- Publication type:
- Article
LA APLICACIÓN ESPAÑOLA DE LAS NORMAS DE DERECHO INTERNACIONAL CONTRA LA CORRUPCIÓN.
- Published in:
- Anuario de Derecho Internacional, 2008, v. 24, p. 241
- By:
- Publication type:
- Article
Problem based learning in digital forensics.
- Published in:
- 2016
- By:
- Publication type:
- Case Study