Works matching DE "CYBERCRIMINALS"
Results: 287
EL DELITO DE HACKING O ACCESO ILÍCITO A SISTEMAS INFORMÁTICOS.
- Published in:
- Themis: Revista de Derecho, 2023, n. 83, p. 413, doi. 10.18800/themis.202301.023
- By:
- Publication type:
- Article
Cyberfraud: A Review of the Internet and Anonymity in the Nigerian Context.
- Published in:
- ISSA Journal, 2021, v. 19, n. 3, p. 28
- By:
- Publication type:
- Article
The Future of Cybercrime.
- Published in:
- ISSA Journal, 2019, v. 17, n. 6, p. 9
- By:
- Publication type:
- Article
The Impact of Cryptocurrency on Modern-Day Cybercrime.
- Published in:
- ISSA Journal, 2018, v. 16, n. 12, p. 23
- By:
- Publication type:
- Article
Malware: Cat and Mouse Forever?
- Published in:
- ISSA Journal, 2018, v. 16, n. 11, p. 12
- By:
- Publication type:
- Article
A Blinky-Box-a-Day Won't Keep the Malware Away...
- Published in:
- ISSA Journal, 2018, v. 16, n. 11, p. 5
- By:
- Publication type:
- Article
Employee and Insider Data Breaches: Vulnerability or Threat Vector?
- Published in:
- ISSA Journal, 2018, v. 16, n. 8, p. 15
- By:
- Publication type:
- Article
Information Security Maxims.
- Published in:
- ISSA Journal, 2018, v. 16, n. 7, p. 44
- By:
- Publication type:
- Article
Global Cyber Enforcement.
- Published in:
- ISSA Journal, 2017, v. 15, n. 7, p. 6
- By:
- Publication type:
- Article
Five Minutes with Lance Spitzner.
- Published in:
- 2016
- By:
- Publication type:
- Interview
Social Media Impact: Is It Possible to Be Social and Secure?
- Published in:
- ISSA Journal, 2016, v. 14, n. 7, p. 20
- By:
- Publication type:
- Article
Do Data Breaches Matter? A Review of Breach Data and What to Do Next.
- Published in:
- ISSA Journal, 2016, v. 14, n. 5, p. 22
- By:
- Publication type:
- Article
CRYPTOLOCKER.
- Published in:
- ISSA Journal, 2016, v. 14, n. 4, p. 14
- By:
- Publication type:
- Article
CYBERCRIMINALS AND THE VICTIMS OF CYBERCRIME.
- Published in:
- Journal of Law & Administrative Sciences, 2020, n. 14, p. 127
- By:
- Publication type:
- Article
Risikofaktor Mensch.
- Published in:
- IM + io, 2023, n. 3, p. 12
- By:
- Publication type:
- Article
Cybercrime Tendencies and Legislation in the Republic of Macedonia.
- Published in:
- European Journal on Criminal Policy & Research, 2016, v. 22, n. 1, p. 127, doi. 10.1007/s10610-015-9277-7
- By:
- Publication type:
- Article
Vulnerabilities in the internet of things.
- Published in:
- Visión Electrónica, 2019, v. 13, n. 2, p. 1
- By:
- Publication type:
- Article
An Efficient Approach to Identify the Cybercrime through Big Data Analytics.
- Published in:
- Indian Journal of Public Health Research & Development, 2018, v. 9, n. 12, p. 1609, doi. 10.5958/0976-5506.2018.02088.0
- By:
- Publication type:
- Article
'To Be, or Not To Be a Cyberterrorist', That Is the Question! The Political Communication of al-Qaeda and Islamic State on Social Networks.
- Published in:
- Trípodos, 2016, n. 39, p. 13
- By:
- Publication type:
- Article
XGBoost for Imbalanced Multiclass Classification-Based Industrial Internet of Things Intrusion Detection Systems.
- Published in:
- Sustainability (2071-1050), 2022, v. 14, n. 14, p. N.PAG, doi. 10.3390/su14148707
- By:
- Publication type:
- Article
Computational System to Classify Cyber Crime Offenses using Machine Learning.
- Published in:
- Sustainability (2071-1050), 2020, v. 12, n. 10, p. 4087, doi. 10.3390/su12104087
- By:
- Publication type:
- Article
A Preliminary Investigation on User Factors of Phishing E-mail.
- Published in:
- Central Asia & the Caucasus (14046091), 2022, v. 23, n. 1, p. 1920, doi. 10.37178/ca-c.23.1.189
- By:
- Publication type:
- Article
Using agility to combat cyber attacks.
- Published in:
- Journal of Business Continuity & Emergency Planning, 2017, v. 10, n. 4, p. 298, doi. 10.69554/kqzv7354
- By:
- Publication type:
- Article
Cyber Criminals Prey on Industry Pros.
- Published in:
- Builder: The Magazine of the National Association of Home Builders, 2019, v. 42, n. 5, p. 36
- By:
- Publication type:
- Article
Interrelationship between Bitcoin, Ransomware, and Terrorist Activities: Criminal Opportunity Assessment via Cyber-Routine Activities Theoretical Framework.
- Published in:
- Victims & Offenders, 2021, v. 16, n. 3, p. 363, doi. 10.1080/15564886.2020.1835764
- By:
- Publication type:
- Article
‘Depends on Who’s Got the Data’: Public Understandings of Personal Digital Dataveillance.
- Published in:
- Surveillance & Society, 2017, v. 15, n. 2, p. 254, doi. 10.24908/ss.v15i2.6332
- By:
- Publication type:
- Article
HIDDEN THREAT: THE DARK WEB SURROUNDING CYBER SECURITY.
- Published in:
- Northern Kentucky Law Review, 2016, v. 43, n. 1, p. 73
- By:
- Publication type:
- Article
A Strategic Cyber No-First-Use Policy? Addressing the US Cyber Strategy Problem.
- Published in:
- Washington Quarterly, 2020, v. 43, n. 2, p. 159, doi. 10.1080/0163660X.2020.1770970
- By:
- Publication type:
- Article
Is Cyber Strategy Possible?
- Published in:
- Washington Quarterly, 2019, v. 42, n. 1, p. 131, doi. 10.1080/0163660X.2019.1593665
- By:
- Publication type:
- Article
Hacking the brain: brain-computer interfacing technology and the ethics of neurosecurity.
- Published in:
- Ethics & Information Technology, 2016, v. 18, n. 2, p. 117, doi. 10.1007/s10676-016-9398-9
- By:
- Publication type:
- Article
The Empowerment of The Cyber Communities By The Indonesian Goverment From The Perspective of Total War Strategy.
- Published in:
- Journal of Social Science (2720-9938), 2023, v. 4, n. 6, p. 2333, doi. 10.46799/jss.v4i6.96
- By:
- Publication type:
- Article
ZERO IDENTITY -- THE NEW CYBERSECURITY PARADIGM.
- Published in:
- Marketing of Scientific & Research Organizations / Marketing Instytucji Naukowych i Badawczych, 2021, v. 42, n. 4, p. 97, doi. 10.2478/minib-2021-0023
- By:
- Publication type:
- Article
Performance evaluation of Cuckoo filters as an enhancement tool for password cracking.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00193-6
- By:
- Publication type:
- Article
Are our clone detectors good enough? An empirical study of code effects by obfuscation.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00148-x
- By:
- Publication type:
- Article
Examining Hacker Participation Length in Cybercriminal Internet-Relay-Chat Communities.
- Published in:
- Journal of Management Information Systems, 2016, v. 33, n. 2, p. 482, doi. 10.1080/07421222.2016.1205918
- By:
- Publication type:
- Article
Attack and Anomaly Detection in IoT Networks Using Supervised Machine Learning Approaches.
- Published in:
- Revue d'Intelligence Artificielle, 2021, v. 35, n. 1, p. 11, doi. 10.18280/ria.350102
- By:
- Publication type:
- Article
PHISHING AND PHARMING AS FORMS OF IDENTITY THEFT AND IDENTITY ABUSE.
- Published in:
- Balkan Social Science Review, 2019, v. 13, n. 13, p. 43
- By:
- Publication type:
- Article
Criminalization of Voyeurism and 'Upskirt Photography' in Hong Kong: The Need for a Coherent Approach to Image-Based Abuse.
- Published in:
- Chinese Journal of Comparative Law, 2020, v. 8, n. 3, p. 505, doi. 10.1093/cjcl/cxaa031
- By:
- Publication type:
- Article
Challenges and solutions in the development of blockchain applications: Extraction from SLR and empirical study.
- Published in:
- Journal of Software: Evolution & Process, 2024, v. 36, n. 8, p. 1, doi. 10.1002/smr.2651
- By:
- Publication type:
- Article
Data Privacy Rights and Bankers’ Business Interests in Nigeria: Reflections on Opportunities, Challenges and Legal Reforms.
- Published in:
- Malaysian Journal of Law & Society, 2022, v. 30, p. 3, doi. 10.17576/juum-2022-30-01
- By:
- Publication type:
- Article
Botnet Mitigation and International Law: Columbia Journal of Transnational Law Student Writing Prize in Comparative and International Law, Best Note Award.
- Published in:
- Columbia Journal of Transnational Law, 2019, v. 58, n. 1, p. 189
- By:
- Publication type:
- Article
How to Protect a CPA Firm in the Digital Age.
- Published in:
- CPA Journal, 2017, v. 87, n. 3, p. 72
- By:
- Publication type:
- Article
Risk Factors for Social Networking Site Scam Victimization Among Malaysian Students.
- Published in:
- CyberPsychology, Behavior & Social Networking, 2018, v. 21, n. 2, p. 123, doi. 10.1089/cyber.2016.0714
- By:
- Publication type:
- Article
NGEN Firewall Security Augmentation using Brooks-Iyengar and Random Forest Classfier method: by Predicting Cyber Threats from: Darkweb/Deepweb Data.
- Published in:
- International Journal of Next-Generation Computing, 2020, v. 11, n. 1, p. 1
- By:
- Publication type:
- Article
Smart Approach for Botnet Detection Based on Network Traffic Analysis.
- Published in:
- Journal of Electrical & Computer Engineering, 2022, v. 2022, p. 1, doi. 10.1155/2022/3073932
- By:
- Publication type:
- Article
CYBERCRIME: A GROWING BUSINESS DURING COVID-19: While the world was in lockdown, cybercriminals were hard at work, finding more efficient ways to extract money from hacking into computer systems -- and Asia Pacific is firmly in their sights.
- Published in:
- Journal of the Australian & New Zealand Institute of Insurance & Finance, 2021, v. 44, n. 3, p. 36
- By:
- Publication type:
- Article
Crimen, cibercrimen y COVID-19: desplazamiento (acelerado) de oportunidades y adaptación situacional de ciberdelitos.
- Published in:
- IDP: Revista de Internet, Derecho y Politica, 2021, n. 32, p. 1, doi. 10.7238/idp.v0i32.373815
- By:
- Publication type:
- Article
Malware Detection in Cloud Environment (MDCE).
- Published in:
- International Journal of Interactive Mobile Technologies, 2017, v. 11, n. 2, p. 139, doi. 10.3991/ijim.v11i2.6575
- By:
- Publication type:
- Article
Some Actual Good News About All These Cyberattacks: Jobs, Jobs, and More Jobs.
- Published in:
- Journal of Counterterrorism & Homeland Security International, 2018, v. 23, n. 4, p. 8
- By:
- Publication type:
- Article
How Bad Guys Are Using The Web's Own Encryption To Hide Malware Payloads.
- Published in:
- Journal of Counterterrorism & Homeland Security International, 2016, v. 22, n. 1, p. 8
- By:
- Publication type:
- Article