Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
189 | Sarah Gordon, Richard Ford |
On the definition and classification of cybercrime. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 2(1), pp. 13-20, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
113 | Weiping Chang, Wingyan Chung, Hsinchun Chen, Shihchieh Chou |
An International Perspective on Fighting Cybercrime. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings, pp. 379-384, 2003, Springer, 3-540-40189-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
98 | Susan W. Brenner |
U.S. Cybercrime Law: Defining Offenses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 6(2), pp. 115-132, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
stalking, child pornography, cybercrime, hacking, fraud, terrorism |
98 | Susan W. Brenner, Joseph J. Schwerha |
Introduction-Cybercrime: A Note on International Issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 6(2), pp. 111-114, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
cybercrime |
94 | WenYuan Jen, Weiping Chang, Shihchieh Chou |
Cybercrime in Taiwan - An Analysis of Suspect Records. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISI ![In: Intelligence and Security Informatics, International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings, pp. 38-48, 2006, Springer, 3-540-33361-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
83 | Shihchieh Chou, Weiping Chang |
CyberIR - A Technological Approach to Fight Cybercrime. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI Workshops ![In: Intelligence and Security Informatics, IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedings, pp. 32-43, 2008, Springer, 978-3-540-69136-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
fighting cybercrime, high-tech crime, information retrieval, Cybercrime |
79 | Jianbin Ma, Guifa Teng, Yuxin Zhang, Yueli Li, Ying Li |
A Cybercrime Forensic Method for Chinese Web Information Authorship Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009. Proceedings, pp. 14-24, 2009, Springer, 978-3-642-01392-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
cybercrime forensic, Chinese web information, authorship analysis, Support Vector Machine, feature extraction |
75 | Chichao Lu, WenYuan Jen, Weiping Chang |
Trends in Computer Crime and Cybercrime Research During the Period 1974-2006: A Bibliometric Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings, pp. 244-250, 2007, Springer, 978-3-540-71548-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
75 | Steven Furnell |
Cybercrime: Vandalizing the Information Society. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWE ![In: Web Engineering, International Conference, ICWE 2003, Oviedo, Spain, July 14-18, 2003, Proceedings, pp. 8-16, 2003, Springer, 3-540-40522-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
60 | Carolyn P. Meinel |
Cybercrime Treaty Could Chill Research. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 2(4), pp. 28-32, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Cybercrime Treaty, Code Red, SQL Slammer worm, freedom of speech, worms, viruses |
57 | Nir Kshetri |
The Simple Economics of Cybercrimes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 4(1), pp. 33-39, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
vicious circle, online extortions, psychological costs and benefits, hacker, Cybercrimes |
42 | Yungchang Ku, Ying-Chieh Chen, Kuo-Ching Wu, Chaochang Chiu |
An Empirical Analysis of Online Gaming Crime Characteristics from 2002 to 2004. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings, pp. 34-45, 2007, Springer, 978-3-540-71548-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
online gaming crime, virtual property, MMORPG, cybercrime |
42 | Juline E. Mills, Sookeun Byun |
Cybercrimes against Consumers: Could Biometric Technology Be the Solution? ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Comput. ![In: IEEE Internet Comput. 10(4), pp. 64-71, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
cybertrust, phishing, cybercrime, pharming |
41 | Rok Bojanc, Borka Jerman-Blazic |
Standard Approach for Quantification of the ICT Security Investment for Cybercrime Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDS ![In: Second International Conference on the Digital Society (ICDS 2008), February 10-15, 2008, Sainte Luce, Martinique, France, pp. 7-14, 2008, IEEE Computer Society, 978-0-7695-3087-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security technology investment, cybercrime prevention, information security |
41 | Robert C. Newman |
Cybercrime, identity theft, and fraud: practicing safe internet - network security threats and vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 68-78, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
internet fraud, identity theft, cybercrime |
38 | Ryan Q. Hankins, Jigang Liu |
Towards a forensic-aware file system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EIT ![In: 2008 IEEE International Conference on Electro/Information Technology, EIT 2008, held at Iowa State University, Ames, Iowa, USA, May 18-20, 2008, pp. 84-89, 2008, IEEE, 978-1-4244-2030-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Rong Zheng, Yi Qin, Zan Huang, Hsinchun Chen |
Authorship Analysis in Cybercrime Investigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings, pp. 59-73, 2003, Springer, 3-540-40189-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
35 | Gargi Sarkar, Hardeep Singh, Subodh Kumar, Sandeep K. Shukla |
Tactics, Techniques and Procedures of Cybercrime: A Methodology and Tool for Cybercrime Investigation Process. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 18th International Conference on Availability, Reliability and Security, ARES 2023, Benevento, Italy, 29 August 2023- 1 September 2023, pp. 107:1-107:10, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
35 | Chat Le Nguyen, Wilfred Golman |
Diffusion of the Budapest Convention on cybercrime and the development of cybercrime legislation in Pacific Island countries: 'Law on the books' vs 'law in action'. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Law Secur. Rev. ![In: Comput. Law Secur. Rev. 40, pp. 105521, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
35 | Pablo Casais Solano, Antonio Jose Reinoso Peinado |
Socio-economic factors in cybercrime: Statistical study of the relation between socio-economic factors and cybercrime. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSA ![In: 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), London, United Kingdom, June 19-20, 2017, pp. 1-4, 2017, IEEE, 978-1-5090-5060-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
35 | Marianne Junger, Lorena Montoya, Pieter H. Hartel, Maliheh Heydari |
Towards the normalization of cybercrime victimization: A routine activities analysis of cybercrime in europe. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSA ![In: 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), London, United Kingdom, June 19-20, 2017, pp. 1-8, 2017, IEEE, 978-1-5090-5060-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
35 | Adekemi Olufunmilola Omotubora |
Comparative perspectives on cybercrime legislation in Nigeria and the UK - a case for revisiting the "hacking" offences under the Nigerian Cybercrime Act 2015. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Eur. J. Law Technol. ![In: Eur. J. Law Technol. 7(3), 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
35 | Ameer Al-Nemrat, Chafika Benzaid |
Cybercrime Profiling: Decision-Tree Induction, Examining Perceptions of Internet Risk and Cybercrime Victimisation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/BigDataSE/ISPA (1) ![In: 2015 IEEE TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1, pp. 1380-1385, 2015, IEEE, 978-1-4673-7952-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
35 | Weiping Chang, Peifang Chung |
Knowledge Management in Cybercrime Investigation - A Case Study of Identifying Cybercrime Investigation Knowledge in Taiwan. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2014, Tainan, Taiwan, May 13, 2014. Proceedings, pp. 8-17, 2014, Springer, 978-3-319-06676-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
35 | Yunsik Jake Jang, Bo young Lim |
Harmonization among national cyber security and cybercrime response organizations: New challenges of cybercrime. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1308.2362, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
35 | José R. Agustina, Fredesvinda Insa |
Challenges before crime in a digital era: Outsmarting cybercrime offenders - Workshop on Cybercrime, Computer Crime Prevention and the Surveillance Society. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Law Secur. Rev. ![In: Comput. Law Secur. Rev. 27(2), pp. 211-212, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
23 | Linda Dailey Paulson |
New Approach Combines TV and Social Networking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 43(7), pp. 16-19, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
NeXtream, paper batteries, paper electrodes, security, social networking, RFID, carbon nanotubes, cybercrime, social TV, e-passports |
23 | Marjory S. Blumenthal |
Hide and Seek in the Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 8(2), pp. 57-58, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
cloud computing, virtual machines, security and privacy, cybercrime |
23 | Cory Altheide, Claudio Merloni, Stefano Zanero |
A methodology for the repeatable forensic analysis of encrypted drives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROSEC ![In: Proceedings of the First European Workshop on System Security, EUROSEC 2008, Glasgow, Scotland, UK, March 31, 2008, pp. 22-26, 2008, ACM, 978-1-60558-119-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
whole disk encryption, computer forensics, cybercrime, data recovery |
23 | Donn B. Parker |
The Dark Side of Computing: SRI International and the Study of Computer Crime. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Ann. Hist. Comput. ![In: IEEE Ann. Hist. Comput. 29(1), pp. 3-15, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
SRI International, Department of Justice, information security, computer crime, National Science Foundation, cybercrime |
23 | Mike Burmester, Judie Mulholland |
The advent of trusted computing: implications for digital forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), Dijon, France, April 23-27, 2006, pp. 283-287, 2006, ACM, 1-59593-108-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
specifications, encryption, file systems, trusted computing, forensics, cybercrime, data recovery |
23 | Simon D. Byers, Aviel D. Rubin, David P. Kormann |
Defending against an Internet-based attack on the physical world. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Internet Techn. ![In: ACM Trans. Internet Techn. 4(3), pp. 239-254, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Internet threats, automated attacks, cybercrime |
23 | Simon D. Byers, Aviel D. Rubin, David P. Kormann |
Defending against an Internet-based attack on the physical world. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, WPES 2002, Washington, DC, USA, November 21, 2002, pp. 11-18, 2002, ACM, 1-58113-633-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Internet Threats, automated attacks, comuter security, internet threats, computer security, cybercrime |
19 | Ahmed Abbasi, Hsinchun Chen |
Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. ![In: ACM Trans. Inf. Syst. 26(2), pp. 7:1-7:29, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
online text, style classification, text mining, discourse, Stylometry |
19 | Da-Yu Kao, Shiuh-Jeng Wang, Kush Mathur, Saransh Jain, Frank Fu-Yuan Huang |
Privacy Concealments: Detective Strategies Unveiling Cyberstalking on Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9-12 December 2008, pp. 1364-1368, 2008, IEEE Computer Society, 978-0-7695-3473-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Mohamed Dâfir Ech-Cherif El Kettani, Taieb Debbagh |
NCSec: a national cyber security referential for the development of a code of practice in national cyber security management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEGOV ![In: Proceedings of the 2nd International Conference on Theory and Practice of Electronic Governance, ICEGOV 2008, Cairo, Egypt, December 1-4, 2008, pp. 373-380, 2008, ACM, 978-1-60558-386-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
ISO27002, cyber criminality, referential, organizational structure, cyber security |
19 | Charlene O'Hanlon |
The criminal mind. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Queue ![In: ACM Queue 4(9), pp. 7, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
19 | C. Abe, I. L. Lin, T. H. Lan, Tzong-Chen Wu |
Establishment of the Standard Operating Procedure (SOP) for Gathering Digital Evidence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SADFE ![In: First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 7-10 November 2005, Taipei, Taiwan, pp. 56-68, 2005, IEEE Computer Society, 0-7695-2478-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Patrick S. Chen, Lawrence M. F. Tsai, Ying-Chieh Chen, George Yee |
Standardizing the Construction of a Digital Forensics Laboratory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SADFE ![In: First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 7-10 November 2005, Taipei, Taiwan, pp. 40-47, 2005, IEEE Computer Society, 0-7695-2478-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Michael A. Caloyannides |
Is Privacy Really Constraining Security or Is this a Red Herring? ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 2(4), pp. 86-87, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
security, privacy, spam, terrorism |
19 | Eugene H. Spafford |
What starisstar information security? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 35th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2004, Norfolk, Virginia, USA, March 3-7, 2004, pp. 342, 2004, ACM, 1-58113-798-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Elias Levy |
Crossover: Online Pests Plaguing the Offline World. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 1(6), pp. 71-73, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Faisal Alsubaei, Abdulwahab Ali Almazroi, Nasir Ayub |
Enhancing Phishing Detection: A Novel Hybrid Deep Learning Framework for Cybercrime Forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 8373-8389, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Umar Farooq, Parvinder Singh, Surinder Singh Khurana, Munish Kumar |
Detection of content-based cybercrime in Roman Kashmiri using ensemble learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 83(11), pp. 33071-33105, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Shweta Sankhwar, Rupali Ahuja, Tanya Choubey, Priyanshi Jain, Tanusha Jain, Muskan Verma |
Cybercrime in India: An analysis of crime against women in ever expanding digital space. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Priv. ![In: Secur. Priv. 7(1), January/February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Razvan Rughinis, Emanuela Bran, Ana Rodica Staiculescu, Alexandru Radovici |
From Cybercrime to Digital Balance: How Human Development Shapes Digital Risk Cultures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. ![In: Inf. 15(1), pp. 50, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Victor Adewopo, Sylvia Worlali Azumah, Mustapha Awinsongya Yakubu, Emmanuel Kojo Gyamfi, Murat Ozer, Nelly Elsayed |
A Comprehensive Analytical Review on Cybercrime in West Africa. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.01649, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Michelle Espinoza |
Weaponization of Conscience in Cybercrime and Online Fraud: A Novel Systems Theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.14667, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Yongyeon Kim, Byung-Won On, Ingyu Lee |
Two-step Automated Cybercrime Coded Word Detection using Multi-level Representation Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.10838, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Veronica Valeros, Anna Sirokova, Carlos Adrián Catania, Sebastian García |
Towards Better Understanding of Cybercrime: The Role of Fine-Tuned LLMs in Translation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2404.01940, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Jack Hughes 0001, Sergio Pastrana, Alice Hutchings, Sadia Afroz, Sagar Samtani, Weifeng Li 0002, Ericsson Santana Marin |
The Art of Cybercrime Community Research. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Comput. Surv. ![In: ACM Comput. Surv. 56(6), pp. 155:1-155:26, June 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Andrey Chechulin, Maxim Gorda |
Cybercrime Investigation Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMSNETS ![In: 16th International Conference on COMmunication Systems & NETworkS, COMSNETS 2024, Bengaluru, India, January 3-7, 2024, pp. 37-42, 2024, IEEE, 979-8-3503-8311-9. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Juho Hamari, Robert W. Gehl, Piotr Siuda, J. Tuomas Harviainen |
Introduction to the Minitrack on Cybercrime. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 57th Hawaii International Conference on System Sciences, HICSS 2024, Hilton Hawaiian Village Waikiki Beach Resort, Hawaii, USA, January 3-6, 2024, pp. 4204-4205, 2024, ScholarSpace, 978-0-9981331-7-1. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
18 | Yee Ching Tok, Sudipta Chattopadhyay 0001 |
Identifying threats, cybercrime and digital forensic opportunities in Smart City Infrastructure via threat modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Forensic Sci. Int. Digit. Investig. ![In: Forensic Sci. Int. Digit. Investig. 45, pp. 301540, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Ibrahim Arpaci, Ersin Ates |
Development of the cybercrime awareness scale (CAS): a validity and reliability study in a Turkish sample. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Online Inf. Rev. ![In: Online Inf. Rev. 47(4), pp. 633-643, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Ibrahim Arpaci, Ömer Aslan |
Development of a Scale to Measure Cybercrime-Awareness on Social Media. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Inf. Syst. ![In: J. Comput. Inf. Syst. 63(3), pp. 695-705, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Katie Logos, Russell Brewer, Colette Langos, Bryce Westlake |
Establishing a framework for the ethical and legal use of web scrapers by cybercrime and cybersecurity researchers: learnings from a systematic review of Australian research. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Law Inf. Technol. ![In: Int. J. Law Inf. Technol. 31(3), pp. 186-212, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Ruslan Orlovskyi, Sergiy Kharytonov, Igor Samoshchenko, Olha Us, Volodymyr Iemelianenko |
Countering Cybercrime Under Martial Law. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cyber Secur. Mobil. ![In: J. Cyber Secur. Mobil. 12(6), pp. 893-910, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Mauro Allegretta, Giuseppe Siracusano, Roberto Gonzalez, Marco Gramaglia |
Are crowd-sourced CTI datasets ready for supporting anti-cybercrime intelligence? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 234, pp. 109920, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Raymond Greenlaw, Kauna Mufeti |
Combating Cybercrime by Spawning Two-Year, ABET-Accreditable Programs in Cybersecurity in African Context. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inroads ![In: Inroads 14(4), pp. 57-65, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Nir Kshetri |
Cybercrime and Privacy Threats of Large Language Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IT Prof. ![In: IT Prof. 25(3), pp. 9-13, May - June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | S. Muthurajkumar, S. Rahmath Nisha |
Semantic Graph Based Convolutional Neural Network for Spam e-mail Classification in Cybercrime Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Comput. Commun. Control ![In: Int. J. Comput. Commun. Control 18(1), February 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Preeti S. Chauhan, Nir Kshetri |
Ransomware as a Service Kit: A Novel Cybercrime Strategy to Monetize Victims' Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 56(10), pp. 102-106, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Mohamad Kassab, Ben Amaba, Edward S. Pound, Brian Fox |
Is the Solution for Cybercrime Also a Path to Greater Productivity? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 56(11), pp. 91-94, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Lavanya Elluri, Varun Mandalapu, Piyush Vyas, Nirmalya Roy |
Advances in Cybercrime Prediction: A Survey of Machine, Deep, Transfer, and Adaptive Learning Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2304.04819, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Gibran Gómez, Kevin van Liebergen, Juan Caballero |
Cybercrime Bitcoin Revenue Estimations: Quantifying the Impact of Methodology and Coverage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2309.03592, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Maria Grazia Porcedda |
Sentencing data-driven cybercrime. How data crime with cascading effects is tackled by UK courts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Law Secur. Rev. ![In: Comput. Law Secur. Rev. 48, pp. 105793, April 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Mathias Ellmann |
Philosophische und politische Gründe für Cybercrime. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inform. Spektrum ![In: Inform. Spektrum 46(3), pp. 138-148, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Mathias Ellmann |
Psychologische und neurologische Gründe für Cybercrime. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inform. Spektrum ![In: Inform. Spektrum 46(2), pp. 87-95, April 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | B. J. Sowmya, R. Hanumantharaju, D. Pradeep Kumar, K. G. Srinivasa 0001 |
Identification of authorship and prevention of fraudulent transactions/cybercrime using efficient high performance machine learning techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Bus. Intell. Data Min. ![In: Int. J. Bus. Intell. Data Min. 22(1/2), pp. 144-169, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Steven Kemp |
Exploring public cybercrime prevention campaigns and victimization of businesses: A Bayesian model averaging approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 127, pp. 103089, April 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Amir Djenna, Ezedin Barka, Achouak Benchikh, Karima Khadir |
Unmasking Cybercrime with Artificial-Intelligence-Driven Cybersecurity Analytics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 23(14), pp. 6302, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Benoit Dupont, Thomas J. Holt |
Advancing research on the Human Factor in Cybercrime. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Hum. Behav. ![In: Comput. Hum. Behav. 138, pp. 107410, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Thomas J. Holt, Benoit Dupont |
Summarizing the special issue on the human factor in cybercrime. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Hum. Behav. ![In: Comput. Hum. Behav. 138, pp. 107411, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Timothy C. Haas |
Adapting cybersecurity practice to reduce wildlife cybercrime. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cybersecur. ![In: J. Cybersecur. 9(1), January 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Tansif Ur Rehman, Sajida Parveen, Mehmood Ahmed Usmani, Muhammad Ahad Yar Khan |
Varieties and Skills of Cybercrime. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Cyber Behav. Psychol. Learn. ![In: Int. J. Cyber Behav. Psychol. Learn. 13(1), pp. 1-13, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Cheng Chen, Bin Dong |
Digital forensics analysis based on cybercrime and the study of the rule of law in space governance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Open Comput. Sci. ![In: Open Comput. Sci. 13(1), 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Ethem Ilbiz, Christian Kaunert |
The Sharing Economy for Tackling Cybercrime ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2023 |
DOI RDF |
|
18 | Gibran Gómez, Kevin van Liebergen, Juan Caballero |
Cybercrime Bitcoin Revenue Estimations: Quantifying the Impact of Methodology and Coverage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 3183-3197, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Jessica Man, Gilberto Atondo Siu, Alice Hutchings |
Autism Disclosures and Cybercrime Discourse on a Large Underground Forum. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: APWG Symposium on Electronic Crime Research, eCrime 2023, Barcelona, Spain, November 15-17, 2023, pp. 1-14, 2023, IEEE, 979-8-3503-6027-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Anna Talas, Alice Hutchings |
Hacker's Paradise: Analysing Music in a Cybercrime Forum. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: APWG Symposium on Electronic Crime Research, eCrime 2023, Barcelona, Spain, November 15-17, 2023, pp. 1-14, 2023, IEEE, 979-8-3503-6027-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Selina Cho, Jonathan Lusthaus, Ivan Flechais |
The Slippery Slope: Exploring the Parallels Between Game Cheating and Cybercrime Through Routine Activity Theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: APWG Symposium on Electronic Crime Research, eCrime 2023, Barcelona, Spain, November 15-17, 2023, pp. 1-13, 2023, IEEE, 979-8-3503-6027-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Matteo Curcio |
Cybercrime and Video Games: Exploring children's safety in the gaming environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EICC ![In: Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, EICC 2023, Stavanger, Norway, June 14-15, 2023, pp. 144-148, 2023, ACM, 978-1-4503-9829-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Tim Wright, Zainab Ruhwanya, Jacques Ophoff |
The Influence of Interpersonal Factors on Telecommuting Employees' Cybercrime Preventative Behaviours During the Pandemic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HAISA ![In: Human Aspects of Information Security and Assurance - 17th IFIP WG 11.12 International Symposium, HAISA 2023, Kent, UK, July 4-6, 2023, Proceedings, pp. 445-458, 2023, Springer, 978-3-031-38529-2. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Yinuo Liu, Yifan Li, Binhao Zhao, Tianyi Zhou, Shengtao Chen, Xiaoju Dong |
CAGviz: A Visual Analysis Method to Explore Cyber Asset Graphs of Cybercrime Gangs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CGI (3) ![In: Advances in Computer Graphics - 40th Computer Graphics International Conference, CGI 2023, Shanghai, China, August 28 - September 1, 2023, Proceedings, Part III, pp. 250-261, 2023, Springer, 978-3-031-50074-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Xiao Yang, Gaolei Li, Meng Han |
Persistent Clean-Label Backdoor on Graph-Based Semi-supervised Cybercrime Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDF2C (1) ![In: Digital Forensics and Cyber Crime - 14th EAI International Conference, ICDF2C 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part I, pp. 264-278, 2023, Springer, 978-3-031-56579-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Magdalene Ng, Maria Bada, Kovila P. L. Coopamootoo |
What We Do in the Shadows: How does Experiencing Cybercrime Affect Response Actions & Protective Practices? ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroS&P Workshops ![In: IEEE European Symposium on Security and Privacy, EuroS&P 2023 - Workshops, Delft, Netherlands, July 3-7, 2023, pp. 659-672, 2023, IEEE, 979-8-3503-2720-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Jack Hughes 0001, Alice Hutchings |
Digital Drift and the Evolution of a Large Cybercrime Forum. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroS&P Workshops ![In: IEEE European Symposium on Security and Privacy, EuroS&P 2023 - Workshops, Delft, Netherlands, July 3-7, 2023, pp. 183-193, 2023, IEEE, 979-8-3503-2720-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Miriam Kappe, Ralf-Christian Härting, Christoph Karg, Demian Deffner |
Cybersecurity in SMEs - Drivers of Cybercrime, Insufficient Equipment and Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES ![In: Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 27th International Conference KES-2023, Athens, Greece, 6-8 September 2023., pp. 3631-3640, 2023, Elsevier. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Marc Krüger |
Comparative Analysis of Text-Based CBR Algorithms for Cybercrime Profiling Investigations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LWDA ![In: Lernen, Wissen, Daten, Analysen (LWDA) Conference Proceedings, Marburg, Germany, October 9-11, 2023., pp. 347-358, 2023, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
18 | Nikolaos Lykousas, Vasilios Koutsokostas, Fran Casino, Constantinos Patsakis |
The Cynicism of Modern Cybercrime: Automating the Analysis of Surface Web Marketplaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOSE ![In: IEEE International Conference on Service-Oriented System Engineering, SOSE 2023, Athens, Greece, July 17-20, 2023, pp. 161-171, 2023, IEEE, 979-8-3503-2239-2. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Donghyun Kim, Seungho Jeon, Jiho Shin, Jung-Taek Seo |
OCR Meets the Dark Web: Identifying the Content Type Regarding Illegal and Cybercrime. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications - 24th International Conference, WISA 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers, pp. 201-212, 2023, Springer, 978-981-99-8023-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Daoud Marzouq Al-Qeed, Mohammad Khalaf Daoud, Sharihan K. A Aljaabari, Fakhre Mustafa Abdallah Keelani, Sawsan Taha, Hussein Alsrehan |
Investigating the Consequences for the Economy Arising from the Utilization of Mobile Marketing Within the Framework of Cybercrime. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNAMS ![In: Tenth International Conference on Social Networks Analysis, Management and Security, SNAMS 2023, Abu Dhabi, United Arab Emirates, November 21-24, 2023, pp. 1-6, 2023, IEEE, 979-8-3503-1890-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Juho Hamari, J. Tuomas Harviainen, Piotr Siuda, Robert W. Gehl |
Introduction to the Minitrack on Cybercrime. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 56th Hawaii International Conference on System Sciences, HICSS 2023, Maui, Hawaii, USA, January 3-6, 2023, pp. 3609-3610, 2023, ScholarSpace, 978-0-9981331-6-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
18 | Laurie Giddens, Stacie Petter, Gisela Bichler, Pablo Rivas 0001, Michael H. Fullilove, Tomás Cerný |
Navigating an Interdisciplinary Approach to Cybercrime Research. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 56th Hawaii International Conference on System Sciences, HICSS 2023, Maui, Hawaii, USA, January 3-6, 2023, pp. 3611-3620, 2023, ScholarSpace, 978-0-9981331-6-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
18 | Jan Gruber, Lena L. Voigt, Zinaida Benenson, Felix C. Freiling |
Foundations of cybercriminalistics: From general process models to case-specific concretizations in cybercrime investigations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digit. Investig. ![In: Digit. Investig. 43(Supplement), pp. 301438, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Kudrat-E.-Khuda Babu, Md. Abu Bakar Siddik |
Cybercrime in the social media of Bangladesh: an analysis of existing legal frameworks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Electron. Secur. Digit. Forensics ![In: Int. J. Electron. Secur. Digit. Forensics 14(1), pp. 1-18, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Florian Skopik, Kyriakos Stefanidis |
Fighting Cybercrime - Introduction to the Special Theme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ERCIM News ![In: ERCIM News 2022(129), 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
18 | Rudolf Mayer |
Privacy-Preserving Collaborative Anomaly Detection to Fight Cybercrime. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ERCIM News ![In: ERCIM News 2022(129), 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
18 | Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo |
Fighting Cybercrime by Introducing Trustworthiness and Interpretability in Deep Learning Malware Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ERCIM News ![In: ERCIM News 2022(129), 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|