The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for cybercrime with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2000-2003 (17) 2004-2005 (15) 2006-2007 (19) 2008-2009 (20) 2010 (16) 2011 (16) 2012 (22) 2013 (24) 2014-2015 (30) 2016 (16) 2017 (24) 2018 (23) 2019 (42) 2020 (30) 2021 (26) 2022 (41) 2023 (43) 2024 (11)
Publication types (Num. hits)
article(230) book(3) incollection(7) inproceedings(192) phdthesis(3)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 59 occurrences of 42 keywords

Results
Found 435 publication records. Showing 435 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
18Erika Check Hayden Cybercrime fighters target human error. Search on Bibsonomy Nat. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Mohamed Chawki, Ashraf Darwish, Mohammad Ayoub Khan, Sapna Tyagi Cybercrime, Digital Forensics and Jurisdiction Search on Bibsonomy 2015   DOI  RDF
18Yiu Chung Laurie Lau Cybercrime in cloud: Risks and responses in Hong Kong, Singapore. Search on Bibsonomy The Cloud Security Ecosystem The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Michael Hopkins, Ali Dehghantanha Exploit Kits: The production line of the Cybercrime economy? Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Raian Ali, John McAlaney, Shamal Faily, Keith Phalp, Vasilios Katos Mitigating Circumstances in Cybercrime: A Position Paper. Search on Bibsonomy CIT/IUCC/DASC/PICom The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Jart Armin, Bryn Thompson, Davide Ariu, Giorgio Giacinto, Fabio Roli, Piotr Kijewski 2020 Cybercrime Economic Costs: No Measure No Solution. Search on Bibsonomy ARES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Jart Armin, Paolo Foti, Marco Cremonini 0-Day Vulnerabilities and Cybercrime. Search on Bibsonomy ARES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Laila Dahabiyeh Networks of Cybercrime Prevention: A Process Study of the Credit Card. Search on Bibsonomy ECIS The full citation details ... 2015 DBLP  BibTeX  RDF
18Salim Alami, Omar El Beqqali Cybercrime profiling: Text mining techniques to detect and predict criminal activities in microblog posts. Search on Bibsonomy SITA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Richard Clayton 0001, Tyler Moore 0001, Nicolas Christin Concentrating Correctly on Cybercrime Concentration. Search on Bibsonomy WEIS The full citation details ... 2015 DBLP  BibTeX  RDF
18Paul A. Watters, Maya F. Watters, Jacqueline Ziegler Maximising Eyeballs but Facilitating Cybercrime? Ethical Challenges for Online Advertising in New Zealand. Search on Bibsonomy HICSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Mohammad Taha Khan, Xiang Huo, Zhou Li 0001, Chris Kanich Every Second Counts: Quantifying the Negative Externalities of Cybercrime via Typosquatting. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Sudha Singh, S. C. Dutta, D. K. Singh Information Security and Its Insurance in the World of High Rise of Cybercrime Through a Model. Search on Bibsonomy SocProS (2) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Nicolas Sklavos 0001 Book Review: Shavers, Brett. Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Corlane Barclay Using Frugal Innovations to Support Cybercrime Legislations in Small Developing States: Introducing the Cyber-Legislation Development and Implementation Process Model (CyberLeg-DPM). Search on Bibsonomy Inf. Technol. Dev. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Cormac Herley Security, cybercrime, and scale. Search on Bibsonomy Commun. ACM The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Kinfe Micheal Yilma Developments in cybercrime law and practice in Ethiopia. Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Christopher M. Donner, Catherine D. Marcum, Wesley G. Jennings, George E. Higgins, Jerry Banfield Low self-control and cybercrime: Exploring the utility of the general theory of crime beyond digital piracy. Search on Bibsonomy Comput. Hum. Behav. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Mohamed Sarrab, Nasser Alalwan, Ahmed Alzahrani 0001, Mahdi Kordestani Cybercrime Investigation Challenges: Middle East and North Africa. Search on Bibsonomy Bio-inspiring Cyber Security and Cloud Services The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Charlette M. Donalds, Kweku-Muata Osei-Bryson A Cybercrime Taxonomy: Case of the Jamaican Jurisdiction. Search on Bibsonomy CONF-IRM The full citation details ... 2014 DBLP  BibTeX  RDF
18Wynand J. C. van Staden An investigation into reducing third party privacy breaches during the investigation of cybercrime. Search on Bibsonomy ISSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Nir Kshetri Cybercrime and cyber-security issues associated with China: some economic and institutional considerations. Search on Bibsonomy Electron. Commer. Res. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Aditya K. Sood, Rohit Bansal, Richard J. Enbody Cybercrime: Dissecting the State of Underground Enterprise. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18E. J. Hilbert Living with cybercrime. Search on Bibsonomy Netw. Secur. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Awais Rashid, Alistair Baron, Paul Rayson, Corinne May-Chahal, Phil Greenwood, James Walkerdine Who Am I? Analyzing Digital Personas in Cybercrime Investigations. Search on Bibsonomy Computer The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Nir Kshetri Reliability, Validity, Comparability and Practical Utility of Cybercrime-Related Data, Metrics, and Information. Search on Bibsonomy Inf. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Joshua I. James, Yunsik Jake Jang An Assessment Model for Cybercrime Investigation Capacity. Search on Bibsonomy CoRR The full citation details ... 2013 DBLP  BibTeX  RDF
18Michael Levi, Matthew Leighton Williams Multi-agency partnerships in cybercrime reduction: Mapping the UK information assurance network cooperation space. Search on Bibsonomy Inf. Manag. Comput. Secur. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Denis Edgar-Nevill The EU ECENTRE Project: Education as a Defensive Weapon in the War Against Cybercrime. Search on Bibsonomy Int. J. Cyber Warf. Terror. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Paul Hyman Cybercrime: it's serious, but exactly how serious? Search on Bibsonomy Commun. ACM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Stas Filshtinskiy Cybercrime, cyberweapons, cyber wars: is there too much of it in the air? Search on Bibsonomy Commun. ACM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Christopher Hooper, Ben Martini, Kim-Kwang Raymond Choo Cloud computing and its implications for cybercrime investigations in Australia. Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Franck Guarnieri, Eric Przyswa Counterfeiting and Cybercrime: Stakes and Challenges. Search on Bibsonomy Inf. Soc. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Thomas Nash Book Review: Placing the Suspect behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects. Search on Bibsonomy J. Digit. Forensics Secur. Law The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Moussa Ouedraogo, Haralambos Mouratidis Selecting a Cloud Service Provider in the age of cybercrime. Search on Bibsonomy Comput. Secur. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Dimitris Gritzalis, Gurvirender Tejay 0001 Cybercrime in the Digital Economy - Editorial. Search on Bibsonomy Comput. Secur. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Hanif-Mohaddes Deylami, Yashwant Prasad Singh Cybercrime detection techniques based on support vector machines. Search on Bibsonomy Artif. Intell. Res. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Ross J. Anderson, Chris Barton, Rainer Böhme, Richard Clayton 0001, Michel J. G. van Eeten, Michael Levi, Tyler Moore 0001, Stefan Savage Measuring the Cost of Cybercrime. Search on Bibsonomy The Economics of Information Security and Privacy The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Sadia Afroz 0001, Vaibhav Garg, Damon McCoy, Rachel Greenstadt Honor among thieves: A common's analysis of cybercrime economies. Search on Bibsonomy eCrime The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Luca Allodi, Vadim Kotov, Fabio Massacci MalwareLab: Experimentation with Cybercrime Attack Tools. Search on Bibsonomy CSET The full citation details ... 2013 DBLP  BibTeX  RDF
18Eviyanti Saari, Aman Jantan E-Cyborg: The cybercrime evidence finder. Search on Bibsonomy CITA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Ammar Alazab, Jemal H. Abawajy, Michael Hobbs, Robert Layton, Ansam Khraisat Crime Toolkits: The Productisation of Cybercrime. Search on Bibsonomy TrustCom/ISPA/IUCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Nicholas Charles Patterson, Michael Hobbs, Darren Palmer A Direct Insight into Victims of Cybercrime. Search on Bibsonomy TrustCom/ISPA/IUCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Luca Allodi, Woohyun Shim, Fabio Massacci Quantitative Assessment of Risk Reduction with Cybercrime Black Market Monitoring. Search on Bibsonomy IEEE Symposium on Security and Privacy Workshops The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Solange Ghernaouti-Helie, Jens Tölle, Jean-Jacques Quisquater Cybercrime and Privacy Issues - Introduction to the Special Theme. Search on Bibsonomy ERCIM News The full citation details ... 2012 DBLP  BibTeX  RDF
18Juan Caballero Understanding the Role of Malware in Cybercrime. Search on Bibsonomy ERCIM News The full citation details ... 2012 DBLP  BibTeX  RDF
18Florian Skopik, Thomas Bleier Cybercrime and the Security of Critical Infrastructures. Search on Bibsonomy ERCIM News The full citation details ... 2012 DBLP  BibTeX  RDF
18Solange Ghernaouti-Helie The Cybercrime Ecosystem & Privacy Issues - Main Challenges and Perspectives from a Societal Perspective. Search on Bibsonomy ERCIM News The full citation details ... 2012 DBLP  BibTeX  RDF
18Igor Bernik Internet Study: Cyber Threats and Cybercrime Awareness and Fear. Search on Bibsonomy Int. J. Cyber Warf. Terror. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Paul Hunton Data attack of the cybercriminal: Investigating the digital currency of cybercrime. Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Keivan Kianmehr, Negar Koochakzadeh Learning from socio-economic characteristics of IP geo-locations for cybercrime prediction. Search on Bibsonomy Int. J. Bus. Intell. Data Min. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Hanif-Mohaddes Deylami, Yashwant Prasad Singh Adaboost and SVM based cybercrime detection and prevention model. Search on Bibsonomy Artif. Intell. Res. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Thomas J. Holt, Adam M. Bossler Predictors of Patrol Officer Interest in Cybercrime Training and Investigation in Selected United States Police Departments. Search on Bibsonomy Cyberpsychology Behav. Soc. Netw. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Monica T. Whitty, Tom Buchanan 0001 The Online Romance Scam: A Serious Cybercrime. Search on Bibsonomy Cyberpsychology Behav. Soc. Netw. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Rainer Böhme, Tyler Moore 0001 How do consumers react to cybercrime? Search on Bibsonomy eCrime Researchers Summit The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Rachel Levin, Jonathan Richardson, Gary Warner, Kent Kerley Explaining Cybercrime through the Lens of Differential Association Theory, Hadidi44-2.php PayPal Case Study. Search on Bibsonomy eCrime Researchers Summit The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Paul Stephens An Evaluation of Linux Cybercrime Forensics Courses for European Law Enforcement. Search on Bibsonomy HAISA The full citation details ... 2012 DBLP  BibTeX  RDF
18Muhammad Adnan Tariq, Joel Brynielsson, Henrik Artman Framing the Attacker in Organized Cybercrime. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Mortaza S. Bargh, Sunil Choenni, Ingrid Mulder, Roland Pastoor Exploring a Warrior Paradigm to Design Out Cybercrime. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Alex Kuzmin State and trends of Russian cybercrime in 2011. Search on Bibsonomy ICUMT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Daan de Graaf, Ahmed F. Shosha, Pavel Gladyshev BREDOLAB: Shopping in the Cybercrime Underworld. Search on Bibsonomy ICDF2C The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Ibrahim M. Baggili, Moza Al Shamlan, Bedoor Al Jabri, Ayesha Al Zaabi Cybercrime, Censorship, Perception and Bypassing Controls: An Exploratory Study. Search on Bibsonomy ICDF2C The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Litska Strikwerda When Should Virtual Cybercrime Be Brought under the Scope of the Criminal Law? Search on Bibsonomy ICDF2C The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Ross J. Anderson, Chris Barton, Rainer Böhme, Richard Clayton 0001, Michel van Eeten, Michael Levi, Tyler Moore 0001, Stefan Savage Measuring the Cost of Cybercrime. Search on Bibsonomy WEIS The full citation details ... 2012 DBLP  BibTeX  RDF
18Weiping Chang, Yungchang Ku, Sinru Wu, Chaochang Chiu CybercrimeIR - A Technological Perspective to Fight Cybercrime. Search on Bibsonomy PAISI The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18S. M. Nirkhi, Rajiv V. Dharaskar, V. M. Thakre Analysis of online messages for identity tracing in cybercrime investigation. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Ed Gabrys Cybercrime: Council of Europe. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Thomas Akin Cybercrime: Response, Investigation, and Prosecution. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Paul Hunton A rigorous approach to formalising the technical investigation stages of cybercrime and criminality within a UK law enforcement environment. Search on Bibsonomy Digit. Investig. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Alex de Joode Effective corporate security and cybercrime. Search on Bibsonomy Netw. Secur. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Vasileios Vlachos, Marilena Minou, Vassilis Assimakopoulos, Androniki Toska The Landscape of Cybercrime in Greece. Search on Bibsonomy Inf. Manag. Comput. Secur. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Paul Hunton The stages of cybercrime investigations: Bridging the gap between technology examination and law enforcement investigation. Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Nigel J. Martin 0002, John L. Rice Cybercrime: Understanding and addressing the concerns of stakeholders. Search on Bibsonomy Comput. Secur. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Joshua Oyeniyi Aransiola, Suraj Olalekan Asindemade Understanding Cybercrime Perpetrators and the Strategies They Employ in Nigeria. Search on Bibsonomy Cyberpsychology Behav. Soc. Netw. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Mamoun Alazab, Sitalakshmi Venkatraman, Paul A. Watters, Moutaz Alazab, Ammar Alazab Cybercrime: The Case of Obfuscated Malware. Search on Bibsonomy ICGS3/e-Democracy The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Gorazd Mesko, Igor Bernik Cybercrime: Awareness and Fear: Slovenian Perspectives. Search on Bibsonomy EISIC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Mike Redford U.S. and EU Legislation on Cybercrime. Search on Bibsonomy EISIC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Chris Kanich, Neha Chachra, Damon McCoy, Chris Grier, David Y. Wang, Marti Motoyama, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker No Plan Survives Contact: Experience with Cybercrime Measurement. Search on Bibsonomy CSET The full citation details ... 2011 DBLP  BibTeX  RDF
18Zinaida Benenson, Andreas Dewald, Hans-Georg Eßer, Felix C. Freiling, Tilo Müller, Christian Moch, Stefan Vömel, Sebastian Schinzel, Michael Spreitzenbarth, Ben Stock, Johannes Stüttgen Exploring the Landscape of Cybercrime. Search on Bibsonomy SysSec@DIMVA The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18I-Long Lin, Yun-Sheng Yen, Annie Chang A Study on Digital Forensics Standard Operation Procedure for Wireless Cybercrime. Search on Bibsonomy IMIS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Jianbin Ma, Guifa Teng, Shuhui Chang, Xiaoru Zhang, Ke Xiao Social Network Analysis Based on Authorship Identification for Cybercrime Investigation. Search on Bibsonomy PAISI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Georgia Frantzeskou, Stephen G. MacDonell, Efstathios Stamatatos Source Code Authorship Analysis For Supporting the Cybercrime Investigation Process. Search on Bibsonomy Handbook of Research on Computational Forensics, Digital Crime, and Investigation The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18A. S. N. Murthy, Vishnuprasad Nagadevara, Rahul De' Predictive Models in Cybercrime Investigation: An Application of Data Mining Techniques. Search on Bibsonomy Int. J. Inf. Syst. Serv. Sect. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Rodney Joffee Cybercrime: the global epidemic at your network door. Search on Bibsonomy Netw. Secur. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Danny McPherson Cybercrime - A game of cat and mouse in 2009. Search on Bibsonomy Netw. Secur. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Marc Dacier, Corrado Leita, Olivier Thonnard, Hau-Van Pham, Engin Kirda Assessing Cybercrime Through the Eyes of the WOMBAT. Search on Bibsonomy Cyber Situational Awareness The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Ameer Al-Nemrat, Hamid Jahankhani, David S. Preston Cybercrime Victimisations/Criminalisation and Punishment. Search on Bibsonomy ICGS3 The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Aidong Xu, Yan Gong, Yongquan Wang, Nayan Ai On Different Categories of Cybercrime in China. Search on Bibsonomy e-Forensics The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Ali Alkaabi, George M. Mohay, Adrian McCullagh, Nicholas Chantler Dealing with the Problem of Cybercrime. Search on Bibsonomy ICDF2C The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Gabriel Casal, Mercedes Rivolta A national strategy to combat cybercrime: a case of Argentina. Search on Bibsonomy ICEGOV The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Derrick J. Neufeld Understanding Cybercrime. Search on Bibsonomy HICSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Stan L. Bowie, Brenda S. Lenard, Craig A. Shue Towards an empirical measure for assessing public attitudes regarding government cybercrime countermeasures. Search on Bibsonomy CSIIRW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Weiping Chang Fighting Cybercrime: A KM Perspective. Search on Bibsonomy PAISI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18William Eberle, Lawrence B. Holder, Jeffrey Graves Using a Graph-Based Approach for Discovering Cybercrime. Search on Bibsonomy FLAIRS The full citation details ... 2010 DBLP  BibTeX  RDF
18Imran Askerniya Investigation into reduction and/or prevention of cybercrime victimisation among the user individuals. Search on Bibsonomy 2010   RDF
18Richard E. Overill Development of masters modules in computer forensics and cybercrime for computer science and forensic science students. Search on Bibsonomy Int. J. Electron. Secur. Digit. Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Man Qi, Yongquan Wang, Rongsheng Xu Fighting cybercrime: legislation in China. Search on Bibsonomy Int. J. Electron. Secur. Digit. Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Margaret Ross 0001, Geoff Staples, Mark Udall Cybercrime - raising awareness for future professionals. Search on Bibsonomy Int. J. Electron. Secur. Digit. Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Azeez Nureni Ayofe, Osunade Oluwaseyifunmitan Approach To Solving Cybercrime And Cybersecurity Search on Bibsonomy CoRR The full citation details ... 2009 DBLP  BibTeX  RDF
18Niels Provos, Moheeb Abu Rajab, Panayiotis Mavrommatis Cybercrime 2.0: when the cloud turns dark. Search on Bibsonomy Commun. ACM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 435 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license