نتایج جستجو برای: cyber crimes

تعداد نتایج: 23947  

Journal: :Security and Communication Networks 2011
Zhen Li Qi Liao Andrew Blaich Aaron Striegel

Botnets have become an increasing security concern in today’s Internet. Since current technological defenses against botnets have failed to produce results, it has become necessary to think about different strategies. Given that money is perhaps the single determining force driving the growth in botnet attacks, we propose an interesting economic approach to take away the root cause of botnet, i...

2012
Gaurav Kumar Tak Gaurav Ojha

The Internet, which can be defined as a huge network of networks both wired and wireless, uses the Internet Protocol Suite (TCP/IP) to make information available beyond geographical boundaries. Computing devices all through the world connect to the World Wide Web via the Client Server architecture. In this architecture, the client requests some information from a web server through a web browse...

Journal: :JCP 2012
Zhi Liu Zongkai Yang Sanya Liu Wenting Meng

With the widespread application of computer network technology, diverse anonymous cyber crimes begin to appear in the online community. The anonymous nature of online-information distribution makes writeprint identification a critical forensic problem. But the difficulty of the task is the huge number of features in even a moderate-sized available text corpus, which causes the problem of over-t...

Journal: :Science & justice : journal of the Forensic Science Society 2003
M Cox

Socio-political context A detailed examination of the socio-political context of the development and expansion of forensic anthropology and archaeology is outside the aim of this paper. For a more detailed consideration of this subject see Cox [I]. That paper considers why so many UK-based anthropologists and archaeologists seek to extend the traditional parameters of their subject beyond the a...

2014
Jatinderkumar R. Saini

Psychoanalysis of Online Behavior and Cyber Conduct of Chatters in Chat Rooms and Messenger Environments Dr. Jatinderkumar R. Saini Associate Professor & Director I/C, Narmada College of Computer Application, Bharuch, Gujarat, India. Email: [email protected] ----------------------------------------------------------------------ABSTRACT-------------------------------------------------------...

2012
R. Dhanalakshmi C. Chellappan

The World Wide Web is a very powerful and interactive medium and its surveillance is unavoidable for information dissemination. Extracting valuable information from the vast unstructured data is a challenging and critical issue. Web content mining plays an important role in solving these issues. The applications of WWW are widespread and one among it is E-Mail communication. Due to its simple a...

2008
Andrew P. Moore Dawn M. Cappelli Randall F. Trzeciak

A study conducted by the U.S. Secret Service and the Carnegie Mellon University Software Engineering Institute CERT Program analyzed 150 insider cyber crimes across U.S. critical infrastructure sectors. Follow-up work by CERT involved detailed group modeling and analysis of 30 cases of insider IT sabotage out of the 150 total cases. Insider IT sabotage includes incidents in which the insider’s ...

Introduction: Family relationships play an incredibly important role in the lives of individuals and these relationships represent the most enduring social institution This study aimed the model of structural relations of cyber-aggression based on family communication pattern with the mediating  role of addiction to Internet. Methods: This study was descriptive-correlational and the statistical...

Journal: :international journal of management and business research 2012
ismaila adeleke ade ibiwoye folake olowokudejo

this study draws attention to the ubiquitous and borderless nature of cybercrime. it examines the prospect of introducing customized cyber insurance policy in the nigerian market. as secondary data was not available, the study conducted a survey by administering three sets of questionnaire to purposively selected top executives in four trade groups that rely heavily on internet transactions for...

Kalman filtering has been widely considered for dynamic state estimation in smart grids. Despite its unique merits, the Kalman Filter (KF)-based dynamic state estimation can be undesirably influenced by cyber adversarial attacks that can potentially be launched against the communication links in the Cyber-Physical System (CPS). To enhance the security of KF-based state estimation, in this paper...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید