A survey of cyber crimes

@article{Zhang2012ASO,
  title={A survey of cyber crimes},
  author={Yanping Zhang and Yang Xiao and Kaveh Ghaboosi and Jingyuan Zhang and Hongmei Deng},
  journal={Secur. Commun. Networks},
  year={2012},
  volume={5},
  pages={422-437}
}
With the advancement of computer and information technology, cyber crime is now becoming one of the most significant challenges facing law enforcement organizations. Cyber crimes are generally referred as criminal activities that use computers or networks. An understanding of the characteristics and nature of cyber crimes is important in helping research communities find ways to effectively prevent them. Most existing research focuses more on attacks and attack models, including either actual… Expand
A Unified Modeling Language Model for Occurrence and Resolving of Cyber Crime
In the current scenario, distributed computing systems play significant role for accessing the various kinds of internet services. The different handheld devices like palmtop, laptop, mobile, etc.Expand
The Major Traits of Cyber Security: Case Study on Server Hardening
Information in and around the globe has so much to be linked up with the cyber infrastructure. This sophisticated infrastructure is said to be secure to some extent, perhaps the vulnerabilitiesExpand
Making cyber security interdisciplinary : recommendations for a novel curriculum and terminology harmonization
Cyber security was historically a technical subfield of computer science. However, pervasive computing technology has recently made security a significant concern for management and policy. In thisExpand
An Uncomfortable Change: Shifting Perceptions to Establish Pragmatic Cyber Security
The challenges that a lack of conventionally conceptualized borders in Cyberspace create are increasing in scale and form. This position paper evaluates through the myriad of reasons for thisExpand
Comparative Analysis of Danger Theory Variants in Measuring Risk Level for Text Spam Messages
TLDR
The findings of this work have demonstrated the feasibility of immune theory in risk measurement that eventually assisting users in their decision making in terms of identifying the imminent danger of received text spam. Expand
Assessment of cyberbullying factors among secondary school students in Malaysia
TLDR
The results indicate that the type of schools has significant impact to cyberbullying, and this study focuses on different types of secondary school in Malaysia. Expand
A Novel Network Security Risk Assessment Approach by Combining Subjective and Objective Weights under Uncertainty
Nowadays, computer networks are playing a more and more important role in people’s daily lives. Meanwhile, the security of computer networks has also attracted widespread concern. However, up to now,Expand
Enterprise security pattern: a new type of security pattern
TLDR
This paper defines the metapattern of a new type of security pattern called Enterprise Security Pattern, which provides a model-driven environment and combines all elements that must be considered when designing and building ESAs. Expand
Security Issues in ProtoGENI
TLDR
Existing ProtoGENI security mechanisms and functions are tested and analyzed through different experiments to find out the exploitable attacking loopholes and results indicate threats to Proto GENI resources and run-time interactions. Expand
Adversarial Sampling Attacks Against Phishing Detection
TLDR
This work proposes a simple but effective approach to simulate attacks by generating adversarial samples through direct feature manipulation, and defines the concept of vulnerability level for each dataset that measures the number of features that can be manipulated and the cost for each manipulation. Expand
...
1
2
...

References

SHOWING 1-10 OF 181 REFERENCES
Scene of the Cybercrime
TLDR
Scene of the Cybercrime, Second Edition is a completely revised and updated book which covers all of the technological, legal, and regulatory changes, which have occurred since the first edition. Expand
Cybercrime: Investigating High-Technology Computer Crime
This innovative text provides an excellent introduction to technology-assisted crime and the basics of investigating such crime, from the criminal justice perspective. It presents clear, conciseExpand
Analysing security risks in computer and Radio Frequency Identification (RFID) networks using attack and protection trees
TLDR
This work proposes the use of protection trees to offer a detailed risk analysis in the protection of a system to mitigate the vulnerabilities found. Expand
Identity Theft
On February 7, 2005, the Federal Trade Commission reported that at least 10 million Americans are affected by identity (ID) theft each year[7]. The US Department of Justice defines identity theft asExpand
An exploration of predatory behaviour in cyberspace: Towards a typology of cyberstalkers
TLDR
A typology of cyberstalkers was developed and victims were interviewed and their responses logged on a 76-item Cyberstalking Incident Checklist. Expand
An adaptive expert system approach for intrusion detection
TLDR
This paper presents an adaptive expert system for intrusion detection that utilises fuzzy sets that has the ability to adapt to the type and/or degree of threat and is relatively simple to implement when used with computer system networks. Expand
Analysis of flow-correlation attacks in anonymity network
TLDR
This analysis quantitatively reveals how, under certain situations, existing flow-based anonymous systems would fail under flow-correlation attacks, thus providing useful guidelines for the design of future anonymous systems. Expand
Current information on the scope and nature of child sexual abuse.
TLDR
Overall, there is little evidence to suggest that either the child welfare system or the criminal justice system abandons its usual standards of operation and acts hysterically when confronted with sexual abuse. Expand
Online "Predators" and Their Victims
The publicity about online 'predators' who prey on naive children using trickery and violence is largely inaccurate. Internet sex crimes involving adults and juveniles more often fit a model ofExpand
Enhancing Intrusion Detection System with proximity information
TLDR
This work proposes PAIDS, a proximity-assisted IDS approach for identifying the outbreak of unknown worms, operating on an orthogonal dimension with existing IDSes, which has high detection rates and low false-positive rates. Expand
...
1
2
3
4
5
...