Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,400 papers from all fields of science
Search
Sign In
Create Free Account
Cybercrime countermeasures
Known as:
Cyber
, Cybercrime and countermeasures
, Network abuse
Cyber crime, or computer crime, refers to any crime that involves a computer and a network. The computer may have been used in the commission of a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
35 relations
Acceptable use policy
Antivirus software
Bastion host
Biometrics
Expand
Broader (1)
Cybercrime
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
Classification and technical analysis of Network Intrusion Detection Systems
Nilesh B. Nanda
,
A. Parikh
2017
Corpus ID: 201127432
System and network technology provide great convenience for rapid development. Network infrastructure devices help greatly in…
Expand
2013
2013
Medical students'online network abuse
S. Tanawattanacharoen
,
Apinut Wongkietkachorn
2013
Corpus ID: 73808669
Background: Nowadays, social networks play an important role in medical students’ life. Despite their benefits, unprofessional…
Expand
2013
2013
Efficient Statistics Based Framework for Network Intrusion Detection
Kuo-Chen Lee
,
Li Liu
,
Z. Hsu
2013
Corpus ID: 212527690
—Due to the growing threat of network attacks, detecting and measuring network abuse are increasingly important. Network…
Expand
2011
2011
Social Engineering and Workplace Productivity - Balancing the Odds
Ukpe Kufre
,
S. Adekunle
2011
Corpus ID: 111077710
Apart from contending with the problems of intrusion into enterprise information platforms, organizations are also faced with the…
Expand
2009
2009
F-TAD: Traffic Anomaly Detection for Sub-networks Using Fisher Linear Discriminant
Hyunhee Park
,
Meejoung Kim
,
C. Kang
Third International Conference on Network and…
2009
Corpus ID: 15063719
Traffic anomaly detection is one of the most important technologies that should be considered in network security and…
Expand
2007
2007
Construction of Junior High Schools and Elementary Schools Wireless LAN Authentication and Encryption Management Mechanism in Taoyuan County
Shih-Kai Chuang
,
Chin-Ping Chuang
,
Hao-Cheng Yang
,
Ming-Yi Chen
,
Ming-Wen Chang
2007
Corpus ID: 55071520
With the rapid development of Internet, network infrastructure is becoming increasingly complex. After building up a complete…
Expand
2004
2004
On a Network Forensics Model For Information Security
Wei Ren
Information Systems Technology and its…
2004
Corpus ID: 38839532
The employment of a patchwork of nonintegrated security products can only provide incomplete coverage, which cannot give the…
Expand
2003
2003
Network costing
S. Bluhme
International Conference on Communication…
2003
Corpus ID: 57024045
Servicing a network and servicing it efficiently involves considerable maintenance costs. This paper concerns the accounting for…
Expand
2001
2001
Flow-based Traac Analysis at Switch
S. Leinen
2001
Corpus ID: 7942221
Flow-Based Tra c Analysis at SWITCH Simon Leinen Abstract|SWITCH has been using locally developed software for ow-based network…
Expand
1994
1994
Network abuse—a lesson from the trenches
C. Brenner
Conference on User Services
1994
Corpus ID: 29839055
At the University of Wisconsin-Eau Claire all students are issued a computer account that has unrestricted access to WkcNet, the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE