Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,328,078 papers from all fields of science
Search
Sign In
Create Free Account
Cybercrime countermeasures
Known as:
Cyber
, Cybercrime and countermeasures
, Network abuse
Cyber crime, or computer crime, refers to any crime that involves a computer and a network. The computer may have been used in the commission of a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
35 relations
Acceptable use policy
Antivirus software
Bastion host
Biometrics
Expand
Broader (1)
Cybercrime
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
Classification and technical analysis of Network Intrusion Detection Systems
Nilesh B. Nanda
,
A. Parikh
2017
Corpus ID: 201127432
System and network technology provide great convenience for rapid development. Network infrastructure devices help greatly in…
Expand
2013
2013
Medical students'online network abuse
S. Tanawattanacharoen
,
Apinut Wongkietkachorn
2013
Corpus ID: 73808669
Background: Nowadays, social networks play an important role in medical students’ life. Despite their benefits, unprofessional…
Expand
2013
2013
Efficient Statistics Based Framework for Network Intrusion Detection
Kuo-Chen Lee
,
Li Liu
,
Zhi-Jun Hsu
2013
Corpus ID: 212527690
—Due to the growing threat of network attacks, detecting and measuring network abuse are increasingly important. Network…
Expand
2012
2012
Nouvelle Approche de Corrélation d'Alertes basée sur la Fouille Multidimensionnelle
Hanen Brahmi
,
Imen Brahmi
,
S. B. Yahia
Journées Francophones sur les Entrepôts de Donn…
2012
Corpus ID: 45450792
Résumé. En réponse aux problèmes posés par la complexité croissante des réseaux et des attaques, les Systèmes de Détection d…
Expand
Review
2012
Review
2012
Effect of Social Network Abuse on Nigerian Workers
Olusegun Ajulor
,
K. Awe
,
T. A. Oduwole
2012
Corpus ID: 169461154
The study examined the detrimental effect of social network abuse on Nigerian workers. This became necessary considering Social…
Expand
2004
2004
On a Network Forensics Model For Information Security
Wei Ren
Information Systems Technology and its…
2004
Corpus ID: 38839532
The employment of a patchwork of nonintegrated security products can only provide incomplete coverage, which cannot give the…
Expand
2003
2003
Network costing
S. Bluhme
International Conference on Communication…
2003
Corpus ID: 57024045
Servicing a network and servicing it efficiently involves considerable maintenance costs. This paper concerns the accounting for…
Expand
2001
2001
Flow-based Traac Analysis at Switch
S. Leinen
2001
Corpus ID: 7942221
Flow-Based Tra c Analysis at SWITCH Simon Leinen Abstract|SWITCH has been using locally developed software for ow-based network…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required