Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,238,897 papers from all fields of science
Search
Sign In
Create Free Account
Cybercrime
Known as:
Internet crimes
, Computer abuse
, Attacking users
Expand
Cybercrime, or computer crime, is crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Art Bowker
Botnet
Carding (fraud)
Cloud computing
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Log Analysis Techniques using Clustering in Network Forensics
I. Riadi
,
J. E. Istiyanto
,
A. Ashari
,
Subanar
arXiv.org
2013
Corpus ID: 5941287
Internet crimes are now increasing. In a row with many crimes using information technology, in particular those using Internet…
Expand
2013
2013
Preventing Phishing Attacks using One Time Password and User Machine Identification
A. Khan
arXiv.org
2013
Corpus ID: 16647151
Phishing is a type of attack in which cyber criminals tricks the victims to steal their personal and financial data. It has…
Expand
Review
2011
Review
2011
A Review of DDOS Attack and its Countermeasures in TCP Based Networks
A. Mittal
,
A. Shrivastava
,
Manish Manoria
2011
Corpus ID: 18650997
Today, Internet is the primary medium for communication which is used by number of users across the Network. At the same time…
Expand
2007
2007
Forensic computing - a practitioner's guide (2. ed.)
A. J. Sammes
,
B. Jenkinson
2007
Corpus ID: 59984651
With the advancement of the digital era, the digital crime (aka cyber crime) increasing day-by-day. This lead to the era of…
Expand
Review
2007
Review
2007
Stakeholder Value Driven Threat Modeling for Off the Shelf Based Systems
Yue Chen
International Conference on Software Engineering
2007
Corpus ID: 3008249
As the trend of the usage of third party commercial-off-the-shelf (COTS) and open source software continuously increases, COTS…
Expand
2006
2006
Computer crime law
Orin S. Kerr
2006
Corpus ID: 109430262
The third edition of Kerr's popular computer crimes text includes many updates since the second edition in 2009. New cases…
Expand
2006
2006
Winning the Battles, Losing the War? Rethinking Methodology for Forensic Computing Research
Vlasti Broucek
,
Paul Turner
Journal in Computer Virology
2006
Corpus ID: 21337972
In the last 10 years, Forensic computing (FC) has emerged in response to the challenges of illegal, criminal and other…
Expand
2004
2004
A Fuzzy Expert System for Network Forensics
Jung-Sun Kim
,
Minsoo Kim
,
Bong-Nan Noh
Communication Systems and Applications
2004
Corpus ID: 44616754
The field of digital forensic science emerged as a response to the growth of a computer crime. Digital forensics is the art of…
Expand
2000
2000
Crime, Abuse and the Elderly
M. Brogden
,
Preeti Nijhar
2000
Corpus ID: 142291299
Introduction 1. Abuse vs Crime in Criminological history 2. The mythologies of elderly victimisation 3. Stereotyping the elderly…
Expand
1985
1985
Crime Victimisation in the Republic of Ireland
1985
Corpus ID: 150520781
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE