Victims of cybercrime in Europe: A review of victim surveys

CMM Reep-van den Bergh, M Junger - Crime science, 2018 - Springer
Objectives Review the evidence provided by victim surveys in order to provide a rough
estimate of the personal crime prevalence of the main types of cybercrime. Methods We …

Economic impact of IoT cyber risk-analysing past and present to predict the future developments in IoT risk analysis and IoT cyber insurance

P Radanliev, D De Roure, S Cannady… - Living in the Internet of …, 2018 - IET
This paper is focused on map** the current evolution of Internet of Things (IoT) and its
associated cyber risks for the Industry 4.0 (I4. 0) sector. We report the results of a qualitative …

[HTML][HTML] Future developments in cyber risk assessment for the internet of things

P Radanliev, DC De Roure, R Nicolescu, M Huth… - Computers in …, 2018 - Elsevier
This article is focused on the economic impact assessment of Internet of Things (IoT) and its
associated cyber risks vectors and vertices–a reinterpretation of IoT verticals. We adapt to …

A hybrid anomaly classification with deep learning (DL) and binary algorithms (BA) as optimizer in the intrusion detection system (IDS)

K Atefi, H Hashim, T Khodadadi - 2020 16th IEEE international …, 2020 - ieeexplore.ieee.org
Nowadays, along with network development, due to the threats of unknown sources,
information communication is more vulnerable, and thus, more secured information is …

A network monitoring model based on convolutional neural networks for unbalanced network activity

AS Reddy, SP Praveen, GB Ramudu… - … on Smart Systems …, 2023 - ieeexplore.ieee.org
Networks play an important part in present life. Cybersecurity is critical to network
information security. A network monitoring mechanism that observes and recognizes every …

Know your cybercriminal: Evaluating attacker preferences by measuring profile sales on an active, leading criminal market for user impersonation at scale

M Campobasso, L Allodi - 32nd USENIX Security Symposium (USENIX …, 2023 - usenix.org
In this paper we exploit market features proper of a leading Russian cybercrime market for
user impersonation at scale to evaluate attacker preferences when purchasing stolen user …

Anomaly analysis for the classification purpose of intrusion detection system with K-nearest neighbors and deep neural network

K Atefi, H Hashim, M Kassim - 2019 IEEE 7th conference on …, 2019 - ieeexplore.ieee.org
Nowadays, along with network development, due to the threats of unknown sources,
information communication is more vulnerable and require more secured information. An …

Navigating the cyber landscape: A framework for transitioning from business continuity to digital resilience

S Zighan - 2024 2nd International Conference on Cyber …, 2024 - ieeexplore.ieee.org
This conceptual research paper highlights the need for organizations to evolve beyond
traditional business continuity and cybersecurity approaches in the face of escalating digital …

Latent groups of cybersecurity preparedness in Europe: Sociodemographic factors and country-level contexts

CS Lee, JH Kim - Computers & Security, 2020 - Elsevier
The increase of people's online presence creates additional cybersecurity threats.
Cybersecurity preparedness is increasingly important to minimize and mitigate cybersecurity …

Econometric models for estimating the financial effect of cybercrimes

O Kovalchuk, M Shynkaryk… - 2021 11th international …, 2021 - ieeexplore.ieee.org
Technological progress has changed our world beyond recognition. However, along with
the incredible benefits and conveniences we have received new dangers and risks …