Conceptualizing cybercrime: Definitions, typologies and taxonomies

K Phillips, JC Davidson, RR Farr, C Burkhardt… - Forensic sciences, 2022 - mdpi.com
Cybercrime is becoming ever more pervasive and yet the lack of consensus surrounding
what constitutes a cybercrime has a significant impact on society, legal and policy response …

[HTML][HTML] Behavioral analysis of cybercrime: Paving the way for effective policing strategies

G Sarkar, SK Shukla - Journal of Economic Criminology, 2023 - Elsevier
This comprehensive survey paper offers a panoramic exploration of the dynamic realm of
cybercrime policing, encompassing a wide spectrum of intricacies from cybercrime …

Computational system to classify cyber crime offenses using machine learning

R Ch, TR Gadekallu, MH Abidi, A Al-Ahmari - Sustainability, 2020 - mdpi.com
Particularly in the last decade, Internet usage has been growing rapidly. However, as the
Internet becomes a part of the day to day activities, cybercrime is also on the rise …

Tactics, techniques and procedures of cybercrime: A methodology and tool for cybercrime investigation process

G Sarkar, H Singh, S Kumar, SK Shukla - Proceedings of the 18th …, 2023 - dl.acm.org
Individuals, organizations and nation-states are increasingly falling victim to cyberattacks. A
lot of research on how to understand the modus operandi of a cyber attacker through the …

[PDF][PDF] Cybercrime Detection and Prevention Efforts in the Last Decade: An Overview of the Possibilities of Machine Learning Models.

PU Chinedu, W Nwankwo, FU Masajuwa… - Review of International …, 2021 - researchgate.net
According to a report titled “cyberwarfare in the c-suite” released on January 21 2021 by
Steve Morgan of the cybercrime magazine, cybercrime is projected to unleash global …

A cybercrime incident architecture with adaptive response policy

G Tsakalidis, K Vergidis, S Petridou… - Computers & Security, 2019 - Elsevier
Handling and mitigating the cybercrime incidents (CIs) have attracted significant research
attention, over the last years, due to their increasing frequency of occurrence. However, the …

Fake news incidents through the lens of the DCAM disinformation blueprint

M Rapti, G Tsakalidis, S Petridou, K Vergidis - Information, 2022 - mdpi.com
The emergence of the Internet and web technologies has magnified the occurrence of
disinformation events and the dissemination of online fake news items. Fake news is a …

Machine Learning Techniques for Cyberattack Prevention in IoT Systems: A Comparative Perspective of Cybersecurity and Cyberdefense in Colombia

E Ortiz-Ruiz, JR Bermejo, JA Sicilia, J Bermejo - Electronics, 2024 - mdpi.com
This study investigates the application of machine learning techniques for cyberattack
prevention in Internet of Things (IoT) systems, focusing on the specific context of …

Analysis and evaluation of integrated cyber crime offences

TS Sudha, C Rupa - 2019 Innovations in Power and Advanced …, 2019 - ieeexplore.ieee.org
Cyber Crime is an illegal activity in which offender makes use of the smart devices such as
computers and other network devices as the primary source in order to gain some profit from …

[PDF][PDF] Cybersecurity threats: a proposed system for assessing threat severity

G Tsakalidis, K Vergidis, M Madas… - Proceedings of the the …, 2018 - researchgate.net
The purpose of this paper is to incorporate a mechanism that labels the severity of cyber
security threats in a comprehensive framework that addresses cybercrime incidents. This …