[HTML][HTML] Behavioral analysis of cybercrime: Paving the way for effective policing strategies

G Sarkar, SK Shukla - Journal of Economic Criminology, 2023 - Elsevier
This comprehensive survey paper offers a panoramic exploration of the dynamic realm of
cybercrime policing, encompassing a wide spectrum of intricacies from cybercrime …

[HTML][HTML] Weaponization of the growing cybercrimes inside the dark net: The question of detection and application

A Adel, M Norouzifard - Big Data and Cognitive Computing, 2024 - mdpi.com
The Dark Web is a subset of the Deep Web, requiring special browsers, the Dark Net refers
to encrypted networks, the Deep Web encompasses non-indexed online content, and …

Formulating global policies and strategies for combating criminal use and abuse of artificial intelligence

AD Samuel-Okon, O Olateju, SU Okon… - Available at SSRN …, 2024 - papers.ssrn.com
This study investigates the criminal use and abuse of artificial intelligence (AI), exploring the
effectiveness of various mitigation strategies. It employs a mixed-methods approach …

NLP-based digital forensic analysis for online social network based on system security

Z Shahbazi, YC Byun - … journal of environmental research and public …, 2022 - mdpi.com
Social media evidence is the new topic in digital forensics. If social media information is
correctly explored, there will be significant support for investigating various offenses …

Graph convolution networks for social media trolls detection use deep feature extraction

M Asif, M Al-Razgan, YA Ali, L Yunrong - Journal of Cloud Computing, 2024 - Springer
This study presents a novel approach to identifying trolls and toxic content on social media
using deep learning. We developed a machine-learning model capable of detecting toxic …

Latest technologies in criminal investigation (testing of foreign practices in Ukraine)

YP Tymoshenko, OI Kozachenko… - Amazonia …, 2022 - amazoniainvestiga.info
The aim of the article was to identify a set of innovative technologies in the field of
investigation of crimes that can be tested in Ukraine. The leading research methods were …

An automated compliance framework for critical infrastructure security through Artificial Intelligence

SM Ali, A Razzaque, M Yousaf, RU Shan - IEEE Access, 2024 - ieeexplore.ieee.org
Current data on cybercrime shows a rising influence of online threats, leading to significant
financial impacts across vital industries like finance, healthcare, and energy. These impacts …

Comprehensive review of emerging cybersecurity trends and developments

M Ibrar, S Yin, H Li, S Karim… - International Journal of …, 2024 - inderscienceonline.com
Pakistan views cyberspace as a critical source of power in the twenty-first century when
governments no longer have complete control over power games. Private entities, terrorist …

A Metamodeling Approach for Structuring and Organizing Cloud Forensics Domain

R Al-Mugerrn, A Al-Dhaqm… - … Conference on Smart …, 2023 - ieeexplore.ieee.org
Metamodeling is a technique that can be utilized in general to integrate and define models
from various cloud computing research areas. Metamodeling method is applicable in a wide …

Digital Forensic Investigation on Social Media Platforms: A Survey on Emerging Machine Learning Approaches

AA Kazaure, A Jantan, MN Yusoff - Journal of Information Science …, 2024 - koreascience.kr
An online social network is a platform that is continuously expanding, which enables groups
of people to share their views and communicate with one another using the Internet. The …