Results 1 to 10 of about 2,522 (137)

Cyber-attack method and perpetrator prediction using machine learning algorithms [PDF]

open access: yesPeerJ Computer Science, 2021
Cyber-attacks have become one of the biggest problems of the world. They cause serious financial damages to countries and people every day. The increase in cyber-attacks also brings along cyber-crime.
Abdulkadir Bilen, Ahmet Bedri Özer
doaj   +2 more sources

Cyber Crime, Cyber Space and Effects of Cyber Crime

open access: yesInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2021
Cyberspace is a domain that uses the electronic and electromagnetic spectrum to store, modify, and exchange data through network and system-related physical infrastructures. Cyberspace is an endless space known as the Internet. Computer transactions, especially transactions between different computers, can be viewed as a space.
Sunil. C. Pawar   +2 more
openaire   +1 more source

Responsiveness of Criminal Law to Skimming Crimes in The Era of Industrial Revolution 4.0 (Four Point Zero)

open access: yesJurnal Hukum Volkgeist, 2021
This study aims to: 1)Analyze and understand the responsiveness of criminal law in entering the era of industrial revolution 4.0 (four point zero), 2)Enforcement of criminal law in cyber crime,  criminal acts in cyber crime, criminal responsibility of ...
Ahmad Suryadi
doaj   +1 more source

Cyber Terrorism Challenges : The Need for a global Mutual Legal Assistance to a Universal Jurisdiction Crime

open access: yesYustisia, 2022
Terrorism is a crime which involved more than one state to attack world peace and security. The handling of international terrorism is not only based on national law but also on international law.
Yasniar Rachmawati Madjid
doaj   +1 more source

PRAVNI OKVIR ZAŠTITE OD VISOKOTEHNOLOŠKOG KRIMINALA U BOSNI I HERCEGOVINI – analiza strateških ciljeva i mogućnost usklađivanja sa evropskom strategijom sajber bezbednosti [PDF]

open access: yesRevija za kriminologiju i krivično pravo, 2023
The topic of this paper is the legal framework for protection against high-tech crime in Bosnia and Herzegovina, with an analysis of strategic goals and the possibility of alignment with the EU Cyber Security Strategy for the Digital Decade ...
Petar Đukić
doaj   +1 more source

DrunaliaCap: Image Captioning for Drug-Related Paraphernalia With Deep Learning

open access: yesIEEE Access, 2020
Image captioning is a process of generating textual descriptions of images. In recent years, research on publicly available large-scale datasets and deep learning-based algorithms has promoted the development of this field.
Beigeng Zhao
doaj   +1 more source

Status and tendencies in combating computer crime at European level [PDF]

open access: yesZbornik Radova: Pravni Fakultet u Novom Sadu, 2011
Without certain adjustments to specifics of computer crime, as to a phenomenon of global proportions, detection, investigation and prosecution of this type of crime is almost impossible.
Pisarić Milana
doaj   +1 more source

Strategies in Countering Hoax and Hate Speech in Indonesia

open access: yesSociological Jurisprudence Journal, 2021
Hoax and Hate Speech are cyber-crimes that are closely related to ideological, political and religious issues. In Indonesia, just before the 2019 Presidential Election, this crime is very common, mainly used to attack political opponents.
Bambang Hartono   +2 more
doaj   +1 more source

Digital Investigation of IoT Devices in the Criminal Scene [PDF]

open access: yesJournal of Universal Computer Science, 2019
The Internet of Things (IoT) is everywhere around us. Smart communicating objects are offering the digitalization of lives. They create new opportunities within criminal investigations. In recent years, the scientific community sought to develop a common
François Bouchaud   +3 more
doaj   +3 more sources

Cyber Crime & Cyber War – "Part of the Game": Cyber Security, Quo Vadis?

open access: yesMedienimpulse, 2015
Welche Rolle spielt Cyber Crime gegenwärtig? Was unterscheidet Cyber Crime von Cyber War? Wie muss Cyber Security gestaltet sein, um effektiven Schutz nachhaltig zu gewährleisten?
Karl H. Stingeder
doaj   +1 more source

Home - About - Disclaimer - Privacy