Detecting Phishing URLs Based on a Deep Learning Approach to Prevent Cyber-Attacks
Phishing is one of the most widely observed types of internet cyber-attack, through which hundreds of clients using different internet services are targeted every day through different replicated websites.
Qazi Emad ul Haq +2 more
doaj +1 more source
Cybercrime Growth and Law Enforcement Challenges in Indonesia: A Cybercriminology Perspective
This study examines the increasing complexity of cybercrime in Indonesia, which is influenced not only by technological development but also by the interaction of individual, structural, and institutional factors in digital environments.
Kuswardani Kuswardani +3 more
doaj +1 more source
Darkweb research: Past, present, and future trends and mapping to sustainable development goals. [PDF]
Raman R +4 more
europepmc +1 more source
“Cybercrime”: Fenomena Kejahatan melalui Internet di Indonesia
It had been long known that technology, as Janus, has two side of coins: the good side,and the bad side. Everybody knows the benefit of technology development. But there aren’t much who realize the negative potent of technology.
Muhammad E. Fuady
doaj
The Legal Regulation of Cybercrimes related to Character Assassination under the Jordanian and French Legislation. [PDF]
Al-Rai A, Imad D, Khater M.
europepmc +1 more source
Digital arrest in the cyber age: a psychological perspective on fear, authority, and consciousness. [PDF]
Robert SJ, Singh V, Pandey RP, Bhuyan B.
europepmc +1 more source
Cybersecurity as it relates to perfusion. [PDF]
Lung K.
europepmc +1 more source
Extended editorial: preventing fraud and cybercrime in an ageing society. [PDF]
Button M +4 more
europepmc +1 more source
An overview of cybercrime law in South Africa. [PDF]
Snail Ka Mtuze S, Musoni M.
europepmc +1 more source

