Results 71 to 80 of about 2,468 (138)

Detecting Phishing URLs Based on a Deep Learning Approach to Prevent Cyber-Attacks

open access: yesApplied Sciences
Phishing is one of the most widely observed types of internet cyber-attack, through which hundreds of clients using different internet services are targeted every day through different replicated websites.
Qazi Emad ul Haq   +2 more
doaj   +1 more source

Cybercrime Growth and Law Enforcement Challenges in Indonesia: A Cybercriminology Perspective

open access: yesJournal of Mathematics Instruction, Social Research and Opinion
This study examines the increasing complexity of cybercrime in Indonesia, which is influenced not only by technological development but also by the interaction of individual, structural, and institutional factors in digital environments.
Kuswardani Kuswardani   +3 more
doaj   +1 more source

Darkweb research: Past, present, and future trends and mapping to sustainable development goals. [PDF]

open access: yesHeliyon, 2023
Raman R   +4 more
europepmc   +1 more source

“Cybercrime”: Fenomena Kejahatan melalui Internet di Indonesia

open access: yesMediaTor, 2005
It had been long known that technology, as Janus, has two side of coins: the good side,and the bad side. Everybody knows the benefit of technology development. But there aren’t much who realize the negative potent of technology.
Muhammad E. Fuady
doaj  

Extended editorial: preventing fraud and cybercrime in an ageing society. [PDF]

open access: yesSecur J
Button M   +4 more
europepmc   +1 more source

An overview of cybercrime law in South Africa. [PDF]

open access: yesInt Cybersecur Law Rev, 2023
Snail Ka Mtuze S, Musoni M.
europepmc   +1 more source

Home - About - Disclaimer - Privacy