Results 71 to 80 of about 20,944 (204)
INTERNATIONAL AND REGIONAL ORGANIZATIONS WITH ATTRIBUTES AND PREOCCUPATIONS IN PREVENTING AND FIGHTING AGAINST CYBERCRIME AND THEIR MAIN ACCOMPLISHMENTS [PDF]
At global level, there are various organizations which are constantly concerned with the analysis of the latest manifestations and evolution of cybercrime, setting up work groups to develop strategies for the prevention and fight of cybercrimes.
Gheorghe-Iulian Ioniţă +1 more
core
Formally Specifying and Proving Operational Aspects of Forensic Lucid in Isabelle [PDF]
A Forensic Lucid intensional programming language has been proposed for intensional cyberforensic analysis. In large part, the language is based on various predecessor and codecessor Lucid dialects bound by the higher-order intensional logic (HOIL) that ...
Mokhov, Serguei A., Paquet, Joey
core +2 more sources
The Federal Information Security Management Act of 2002: A Potemkin Village [PDF]
Due to the daunting possibilities of cyberwarfare, and the ease with which cyberattacks may be conducted, the United Nations has warned that the next world war could be initiated through worldwide cyberattacks between countries.
White, Daniel M.
core +1 more source
Malware Detection using Machine Learning and Deep Learning
Research shows that over the last decade, malware has been growing exponentially, causing substantial financial losses to various organizations. Different anti-malware companies have been proposing solutions to defend attacks from these malware.
A Nappa +6 more
core +1 more source
Cyber-crime Science = Crime Science + Information Security [PDF]
Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science.
Hartel, Pieter +2 more
core +2 more sources
The objective of the second protocol is to strengthen cooperation in cybercrime and the collection of electronic evidence of crimes for the purpose of specific criminal investigations or proceedings.
Adrian Cristian Moise
doaj +1 more source
Scopul principal al acestui studiu nu este de a releva regulile generale ale admisibilităţii probelor (pentru că pornim de la supoziţia că acesta este un fapt cunoscut de cititori), ci reprezintă un studiu cu privire la problemele specifice ale ...
Svetlana PURICI
doaj
Cyber Threats in the European Space. Security Measures at the Level of the European Union
Cybercrime is taking on new global dimensions, with more and more criminals turning to technological services and tools both to plan and to commit crimes. Electronic evidence is becoming vital to crime fighting, both in tracking and convicting criminals.
Carmina Tolbaru
doaj +1 more source
A shared agenda for the Seoul Conference on Cyberspace, South Korea, 2013 [PDF]
This briefing is ASPI’s distillation of the thoughts of a group of prominent members of the Australian cybersecurity community. We held a workshop in Canberra on the key panel sessions that will take place at the Seoul Conference on Cyberspace, South ...
Jessica Woodall +2 more
core
Face Off: An Examination of State Biometric Privacy Statutes & Data Harm Remedies [PDF]
As biometric authentication becomes an increasingly popular method of security among consumers, only three states currently have statutes detailing how such data may be collected, used, retained, and released.
Rivera, Michael A.
core +1 more source

