Academic literature on the topic 'Computer crimes Computer crimes Computer networks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer crimes Computer crimes Computer networks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Computer crimes Computer crimes Computer networks"
Stratonov, Vasyl. ""Computer crimes": some features and characteristics." Naukovyy Visnyk Dnipropetrovs'kogo Derzhavnogo Universytetu Vnutrishnikh Sprav 2, no. 2 (2020): 134–41. http://dx.doi.org/10.31733/2078-3566-2020-2-134-141.
Full textМ.M., Haryha, Verhun L.O., and Kuznetsov O.O. "Some aspects of criminal characteristics of cyber crimes." Scientific Herald of Sivershchyna. Series: Law 2020, no. 3 (2020): 89–99. http://dx.doi.org/10.32755/sjlaw.2020.03.089.
Full textWalden, Ian. "Harmonising Computer Crime Laws in Europe." European Journal of Crime, Criminal Law and Criminal Justice 12, no. 4 (2004): 321–36. http://dx.doi.org/10.1163/1571817042523095.
Full textRossinskaya, E. R., and I. A. Ryadovskiy. "Modern means of committing computer crimes and patterns of their execution." Lex Russica, no. 3 (April 5, 2019): 87–99. http://dx.doi.org/10.17803/1729-5920.2019.148.3.087-099.
Full textFutra, Yumelfi. "TINJAUAN PERISTIWA CYBER CRIME YANG TERJADI PADA TAHUN 2019 DI KOTA SAWAHLUNTO." UNES Law Review 3, no. 1 (2020): 55–68. http://dx.doi.org/10.31933/unesrev.v3i1.145.
Full textRostami, Soraya. "Juridical Study of Crimes Committed with Computer." Asian Social Science 12, no. 11 (2016): 79. http://dx.doi.org/10.5539/ass.v12n11p79.
Full textKlebanov, Lev R., and Svetlana V. Polubinskaya. "COMPUTER TECHNOLOGIES FOR COMMITTING SABOTAGE AND TERRORISM." RUDN Journal of Law 24, no. 3 (2020): 717–34. http://dx.doi.org/10.22363/2313-2337-2020-24-3-717-734.
Full textTkalichenko, Sergiy, Valentyna Khotskina, Zhanna Tsymbal, Victoria Solovieva, and Olena Burunova. "Modern Structural Level and Dynamics of Crimes with The Use of Computers, Automation Systems, Computer Networks and Electric Connection Systems." SHS Web of Conferences 100 (2021): 01014. http://dx.doi.org/10.1051/shsconf/202110001014.
Full textOvalle Lizcano, Tatiana Valentina, Diego Luis Coronel Peñuela, Rocío de Belén Contreras Manrique, and Alfonso Cabrera Reyes. "Impact on personal security against the regulation of cybercrime at the University of Pamplona, Villa del Rosario headquarters." Respuestas 24, no. 3 (2019): 14–25. http://dx.doi.org/10.22463/0122820x.1845.
Full textTariq, Haseeb, Muhammad Kashif Hanif, Muhammad Umer Sarwar, Sabeen Bari, Muhammad Shahzad Sarfraz, and Rozita Jamili Oskouei. "Employing Deep Learning and Time Series Analysis to Tackle the Accuracy and Robustness of the Forecasting Problem." Security and Communication Networks 2021 (March 31, 2021): 1–10. http://dx.doi.org/10.1155/2021/5587511.
Full textDissertations / Theses on the topic "Computer crimes Computer crimes Computer networks"
Costantini, Kevin C. "Development of a cyber attack simulator for network modeling and cyber security analysis /." Online version of thesis, 2007. http://hdl.handle.net/1850/5440.
Full textSanyamahwe, Tendai. "Digital forensic model for computer networks." Thesis, University of Fort Hare, 2011. http://hdl.handle.net/10353/d1000968.
Full textArgauer, Brian John. "VTAC : virtual terrain assisted impact assessment for cyber attacks /." Online version of thesis, 2007. http://hdl.handle.net/1850/4872.
Full textVan, Heerden Renier Pelser. "A formalised ontology for network attack classification." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011603.
Full textSeeley, Nathaniel. "Digital receipts : a system to detect the compromise of digital certificates /." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1590.pdf.
Full textFava, Daniel Schnetzer. "Characterization of cyber attacks through variable length Markov models /." Online version of thesis, 2007. http://hdl.handle.net/1850/4776.
Full textFoster, Mark S. "Process forensics the crossroads of checkpointing and intrusion detection /." [Gainesville, Fla.] : University of Florida, 2004. http://purl.fcla.edu/fcla/etd/UFE0008063.
Full textLee, Christopher Patrick. "Framework for botnet emulation and analysis." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/28191.
Full textJudd, Aaron C. "Improved Network Security and Disguising TCP/IP Fingerprint Through Dynamic Stack Modification /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FJudd.pdf.
Full textKortjan, Noloxolo. "A cyber security awareness and education framework for South Africa." Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1014829.
Full textBooks on the topic "Computer crimes Computer crimes Computer networks"
Vacca, John R. Computer forensics: Computer crime scene investigation. 3rd ed. Jones and Bartlett Publishers, 2010.
Find full textComputer forensics: Computer crime scene investigation. 2nd ed. Charles River Media, 2005.
Find full textauthor, Rudolph K., Tittel Ed author, Broom Neil author, and Barrett Diane author, eds. Computer forensics jumpstart. Wiley Publishing, Inc., 2011.
Find full textBranigan, Steven. High-tech crimes revealed: Cyberwar stories from the digital front. Addison-Wesley, 2005.
Find full textHigh-tech crimes revealed: Cyberwar stories from the digital front. Addison-Wesley, 2005.
Find full textCasey, Eoghan. Digital evidence and computer crime: Forensic science, computers and the Internet. Academic, 2000.
Find full textDigital evidence and computer crime: Forensic science, computers and the Internet. Academic, 1999.
Find full textDigital evidence and computer crime: Forensic science, computers, and the Internet. 2nd ed. Academic Press, 2004.
Find full textDenning, Peter J. Threats and countermeasures for network security. Research Institute for Advanced Computer Science, NASA Ames Research Center, 1989.
Find full textBook chapters on the topic "Computer crimes Computer crimes Computer networks"
Kizza, Joseph Migga. "Computer Networks and Online Crimes." In Texts in Computer Science. Springer London, 2010. http://dx.doi.org/10.1007/978-1-84996-038-0_12.
Full textKizza, Joseph Migga. "Cyber Crimes and Hackers." In Guide to Computer Network Security. Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_5.
Full textKizza, Joseph Migga. "Cyber Crimes and Hackers." In Guide to Computer Network Security. Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4543-1_5.
Full textKizza, Joseph Migga. "Cyber Crimes and Hackers." In Guide to Computer Network Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-55606-2_5.
Full textPatra, Manas Ranjan, and Bipin Bihari Jayasingh. "A Software Agent Based Approach for Fraud Detection in Network Crimes." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30176-9_40.
Full textKizza, Joseph Migga. "Computer Crimes." In Texts in Computer Science. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70712-9_9.
Full textKizza, Joseph Migga. "Computer Crimes." In Texts in Computer Science. Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-4990-3_9.
Full textKizza, Joseph Migga. "Computer Crimes." In Undergraduate Topics in Computer Science. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-03937-0_8.
Full textKizza, Joseph Migga. "Computer Crimes." In Texts in Computer Science. Springer London, 2010. http://dx.doi.org/10.1007/978-1-84996-038-0_9.
Full textKizza, Joseph Migga. "Computer Crimes." In Ethics in Computing. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29106-2_8.
Full textConference papers on the topic "Computer crimes Computer crimes Computer networks"
Zhu, Shijie. "Research of Computer Network Crimes Investigation and Legal Supervision Measures." In 2016 2nd International Conference on Education, Social Science, Management and Sports (ICESSMS 2016). Atlantis Press, 2017. http://dx.doi.org/10.2991/icessms-16.2017.4.
Full textArias, Alejandra Ivone, and Mario Jose Divan. "Contributions to the Genre Violence Analysis in Jujuy: Initial Characterization of Crimes." In 2019 4th International Conference on Information Systems and Computer Networks (ISCON). IEEE, 2019. http://dx.doi.org/10.1109/iscon47742.2019.9036189.
Full textZaliwski, Andrzej. "Computer Network Simulation and Network Security Auditing in a Spatial Context of an Organization." In InSITE 2005: Informing Science + IT Education Conference. Informing Science Institute, 2005. http://dx.doi.org/10.28945/2857.
Full textKizza, Joseph M. "Combating computer crimes." In the conference. ACM Press, 1994. http://dx.doi.org/10.1145/199544.199609.
Full textQuintiliano, Paulo. "Crimes Cibernéticos e seus Efeitos Internacionais." In First International Conference on Forensic Computer Science. ABEAT, 2006. http://dx.doi.org/10.5769/c2006002.
Full textBueno, Pedro. "Cyber Crimes - a trilha do dinheiro." In First International Conference on Forensic Computer Science. ABEAT, 2006. http://dx.doi.org/10.5769/c2006013.
Full textIanelli, Nicholas, and Aaron Hackworth. "Botnets as a Vehicle for Online Crimes." In First International Conference on Forensic Computer Science. ABEAT, 2006. http://dx.doi.org/10.5769/c2006003.
Full textCarvalho, Ana, Fernando Sousa, José Neto, Paulo Neves, Rafael Fragoso, and Rodolfo Mazzonetto. "Crimes da Informática no Código Penal Brasileiro." In The Third International Conference on Forensic Computer Science. ABEAT, 2008. http://dx.doi.org/10.5769/c2008010.
Full textJian, Shuyi, and Hongyan Chen. "Legal explore & analyse on computer and cyber crime." In 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet). IEEE, 2012. http://dx.doi.org/10.1109/cecnet.2012.6201653.
Full textOlinder, Nina, and Aleksej Tsvetkov. "Leading Forensic and Sociological Aspects in Investigating Computer Crimes." In 6th International Conference on Social, economic, and academic leadership (ICSEAL-6-2019). Atlantis Press, 2020. http://dx.doi.org/10.2991/assehr.k.200526.037.
Full text