Journal articles on the topic 'Computer crimes Computer crimes Computer networks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Computer crimes Computer crimes Computer networks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Stratonov, Vasyl. ""Computer crimes": some features and characteristics." Naukovyy Visnyk Dnipropetrovs'kogo Derzhavnogo Universytetu Vnutrishnikh Sprav 2, no. 2 (2020): 134–41. http://dx.doi.org/10.31733/2078-3566-2020-2-134-141.
Full textМ.M., Haryha, Verhun L.O., and Kuznetsov O.O. "Some aspects of criminal characteristics of cyber crimes." Scientific Herald of Sivershchyna. Series: Law 2020, no. 3 (2020): 89–99. http://dx.doi.org/10.32755/sjlaw.2020.03.089.
Full textWalden, Ian. "Harmonising Computer Crime Laws in Europe." European Journal of Crime, Criminal Law and Criminal Justice 12, no. 4 (2004): 321–36. http://dx.doi.org/10.1163/1571817042523095.
Full textRossinskaya, E. R., and I. A. Ryadovskiy. "Modern means of committing computer crimes and patterns of their execution." Lex Russica, no. 3 (April 5, 2019): 87–99. http://dx.doi.org/10.17803/1729-5920.2019.148.3.087-099.
Full textFutra, Yumelfi. "TINJAUAN PERISTIWA CYBER CRIME YANG TERJADI PADA TAHUN 2019 DI KOTA SAWAHLUNTO." UNES Law Review 3, no. 1 (2020): 55–68. http://dx.doi.org/10.31933/unesrev.v3i1.145.
Full textRostami, Soraya. "Juridical Study of Crimes Committed with Computer." Asian Social Science 12, no. 11 (2016): 79. http://dx.doi.org/10.5539/ass.v12n11p79.
Full textKlebanov, Lev R., and Svetlana V. Polubinskaya. "COMPUTER TECHNOLOGIES FOR COMMITTING SABOTAGE AND TERRORISM." RUDN Journal of Law 24, no. 3 (2020): 717–34. http://dx.doi.org/10.22363/2313-2337-2020-24-3-717-734.
Full textTkalichenko, Sergiy, Valentyna Khotskina, Zhanna Tsymbal, Victoria Solovieva, and Olena Burunova. "Modern Structural Level and Dynamics of Crimes with The Use of Computers, Automation Systems, Computer Networks and Electric Connection Systems." SHS Web of Conferences 100 (2021): 01014. http://dx.doi.org/10.1051/shsconf/202110001014.
Full textOvalle Lizcano, Tatiana Valentina, Diego Luis Coronel Peñuela, Rocío de Belén Contreras Manrique, and Alfonso Cabrera Reyes. "Impact on personal security against the regulation of cybercrime at the University of Pamplona, Villa del Rosario headquarters." Respuestas 24, no. 3 (2019): 14–25. http://dx.doi.org/10.22463/0122820x.1845.
Full textTariq, Haseeb, Muhammad Kashif Hanif, Muhammad Umer Sarwar, Sabeen Bari, Muhammad Shahzad Sarfraz, and Rozita Jamili Oskouei. "Employing Deep Learning and Time Series Analysis to Tackle the Accuracy and Robustness of the Forecasting Problem." Security and Communication Networks 2021 (March 31, 2021): 1–10. http://dx.doi.org/10.1155/2021/5587511.
Full textAmbika, Dr T., and Dr K. Senthilvel. "Cyber Crimes against the State: A Study on Cyber Terrorism in India." Webology 17, no. 2 (2020): 65–72. http://dx.doi.org/10.14704/web/v17i2/web17016.
Full textRiadi, Imam, Sunardi Sunardi, and Muhamad Ermansyah Rauli. "Identifikasi Bukti Digital WhatsApp pada Sistem Operasi Proprietary Menggunakan Live Forensics." Jurnal Teknik Elektro 10, no. 1 (2018): 18–22. http://dx.doi.org/10.15294/jte.v10i1.14070.
Full textPadirayon, Lourdes M., Melvin S. Atayan, Jose Sherief Panelo, and Carlito R. Fagela, Jr. "Mining the crime data using naïve Bayes model." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 2 (2021): 1084. http://dx.doi.org/10.11591/ijeecs.v23.i2.pp1084-1092.
Full textHu, Jing Fang, and Bu Sheng Li. "Research the Computer Forensics Based on Network." Advanced Materials Research 694-697 (May 2013): 2282–85. http://dx.doi.org/10.4028/www.scientific.net/amr.694-697.2282.
Full textMartínez-Mascorro, Guillermo A., José R. Abreu-Pederzini, José C. Ortiz-Bayliss, Angel Garcia-Collantes, and Hugo Terashima-Marín. "Criminal Intention Detection at Early Stages of Shoplifting Cases by Using 3D Convolutional Neural Networks." Computation 9, no. 2 (2021): 24. http://dx.doi.org/10.3390/computation9020024.
Full textKirilenko, Viktor, and Georgy Alekseev. "The Harmonization of Russian Criminal Legislation on Counteracting Cybercrime with the Legal Standards of the Council of Europe." Russian Journal of Criminology 14, no. 6 (2020): 898–913. http://dx.doi.org/10.17150/2500-4255.2020.14(6).898-913.
Full textKu, Chih-Hao, and Gondy Leroy. "A crime reports analysis system to identify related crimes." Journal of the American Society for Information Science and Technology 62, no. 8 (2011): 1533–47. http://dx.doi.org/10.1002/asi.21552.
Full textArkhipova, E. A., and V. N. Dodonov. "International Legal Problems of Cooperation in the Detection, Investigation and Prevention of Crimes Committed Using Information and Telecommunication Networks and in the Field of Computer Information." Moscow Journal of International Law, no. 2 (November 19, 2020): 77–87. http://dx.doi.org/10.24833/0869-0049-2020-2-77-87.
Full textPlotnikova, T. V., and O. V. Kotelnikova. "The Phenomenon of Cybercrime in the 21st Century." Pravo: istoriya i sovremennost', no. 3(12) (2020): 141–50. http://dx.doi.org/10.17277/pravo.2020.03.pp.141-150.
Full textKotwal, Shallu, and Jatinder Manhas. "Investigation of Different Constraints in Cybercrime & Digital Forensics." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (2017): 222. http://dx.doi.org/10.23956/ijarcsse/v7i7/0209.
Full textGonov, Shamil Khasanovich, and Anton Vladimirovich Milovanov. "Topical questions of crime prevention in the Darknet." Полицейская и следственная деятельность, no. 1 (January 2021): 26–34. http://dx.doi.org/10.25136/2409-7810.2021.1.34560.
Full textSolovyev, V. S., and M. N. Urda. "Importance of the Internet in Illegal Migration and Migration Crimes Determination." Actual Problems of Russian Law 1, no. 12 (2020): 114–22. http://dx.doi.org/10.17803/1994-1471.2019.109.12.114-122.
Full textPANDELICĂ, Ioana-Lucia. "The Phenomenon of Cyber Crime." International Journal of Information Security and Cybercrime 9, no. 1 (2020): 29–36. http://dx.doi.org/10.19107/ijisc.2020.01.04.
Full textDronova, Olga Borisovna, Aleksey Aleksandrovich Kurin, Anna Pavlovna Alekseeva, Dmitriy Nikolaevich Sidorenko, and Svetlana Dmitrievna Guseva. "Information and analytical support for the detection and investigation of crimes." SHS Web of Conferences 108 (2021): 04010. http://dx.doi.org/10.1051/shsconf/202110804010.
Full textLydia Jane G. and Seetha Hari. "Crime Prediction Using Twitter Data." International Journal of e-Collaboration 17, no. 3 (2021): 62–74. http://dx.doi.org/10.4018/ijec.2021070104.
Full textSamoilenko, Olena, and Kateryna Titunina. "Internet fraud: technologies of performance, ways of counteraction and prevention." ScienceRise: Juridical Science, no. 2(16) (June 30, 2021): 65–70. http://dx.doi.org/10.15587/2523-4153.2021.235769.
Full textZahoor, Rashida, and Naseem Razi. "Cyber-Crimes and Cyber Laws of Pakistan: An Overview." Progressive Research Journal of Arts & Humanities (PRJAH) 2, no. 2 (2020): 133–43. http://dx.doi.org/10.51872/prjah.vol2.iss2.43.
Full textMalov, Aleksandr A. "INTERNATIONAL LAW STANDARDS FOR OBTAINING OF ELECTRONIC EVIDENCE FROM FOREIGN JURISDICTIONS." International criminal law and international justice 1 (January 14, 2021): 19–23. http://dx.doi.org/10.18572/2071-1190-2021-1-19-23.
Full textGerasimenko, N. I. "Specifics of using the Internet in the investigation of extremist crimes." Penitentiary Science 14, no. 3 (2020): 388–93. http://dx.doi.org/10.46741/2686-9764-2020-14-3-388-393.
Full textKagawa, Takuhiro, Sachio Saiki, and Masahide Nakamura. "Analyzing street crimes in Kobe city using PRISM." International Journal of Web Information Systems 15, no. 2 (2019): 183–200. http://dx.doi.org/10.1108/ijwis-04-2018-0032.
Full textPutri, M.Kom, Anggia Dasa. "SISTEM PAKAR MENDETEKSI TINDAK PIDANA CYBERCRIME MENGGUNAKAN METODE FORWARD CHAINING BERBASIS WEB DI KOTA BATAM." Edik Informatika 3, no. 2 (2017): 197–210. http://dx.doi.org/10.22202/ei.2017.v3i2.2244.
Full textGilmanov, Eduard, and Danila Kirpichnikov. "On the need to develop a methodology for investigating crimes in the field of digital information circulation." Current Issues of the State and Law, no. 14 (2020): 262–77. http://dx.doi.org/10.20310/2587-9340-2020-4-14-262-277.
Full textBorysova, L., P. Bilenchuk, M. Malii, and V. Vynohradova. "EXAMINATION AS A MEANS OF ESTABLISHING THE FACTS AND CIRCUMSTANCES OF COMMISSION OF TRANSNATIONAL COMPUTER CRIMES." Criminalistics and Forensics, no. 65 (May 18, 2020): 230–39. http://dx.doi.org/10.33994/kndise.2020.65.22.
Full textSuryadi, Ahmad. "Responsiveness of Criminal Law to Skimming Crimes in The Era of Industrial Revolution 4.0 (Four Point Zero)." Jurnal Hukum Volkgeist 5, no. 2 (2021): 130–42. http://dx.doi.org/10.35326/volkgeist.v5i2.845.
Full textOlukolu, Rasul Oriyomi. "An Assessment of the Impact of Municipal Laws on the Policing of Cybercrimes in Nigeria." African Journal of Legal Studies 11, no. 2-3 (2018): 234–53. http://dx.doi.org/10.1163/17087384-12340034.
Full textKhatun, Most Rokeya, Safial Islam Ayon, Md Rahat Hossain, and Md Jaber Alam. "Data mining technique to analyse and predict crime using crime categories and arrest records." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 2 (2021): 1052. http://dx.doi.org/10.11591/ijeecs.v22.i2.pp1052-1060.
Full textGribina, E., and E. Savchenko. "UK Revenue Service Best Practices for Fighting Tax Evasion." Auditor 7, no. 6 (2021): 41–45. http://dx.doi.org/10.12737/1998-0701-2021-7-6-41-45.
Full textRossinskaya, E. R., and A. I. Semikalenova. "Counterfeit Information and Computer Product as an Object of Forensic Research of Computer Tools and Systems." Lex Russica, no. 8 (August 25, 2020): 86–95. http://dx.doi.org/10.17803/1729-5920.2020.165.8.086-095.
Full textShut, Oksana A. "Fraud in Social Networks and Ways to Implement." Herald of Omsk University. Series: Law 17, no. 4 (2020): 97–106. http://dx.doi.org/10.24147/1990-5173.2020.17(4).97-106.
Full textBaird, Lindsay. "The Detection of Crimes and Errors and Omissions." EDPACS 29, no. 3 (2001): 1–8. http://dx.doi.org/10.1201/1079/43274.29.3.20010901/31729.1.
Full textVolinsky, Alexander Fomich, and Vladimir Antonovich Prorvich. "Features of Formation of Integrated Legal Foundation for Electronic Litigation on Crimesin the Sphere of Eco." Russian Journal of Legal Studies 6, no. 1 (2019): 149–58. http://dx.doi.org/10.17816/rjls18487.
Full textSONG, RONGGONG, LARRY KORBA, GEORGE YEE, and YING-CHIEH CHEN. "PROTECT VIRTUAL PROPERTY IN ONLINE GAMING SYSTEM." International Journal of Software Engineering and Knowledge Engineering 17, no. 04 (2007): 483–96. http://dx.doi.org/10.1142/s0218194007003367.
Full textStevanovic, Ivana. "Criminal acts related to the exploitation of child pornography through abuse of computer systems and networks: International and domestic criminal legislation framework." Temida 12, no. 3 (2009): 27–41. http://dx.doi.org/10.2298/tem0903027s.
Full textMaimon, D., A. Kamerdze, M. Cukier, and B. Sobesto. "Daily Trends and Origin of Computer-Focused Crimes Against a Large University Computer Network: An Application of the Routine-Activities and Lifestyle Perspective." British Journal of Criminology 53, no. 2 (2013): 319–43. http://dx.doi.org/10.1093/bjc/azs067.
Full textStéphano Rufino Belezzi, Hugo. "AS NOVAS MODALIDADES DE CRIMES CIBERNÉTICOS: O CYBERBULLYING, VINGANÇA PORNOGRÁFICA E A INTERNET PROFUNDA (DEEP WEB)." Colloquium Socialis 2, Especial 2 (2018): 154–61. http://dx.doi.org/10.5747/cs.2018.v02.nesp2.s0271.
Full textЕфремов, Андрей, and Andrey Efremov. "THE DEVELOPMENT OF THE USA LEGISLATION ON THE FIGHT AGAINST TERRORISM AFTER 11 SEPTEMBER 2001." Journal of Foreign Legislation and Comparative Law 3, no. 3 (2017): 86–92. http://dx.doi.org/10.12737/article_593fc343c391e2.71878517.
Full textWahyono, Irawan Dwi, Djoko Saryono, Khoirudin Asfani, Muhammad Ashar, and Sunarti Sunarti. "Smart Online Courses Using Computational Intelligence." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 12 (2020): 29. http://dx.doi.org/10.3991/ijim.v14i12.15601.
Full textDumchykov, M. "THE PROCESSES OF DIGITIZATION AND FORENSICS: A RETROSPECTIVE ANALYSIS." Criminalistics and Forensics, no. 65 (May 18, 2020): 100–108. http://dx.doi.org/10.33994/kndise.2020.65.10.
Full textNurdin, Rizki. "ANALISA KEAMANAN INTERNET MENGGUNAKAN NESSUS DAN ETHEREAL UNIVERSITAS PUTRA INDONESIA “YPTK” PADANG." Jurnal Teknologi Informasi dan Pendidikan 10, no. 3 (2018): 11–25. http://dx.doi.org/10.24036/tip.v10i3.9.
Full textSalhi, Dhai Eddine, Abdelkamel Tari, and Mohand Tahar Kechadi. "Email Classification for Forensic Analysis by Information Gain Technique." International Journal of Software Science and Computational Intelligence 13, no. 4 (2021): 40–53. http://dx.doi.org/10.4018/ijssci.2021100103.
Full text