Academic literature on the topic 'Crypto crime'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Crypto crime.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Crypto crime"

1

G'ulommamatova, Parvina. "Crypto-Asset Laundering is a Fraud Crime." Uzbek Journal of Law and Digital Policy 3, no. 2 (2025): 34–44. https://doi.org/10.59022/ujldp.315.

Full text
Abstract:
The proliferation of crypto-assets has generated both innovation in digital finance and new avenues for criminal exploitation. Among these, crypto-asset laundering has emerged as a critical threat to financial integrity, involving the deliberate concealment of illicitly obtained digital assets through technologically sophisticated means. This article critically examines the proposition that crypto-asset laundering is not merely a regulatory infraction or ancillary offense but constitutes a distinct form of fraud. Employing an interdisciplinary methodology that integrates doctrinal legal analys
APA, Harvard, Vancouver, ISO, and other styles
2

Nelson, Febby Mutiara, Maria Dianita Prosperiani, Choky Risda Ramadhan, and Priska Putri Andini. "Cracking the Code: Investigating the Hunt for Crypto Assets in Money Laundering Cases in Indonesia." Journal of Indonesian Legal Studies 9, no. 1 (2024): 89–130. https://doi.org/10.15294/jils.vol9i1.4534.

Full text
Abstract:
This study aimed to investigate the use of digital information and communication technology in the form of crypto assets as proceeds of crime in money laundering action, due to the multi-layered security of the blockchain. This phenomenon was presented on a global scale in transnational crimes, providing challenges for Indonesian law enforcement officials in hunting the crypto assets scattered outside its legal jurisdiction. The results showed that Police Investigators and General Prosecutors utilizing penal and non-penal approaches in performing the crypto assets tracing, seizing and recoveri
APA, Harvard, Vancouver, ISO, and other styles
3

Denning, Dorothy E. "Crime and crypto on the information superhighway." Journal of Criminal Justice Education 6, no. 2 (1995): 323–36. http://dx.doi.org/10.1080/10511259500083501.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Otero, Ruth García, and Ricardo Méndez Diaz. "Crypto crime: Approaches from transnational crime and money laundering in Colombia." Procedia Computer Science 257 (2025): 1166–71. https://doi.org/10.1016/j.procs.2025.03.155.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Paesano, Federico, and Dorothy Siron. "Working Paper 38: Cryptocurrencies in Asia and beyond: law, regulation and enforcement." Basel Institute on Governance Working Papers, no. 38 (May 17, 2022): 1–69. http://dx.doi.org/10.12685/bigwp.2022.38.1-69.

Full text
Abstract:
The crypto industry has exploded in recent years, and authorities in different countries have been reacting in very different ways. Some have banned cryptocurrencies, while others are embracing them to varying degrees. Some are working hard to align their anti-money laundering regulations with FATF standards, while others are turning a blind eye. A few countries have confiscated huge quantities of crypto assets linked to crime and money laundering. Others are at square one in terms of enforcement, risking becoming a hub for crypto crime and money laundering and posing a serious vulnerability i
APA, Harvard, Vancouver, ISO, and other styles
6

Orme, David. "Is biometrics the answer to crypto-currency crime?" Biometric Technology Today 2019, no. 2 (2019): 8–10. http://dx.doi.org/10.1016/s0969-4765(19)30025-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zimba, Aaron, Christabel Ngongola-Reinke, Mumbi Chishimba, and Tozgani Fainess Mbale. "Demystifying Cryptocurrency Mining Attacks: A Semi-supervised Learning Approach Based on Digital Forensics and Dynamic Network Characteristics." Zambia ICT Journal 5, no. 1 (2021): 1–7. http://dx.doi.org/10.33260/zictjournal.v5i1.108.

Full text
Abstract:
Cryptocurrencies have emerged as a new form of digital money that has not escaped the eyes of cyber-attackers. Traditionally, they have been maliciously used as a medium of exchange for proceeds of crime in the cyber dark-market by cyber-criminals. However, cyber-criminals have devised an exploitative technique of directly acquiring cryptocurrencies from benign users' CPUs without their knowledge through a process called crypto mining. The presence of crypto mining activities in a network is often an indicator of compromise of illegal usage of network resources for crypto mining purposes. Cryp
APA, Harvard, Vancouver, ISO, and other styles
8

Bustomi, Yazid, and Yudho Taruno Muryanto. "THE IDEAL LEGAL REGULATION FOR DECENTRALIZED FINANCE AS THE DEVELOPMENT OF INDONESIA CRYPTO ASSET TRADING." Jurnal Pembaharuan Hukum 9, no. 3 (2023): 461. http://dx.doi.org/10.26532/jph.v9i3.21245.

Full text
Abstract:
Decentralized Finance (DeFI) has positively impacted the development of crypto asset trading and has been adopted by various countries except for Indonesia. This study aims to identify the urgency of regulating DeFi as the development of crypto asset trading in Indonesia and construct the ideal regulation. This research is normative legal research with a statutory and conceptual approach. The research results stated the urgency of regulating DeFi as the development of crypto asset trading is: a) other countries have used DeFi because it can develop crypto asset trading for the better by creati
APA, Harvard, Vancouver, ISO, and other styles
9

Madsen, Wayne. "White House unveils new cyber-crime, crypto export policies." Network Security 2000, no. 8 (2000): 7. http://dx.doi.org/10.1016/s1353-4858(00)08017-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rokhim, Abdul, Sunardi Sunardi, and Muhammad Resky Rakhim. "Legal Protection For Cryptocurrency Investors In Trading Cryptocurrencies As Crypto Assets According To Civil Law In Indonesia." Jurnal Hukum dan Kenotariatan 8, no. 1 (2024): 48–58. http://dx.doi.org/10.33474/hukeno.v8i1.21771.

Full text
Abstract:
Crypto is a non-wuud commodity that is digital using cryptography. The legality of crypto assets in Indonesia has not received firm regulation in their use, and there is a need for a supervisory body that regulates all transaction activities for legal protection for investors in trading digital assets. The research method used in this study is to use normative juridical research methods, using a statutory approach (statute approach) and a conceptual approach (conceptual approach). The result of the discussion of this study is that for the legality of crypto assets, Bank Indonesia places them a
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Crypto crime"

1

Nyarugwe, Raymond Tendai. "An analysis of the Zimbabwean money laundering and proceeds of crime amendment act of 2018." University of Western Cape, 2020. http://hdl.handle.net/11394/8057.

Full text
Abstract:
Magister Legum - LLM<br>Financial crimes are transnational in nature, and no country is immune from them. They are an international problem that can best be solved through international cooperation on a global scale. It is therefore necessary to have rules and norms that apply worldwide in order to deal with these crimes comprehensively.1 Of particular prominence is the crime of money laundering (ML), which may be defined as the processing of criminal proceeds to disguise their illegal origin.2 This term is relatively new and is broadly defined, with the definitions varying from jurisdiction t
APA, Harvard, Vancouver, ISO, and other styles
2

Gonçalves, Maria. "“Now You See It. Now You Don't”- How Cryptocurrencies Enable Money Laundering." Thesis, Malmö universitet, Fakulteten för hälsa och samhälle (HS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-25432.

Full text
Abstract:
Money laundering is a non-violent crime, however when successfully executed it has a negative impact on society, as it tends to support other illicit activities, including terrorism. As was the case for other financial crimes, the internet opened the door for new tools that enable criminals to launder their illicit profits. One of these tools is cryptocurrency.This paper takes the form of a literature review, in order to find the most relevant and important work within the research topic, and to identify central issues associated with laundering money through cryptocurrencies. It aims to expla
APA, Harvard, Vancouver, ISO, and other styles
3

Bambuch, Vladislav. "Platforma pro sběr kryptoměnových adres." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2020. http://www.nusl.cz/ntk/nusl-417268.

Full text
Abstract:
Cílem této práce je vytvořit platformu pro sběr a zobrazování metadat o kryptoměnových adresách z veřejného i temného webu. K dosažení tohoto cíle jsem použil technologie zpracování webu napsané v PHP. Komplikace doprovázející automatické zpracování webových stránek byly vyřešeny techonologí Apache Kafka a jejími schopnosti škálování procesů. Modularita platformy byla dosažena pomocí architektury microservices a Docker containerization. Práce umožňuje jedinečný způsob, jak hledat potenciální kriminální aktivity, které se odehrály mimo rámec blockchain, pomocí webové aplikace pro správu platfor
APA, Harvard, Vancouver, ISO, and other styles
4

Alyass, Patrik, and William Samuelsson. "Hur svenska myndigheterna begränsas då de ska agera mot illegal verksamhet på Darknet : -Definition samt myndigheters påverkan -Svenska lagstiftningens begränsningar på myndigheternas arbete." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42468.

Full text
Abstract:
Darknet är en del av den djupa webben, som är en icke indexerad del av internet. Det används för olika ändamål, till exempel att köpa läkemedel och finansiell information. Tillgången till Darknet kan vara anonym genom att använda TOR och Bitcoin. Anonymiteten vid webbsökning under användandet av Darknet kommer påverka bevis för myndigheter. Således kan det ha en möjlig effekt på brottsbekämpande arbete, särskilt angående digitalt kriminaltekniskt arbete, utifrån begränsningen av tillgängliga data. Således syftar denna studie till att fastställa vad de svenska myndigheterna arbetar med för att
APA, Harvard, Vancouver, ISO, and other styles
5

Chon, Ki Hong Steve. "Cybercrime precursors: towards a model of offender resources." Phd thesis, 2016. http://hdl.handle.net/1885/107344.

Full text
Abstract:
This thesis applies Ekblom and Tilley’s concept of offender resources to the study of criminal behaviour on the Internet. Offender predispositions are influenced by situational, that is the environmental incentives to commit crime. This thesis employs non-participation observation of online communities involved in activities linked to malicious forms of software. Actual online conversations are reproduced, providing rich ethnographic detail of activities that have taken place between 2008 and 2012 from eight discussion forums where malicious software and cases of hacking are openly discussed a
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Crypto crime"

1

Robert, Bloch. The best horror stories. Peerage Bks, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Allan, Poe Edgar. The Pit and the Pendulum and Other Stories. Penguin Books, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Allan, Poe Edgar. Selected tales of Edgar Allan Poe. Thorndike Press, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Allan, Poe Edgar. Tales of Suspense. Reader's Digest Association, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Allan, Poe Edgar. Selected stories and poems of Edgar Allan Poe. Kennebec Large Print, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Allan, Poe Edgar. Tales of suspense. Reader's Digest, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Allan, Poe Edgar. The fall of the House of Usher and other stories. Marshall Cavendish, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

1809-1849, Poe Edgar Allan, ed. The Raven and the Monkey's Paw: Classics of Horror and Suspense from the Modern Library. Modern Library, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Allan, Poe Edgar. Tales of Mystery and Imagination. Wordsworth Classics, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Allan, Poe Edgar. Tales of mystery and imagination. Wordsworth Classics, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Crypto crime"

1

Hamilton, Rhianna, and Christian Leuprecht. "The Crime-Crypto Nexus: Nuancing Risk Across Crypto-Crime Transactions." In Financial Crime and the Law. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-59543-1_2.

Full text
Abstract:
AbstractCryptocurrency is supercharging illicit activities by transnational criminal networks, including terrorism, drug trafficking, pornography, sanctions evasion, and ransomware. Yet, mainstream cryptocurrency literature often overlooks this criminal association. The relatively new and transboundary nature of cryptocurrency is restructuring criminal activities. Hacking has emerged as a digital-age bank heist, siphoning off substantial sums from exchange platforms. Crypto crime is dynamic, transitioning from primarily placing and layering the proceeds of precursor crimes into the financial s
APA, Harvard, Vancouver, ISO, and other styles
2

Kapsis, Ilias. "Crypto-assets and criminality." In Organised Crime, Financial Crime, and Criminal Justice. Routledge, 2023. http://dx.doi.org/10.4324/9781003020813-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Burgess, Ariel, Rhianna Hamilton, and Christian Leuprecht. "Terror on the Blockchain: The Emergent Crypto-Crime-Terror Nexus." In Ius Gentium: Comparative Perspectives on Law and Justice. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-59547-9_9.

Full text
Abstract:
AbstractInadequate oversight and an inchoate appreciation are giving terrorist groups ready access to transboundary financial transfers by means of virtual currency. This chapter counters the prevailing approach that treats cryptocurrency-enabled crimes, such as terrorism, as monolithic. This chapter demonstrates that terrorist groups are using cryptocurrency and decentralized finance to fundraise and transfer funds in conjunction with the traditional financial system. Since actual case studies are few and data limited, this chapter is a proof of concept: it compares terrorist financing scheme
APA, Harvard, Vancouver, ISO, and other styles
4

Ma, Winston. "Terrorist Financing, War Crimes, and Crypto Geopolitics." In A Comprehensive Guide for Web3 Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-39288-7_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Brown, Angelo Kevin. "The Criminal Side of Cryptocurrency." In Mainstreaming Cryptocurrency and the Future of Digital Finance. IGI Global, 2023. http://dx.doi.org/10.4018/978-1-6684-8368-8.ch008.

Full text
Abstract:
As cryptocurrency (crypto) has become more and more popular, so has crypto-related crime. There has been a lack of academic research on crypto-related crime, but it is becoming more prevalent in the last couple of years. Crypto-related crime became especially significant in the impact it had on victims and the awareness of these crimes in the media and the government in late 2019 and early 2020 as various criminal organizations and criminal opportunities opened up as cryptocurrency became mainstream. The common crimes related to cryptocurrency include fraud, theft, and money laundering. In 202
APA, Harvard, Vancouver, ISO, and other styles
6

Biradar, Rajashekhar C., and Raja Jitendra Nayaka. "Modern Crypto Systems in Next Generation Networks." In Advances in Digital Crime, Forensics, and Cyber Terrorism. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6324-4.ch017.

Full text
Abstract:
The performance of Next Generation Networks (NGN) in terms of security, speed, synchronization, latency, and throughput with variable synchronous or asynchronous packet sizes has not been sufficiently addressed in novel crypto systems. Traditional crypto systems such as block and stream ciphers have been studied and implemented for various networks such as wire line and wireless systems. Since NGN comprises of wire line and wireless networks with variable packet-based communication carrying various traffic like multimedia, video, audio, multi conferencing, and a large amount of data transfers
APA, Harvard, Vancouver, ISO, and other styles
7

Akbulut, Berrin. "Kripto Para ve Terörizmin Finansmanı." In Karşılaştırmalı Hukukta ve Türk Hukukunda Terörizm, Terör Suçları ve İnfaz Hukuku Cilt 1. Türkiye Bilimler Akademisi, 2023. http://dx.doi.org/10.53478/tuba.978-625-8352-88-7.ch16.

Full text
Abstract:
Developments in technology can affect human life positively, but can also affect it negatively by being used in committing crimes. Developments in the field of cryptocurrency also bring positive advantages, but also cause negative consequences due to the possibility of being used in illegal activities. Some individuals or terrorist organisations use cryptocurrency technology to finance terrorism by taking advantage of its features such as privacy, untraceability and anonymity. Financing of terrorism is not a problem that concerns only one country. Therefore, international works are carried out
APA, Harvard, Vancouver, ISO, and other styles
8

Kılıç, Ali Şahin. ""Dijital Şafaktan Siber Alacakaranlığa: Kripto Varlıklar Ve Terörizm Odağında Fidye Yazılımı (Ransomware)"." In Karşılaştırmalı Hukukta ve Türk Hukukunda Terörizm, Terör Suçları ve İnfaz Hukuku Cilt 1. Türkiye Bilimler Akademisi, 2023. http://dx.doi.org/10.53478/tuba.978-625-8352-88-7.ch19.

Full text
Abstract:
In today’s digital age, swift technological advancements have ignited an unparalleled surge in digitalization, deeply embedding it into daily life. The growing dependence on information systems, especially within public services, has enabled a new era of efficiency and accessibility. However, this digital evolution is not without its complexities. It has broadened the sphere of vulnerability, rendering information systems increasingly susceptible to new cyber threats. Among the most formidable of these threats stands ransomware. Ransomware can be defined as a malicious software, crafted to inf
APA, Harvard, Vancouver, ISO, and other styles
9

"Hiding Crimes in Cyberspace." In Crypto Anarchy, Cyberstates, and Pirate Utopias. The MIT Press, 2001. http://dx.doi.org/10.7551/mitpress/2229.003.0017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Shah, Sachin, and Abdul Rafay. "Regulatory Ambiguity in India." In Concepts and Cases of Illicit Finance. IGI Global, 2023. http://dx.doi.org/10.4018/978-1-6684-8587-3.ch004.

Full text
Abstract:
Cryptocurrencies have sparked global transformations in digital technology and financial services, leading to deliberations on regulatory frameworks. India is cautiously working towards regulatory clarity and legalizing Cryptocurrency usage, as it becomes the country with the most cryptocurrency users. The Indian regulatory body is vigilant, monitoring progress and warning the public about associated risks. Despite regulatory efforts, India has seen a worrisome rise in cyber-frauds, cryptocurrency crimes, and money laundering involving digital currencies. This chapter focuses on the regulatory
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Crypto crime"

1

Chaudhari, Deepesh, and Sandeep Shukla. "Blockstash Intelligence: Real-time Crypto Crime Investigation and Forensics tool." In 2024 6th Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS). IEEE, 2024. http://dx.doi.org/10.1109/brains63024.2024.10732611.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Siu, Gilberto Atondo, Alice Hutchings, Marie Vasek, and Tyler Moore. "“Invest in crypto!”: An analysis of investment scam advertisements found in Bitcointalk." In 2022 APWG Symposium on Electronic Crime Research (eCrime). IEEE, 2022. http://dx.doi.org/10.1109/ecrime57793.2022.10142100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Хршановский, В. А. "Сromlechs at the Kytaia necropolis (chronology and ethno-cultural affiliation)". У Древности Боспора. Crossref, 2025. https://doi.org/10.25681/iaras.2023.978-5-94375-403-6.410-432.

Full text
Abstract:
The article deals with ring stone structures – dolmens (or cromlechs) that were discovered at the Kytaia necropolis in the late 1990s – early 2000s in course of excavations of large crypts made of limestone blocks and slabs (Nos. 206, 300, and 263) and carved into continental clay (No. 344) and a rock massif (No. 265). The crypts were constructed and initially used not at the same time: Nos. 206 and 300 – in the Hellenistic period, No. 263, in terms of architecture, – no later than the early Roman, No. 265, according to the earliest material, – in the 2nd–3rd centu ries AD, and the last one –
APA, Harvard, Vancouver, ISO, and other styles
4

Bushkevich, Mikalai Sergeevich. "Investigation of Crypto-crimes: a New Forensic Direction." In АКТУАЛЬНЫЕ ВОПРОСЫ РАЗВИТИЯ ГОСУДАРСТВЕННОСТИ И ПУБЛИЧНОГО ПРАВА. Санкт-Петербургский институт (филиал) ВГУЮ (РПА Минюста России), 2020. http://dx.doi.org/10.47645/978-5-6044512-3-6_2020_1_63.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Suryadi, Pangi, and Azis Budianto. "Money Laundering And Tax Evasion Resulting From Cyber Crimes Through Digital Currency (Crypto Currency)." In Proceedings of the 2nd International Conference on Law, Social Science, Economics, and Education, ICLSSEE 2022, 16 April 2022, Semarang, Indonesia. EAI, 2022. http://dx.doi.org/10.4108/eai.16-4-2022.2320042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Рукавишникова, И. В., Д. В. Бейлин, and Н. Ф. Федосеев. "Earthwork mound group at Cementnaya settlement 1, earthwork mounts Lesnoy I and II (Republic of Crimea)." In Города, селища, могильники. Раскопки 2017. Материалы спасательных археологических исследований. Crossref, 2018. http://dx.doi.org/10.25681/iaras.2018.978-5-94375-210-0.292-301.

Full text
Abstract:
Статья посвящена исследованиям могильника Цементная слободка 1, курганам 1, 4, и раскопкам курганов Лесной I, Лесной II. Был расчищен каменный ящик разрушенного полностью кургана 1 конца V – начала IV в. до н.э. В кургане 4 исследованы шесть погребальных комплексов и ограбленный античный склеп конца IV в. до н.э. Склеп удалось разобрать по блокам и полностью восстановить на новом месте в музее. Курганы Лесной I и Лесной II относятся к IV в. до н.э. и представляют иную кочевую традицию в пределах некрополя Юз-Оба. This paper covers research into the graveyard at Cementnaya settlement 1, earthwo
APA, Harvard, Vancouver, ISO, and other styles
7

Рукавишникова, И. В., Д. В. Бейлин, and Н. Ф. Федосеев. "Hospital Earthwork (Republic of Crimea, Leninsky Region)." In Города, селища, могильники. Раскопки 2017. Материалы спасательных археологических исследований. Crossref, 2018. http://dx.doi.org/10.25681/iaras.2018.978-5-94375-210-0.284-291.

Full text
Abstract:
В работе представлены материалы исследования уникального памятника античной погребальной архитектуры элиты боспорского общества. Госпитальный курган – самый большой в цепочке курганов, отходящих от Юз-Обинской гряды. Памятник включал в себя монументальный склеп с прямоугольной в плане камерой с уступчатым перекрытием и длинным дромосом, покрытой изнутри двуслойной штукатуркой, на которой были обнаружены более поздние рисунки с батальными сценами. Но первоначально насыпь была сооружена над двумя могилами в каменных ящиках с плитовыми перекрытиями, с погребением юноши в деревянном саркофаге. Вес
APA, Harvard, Vancouver, ISO, and other styles
8

Рукавишникова, И. В., and Д. В. Бейлин. "FUNERAL RITES OF THE “ALEXANDRIAN ROCKS” BURIAL GROUND." In Hypanis. Труды отдела классической археологии ИА РАН. Crossref, 2023. http://dx.doi.org/10.25681/iaras.2021.978-5-94375-350-3.171-192.

Full text
Abstract:
Основу статьи составили материалы, полученные в результате исследования курганной группы «Александровские скалы 1», которая находилась к юго-западу от г. Керчи на территории Октябрьского сельского поселения (Ленинский район, Республика Крым). В полах двух курганов этой группы были открыты два непотревоженных участка некрополя римского времени, относящегося к укрепленному поселению «Городище 11 километр». Изученный раскопками некрополь может считаться эталонным грунтовым могильником ря - дового населения сельской территории Европейского Боспора. Могильник функционировал примерно на протяжении с
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!