Journal articles on the topic 'Cybercrime Prediction'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cybercrime Prediction.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Waruwu, Jurisman, Wira Hadinata, Siska Febriyani, and Rini Wijayanti. "Data Mining Technique in Detecting and Predicting Cyber In Marketplace Sector." Jurnal Informatika 1, no. 1 (2022): 8–11. http://dx.doi.org/10.57094/ji.v1i1.350.
Full textOdette, Boussi Grace, Himanshu Gupta, and Hossain Syed Akhter. "A machine learning model for predicting phishing websites." A machine learning model for predicting phishing websites 14, no. 4 (2024): 4228–38. https://doi.org/10.11591/ijece.v14i4.pp4228-4238.
Full textLedingham, Rebecca, and Richard Mills. "A preliminary study of autism and cybercrime in the context of international law enforcement." Advances in Autism 1, no. 1 (2015): 2–11. http://dx.doi.org/10.1108/aia-05-2015-0003.
Full textB. Palad, Eddie Bouy, Mary Jane F. Burden, Christian Ray Dela Torre, and Rachelle Bea C. Uy. "Performance evaluation of decision tree classification algorithms using fraud datasets." Bulletin of Electrical Engineering and Informatics 9, no. 6 (2020): 2518–25. http://dx.doi.org/10.11591/eei.v9i6.2630.
Full textEddie, Bouy B. Palad, Jane F. Burden Mary, Ray dela Torre Christian, and Bea C. Uy Rachelle. "Performance evaluation of decision tree classification algorithms using fraud datasets." Bulletin of Electrical Engineering and Informatics 9, no. 6 (2020): 2518–25. https://doi.org/10.11591/eei.v9i6.2630.
Full textRajeev, Haritha, and Dr Midhun Chakkaravarty. "Prediction of Cybercrime using the Avinashak Algorithm." Indian Journal of Artificial Intelligence and Neural Networking 4, no. 1 (2023): 5–10. http://dx.doi.org/10.54105/ijainn.a1078.124123.
Full textHaritha, Rajeev. "Prediction of Cybercrime using the Avinashak Algorithm." Indian Journal of Artificial Intelligence and Neural Networking (IJAINN) 4, no. 1 (2023): 5–10. https://doi.org/10.54105/ijainn.A1078.124123.
Full textVeena, K., K. Meena, Ramya Kuppusamy, Yuvaraja Teekaraman, Ravi V. Angadi, and Amruth Ramesh Thelkar. "Cybercrime: Identification and Prediction Using Machine Learning Techniques." Computational Intelligence and Neuroscience 2022 (August 27, 2022): 1–10. http://dx.doi.org/10.1155/2022/8237421.
Full textČermák, Miroslav. "Key Factors Affecting the Increase in Cybercrime." Bezpečnostní teorie a praxe 2022, no. 3 (2022): 117–34. https://doi.org/10.5281/zenodo.12780103.
Full textSingh, Aman Rajesh. "Crime Analysis and Prediction." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem30641.
Full textYusuf Bayu Wicaksono and Christina Juliane. "Comparative Analysis of Various Ensemble Algorithms for Computer Malware Prediction." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 7, no. 3 (2023): 646–51. http://dx.doi.org/10.29207/resti.v7i3.4492.
Full textKianmehr, Keivan, and Negar Koochakzadeh. "Learning from socio-economic characteristics of IP geo-locations for cybercrime prediction." International Journal of Business Intelligence and Data Mining 7, no. 1/2 (2012): 21. http://dx.doi.org/10.1504/ijbidm.2012.048726.
Full textGao, Jiayu, Yijia Suo, and Wanyun Xing. "Prediction of Cybercrime and Policy Evaluation Using a Combination of PageRank and ARIMA-DID Algorithms." Frontiers in Computing and Intelligent Systems 12, no. 3 (2025): 47–52. https://doi.org/10.54097/0t2pk946.
Full textMagar, Padma. "FINANCIAL DISTRESS PREDICTION USING MACHINE LEARNING." International Journal of Advanced Research 13, no. 01 (2025): 1171–75. https://doi.org/10.21474/ijar01/20307.
Full textOlakunle Abayomi Ajala and Olusegun Abiodun Balogun. "Leveraging AI/ML for anomaly detection, threat prediction, and automated response." World Journal of Advanced Research and Reviews 21, no. 1 (2024): 2584–98. http://dx.doi.org/10.30574/wjarr.2024.21.1.0287.
Full textOlakunle, Abayomi Ajala, and Abiodun Balogun Olusegun. "Leveraging AI/ML for anomaly detection, threat prediction, and automated response." World Journal of Advanced Research and Reviews 21, no. 1 (2024): 2584–98. https://doi.org/10.5281/zenodo.13377680.
Full textD Mitchell, Charles, and Samuel Sambasivam. "Predictive Modeling for Identity Theft Detection: A Design Science Approach Using Machine Learning and Historical Data." Issues in Informing Science and Information Technology 22 (2025): 003. https://doi.org/10.28945/5506.
Full textVirk, Udayveer Singh, Devansh Verma, Gagandeep Singh, and Prof Sheetal Laroiya Prof. Sheetal Laroiya. "Analyzing Cryptographic Techniques and Machine Learning Algorithms for Crime Prediction." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 10 (2024): 1–6. http://dx.doi.org/10.55041/ijsrem38099.
Full textMothukuri, Radha, Bobba Basaveswararao, and Suneetha Bulla. "Judgement Classification Using Hybrid ANN-Shuffled Frog Leaping Model on Cyber Crime Judgement Database." Revue d'Intelligence Artificielle 34, no. 4 (2020): 445–56. http://dx.doi.org/10.18280/ria.340409.
Full textRajawat, Anand Singh, Pradeep Bedi, S. B. Goyal, et al. "Dark Web Data Classification Using Neural Network." Computational Intelligence and Neuroscience 2022 (March 28, 2022): 1–11. http://dx.doi.org/10.1155/2022/8393318.
Full textSanni, Mistura Laide, Bodunde Odunola Akinyemi, Dauda Akinwuyi Olalere, Emmanuel Ajayi Olajubu, and Ganiyu Adesola Aderounmu. "A Predictive Cyber Threat Model for Mobile Money Services." Annals of Emerging Technologies in Computing 7, no. 1 (2023): 40–60. http://dx.doi.org/10.33166/aetic.2023.01.004.
Full textShang, Yongqiang. "Detection and Prevention of Cyber Defense Attacks using Machine Learning Algorithms." Scalable Computing: Practice and Experience 25, no. 2 (2024): 760–69. http://dx.doi.org/10.12694/scpe.v25i2.2627.
Full textOdette Boussi, Grace, Himanshu Gupta, and Syed Akhter Hossain. "A machine learning model for predicting phishing websites." International Journal of Electrical and Computer Engineering (IJECE) 14, no. 4 (2024): 4228. http://dx.doi.org/10.11591/ijece.v14i4.pp4228-4238.
Full textTripathy, Nrusingha, Balabantaray Sidhanta Kumar, Surabi Parida, and Subrat Kumar Nayak. "Cryptocurrency fraud detection through classification techniques." International Journal of Electrical and Computer Engineering (IJECE) 14, no. 3 (2024): 2918–26. https://doi.org/10.11591/ijece.v14i3.pp2918-2926.
Full textRawat, Romil, Oki Olukayode Ayodele, Sakthidasan Sankaran, Hector Florez, and Ajagbe Sunday Adeola. "Techniques for predicting dark web events focused on the delivery of illicit products and ordered crime." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 5 (2023): 5354–65. https://doi.org/10.11591/ijece.v13i5.pp5354-5365.
Full textManhas, Saloni, Swapnesh Taterh, and Dilbag Singh. "Deep Q learning-based mitigation of man in the middle attack over secure sockets layer websites." Modern Physics Letters B 34, no. 32 (2020): 2050366. http://dx.doi.org/10.1142/s0217984920503662.
Full textAlazawi, Sundos A. Hameed, Huda Abdulaali Abdulbaqi, and Ahmed Hussein Ali. "CNN- based intrusion detection software for network operating system environment." Babylonian Journal of Internet of Things 2024 (August 2, 2024): 79–86. http://dx.doi.org/10.58496/bjiot/2024/010.
Full textKalisz, Tomasz. "THE PROBATION OFFICER AS AN AUTHORITY OF CRIMINAL ENFORCEMENT LAW. DEVELOPMENT PROSPECTS IN THE LIGHT OF MODERN TECHNOLOGIES." Probacja 1 (March 31, 2025): 49–70. https://doi.org/10.5604/01.3001.0055.0598.
Full textSiddhartha, V. "Leveraging Machine Learning Techniques and NLP for Identifying Fake Accounts in Social Networks." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 7394–400. https://doi.org/10.22214/ijraset.2025.71827.
Full textBaig, Khurram, Muhammad Salman, Motasem Hassan Mirza, Munir Ahmad, Abid Hussain, and Saima Ayyaz. "Social Media Fostering Cybercrimes among Adults in Pakistan: Role of Lack of Empathy." Bulletin of Business and Economics (BBE) 12, no. 3 (2023): 595–600. http://dx.doi.org/10.61506/01.00074.
Full textKumar, Prashant, Chitra Kushwaha, Dimple Sethi, Debjani Ghosh, Punit Gupta, and Ankit Vidyarthi. "Investigating the performance of multivariate LSTM models to predict the occurrence of Distributed Denial of Service (DDoS) attack." PLOS ONE 20, no. 1 (2025): e0313930. https://doi.org/10.1371/journal.pone.0313930.
Full textZhang, Yibo. "Cybersecurity Assessment Based on Entropy Weight Method and Polynomial Regression Modeling." Highlights in Science, Engineering and Technology 138 (May 11, 2025): 320–26. https://doi.org/10.54097/sbx5s734.
Full textM. Gopila. "Predicting Unusual Activity Using CNN and Time Series for Enhanced Cyber Protection." Communications on Applied Nonlinear Analysis 32, no. 5s (2024): 78–90. https://doi.org/10.52783/cana.v32.2969.
Full textSunardi, Sunardi, Abdul Fadlil, and Nur Makkie Perdana Kusuma. "Implementasi Data Mining dengan Algoritma Naïve Bayes untuk Profiling Korban Penipuan Online di Indonesia." JURNAL MEDIA INFORMATIKA BUDIDARMA 6, no. 3 (2022): 1562. http://dx.doi.org/10.30865/mib.v6i3.3999.
Full textIda Hasan, Holy One Singadimedja, Yogi Yasa Wedha, Sara Ida Magdalena Awi, and Edy Nurcahyo. "Street Crime during Covid-19 Pandemic in Perspective of Routine Activity Law Theory and it Influence on Indonesian Criminal Law." International Journal of Science, Technology & Management 1, no. 2 (2020): 46–54. http://dx.doi.org/10.46729/ijstm.v1i2.17.
Full textRafiq, Fatima, Mazhar Javed Awan, Awais Yasin, Haitham Nobanee, Azlan Mohd Zain, and Saeed Ali Bahaj. "Privacy Prevention of Big Data Applications: A Systematic Literature Review." SAGE Open 12, no. 2 (2022): 215824402210964. http://dx.doi.org/10.1177/21582440221096445.
Full textBudiarto, Rahmat, and Yanif Dwi Kuntjoro. "Analisis Perilaku Entitas untuk Pendeteksian Serangan Internal Menggunakan Kombinasi Model Prediksi Memori dan Metode PCA." Jurnal Teknologi Informasi dan Ilmu Komputer 10, no. 6 (2023): 1223–32. https://doi.org/10.25126/jtiik.2023107123.
Full textKrysovatyy, A., O. Desyatnyuk, and O. Ptashchenko. "Digital Innovations and their Ramifications for Financial and State Security." AFRICAN JOURNAL OF APPLIED RESEARCH 10, no. 1 (2024): 431–41. http://dx.doi.org/10.26437/ajar.v10i1.713.
Full textRohoza, Anton. "Directions of digital transformation of analytical activities in public administration." Actual problems of innovative economy and law 2024, no. 1 (2024): 41–45. http://dx.doi.org/10.36887/2524-0455-2024-1-9.
Full textBello, Halima Oluwabunmi. "Developing Predictive Financial Fraud Models Using AI-Driven Analytics Within Cybercrime-Resilient Security Ecosystems." International Journal of Research Publication and Reviews 6, no. 6 (2025): 5055–69. https://doi.org/10.55248/gengpi.6.0125.0651.
Full textHerrero, Juan, Andrea Torres, Pep Vivas, Antonio Hidalgo, Francisco J. Rodríguez, and Alberto Urueña. "Smartphone Addiction and Cybercrime Victimization in the Context of Lifestyles Routine Activities and Self-Control Theories: The User’s Dual Vulnerability Model of Cybercrime Victimization." International Journal of Environmental Research and Public Health 18, no. 7 (2021): 3763. http://dx.doi.org/10.3390/ijerph18073763.
Full textEfriyani, Desi, and Febriyanti Panjaitan. "KLASIFIKASI MALWARE DENGAN MENGGUNAKAN RECURRENT NEURAL NETWORK." Jurnal Ilmiah Matrik 23, no. 3 (2021): 310–16. http://dx.doi.org/10.33557/jurnalmatrik.v23i3.1592.
Full textBoussi Grace Odette, Et al. "A Security Model for the Classification of Suspicious Data Using Machine Learning Techniques." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 10 (2023): 17–22. http://dx.doi.org/10.17762/ijritcc.v11i10.8459.
Full textEzeji, Chiji Longinus, and Dominique Emmanuel Uwizeyimana. "Evaluation of multifaceted holistic measures and strategies for combating cash-in-transit heists in South Africa." International Journal of Business Ecosystem & Strategy (2687-2293) 7, no. 3 (2025): 330–47. https://doi.org/10.36096/ijbes.v7i3.840.
Full textLouderback, Eric R., and Olena Antonaccio. "Exploring Cognitive Decision-making Processes, Computer-focused Cyber Deviance Involvement and Victimization." Journal of Research in Crime and Delinquency 54, no. 5 (2017): 639–79. http://dx.doi.org/10.1177/0022427817693036.
Full textChaplinska, Iuliia, and Polina Kabanova. "Risks of cybersocialization: Present and the near future." SCIENTIFIC STUDIOS ON SOCIAL AND POLITICAL PSYCHOLOGY 50, no. 47 (2021): 160–79. http://dx.doi.org/10.61727/sssppj/1.2021.160.
Full textGolikov, Yuriy, and Yelyzaveta Ostrianska. "RESEARCH ON THE CURRENT STATE AND PROSPECTS OF THE APPLICATION OF ARTIFICIAL INTELLIGENCE IN CYBERSECURITY." Computer Science and Cybersecurity, no. 2 (December 30, 2024): 51–65. https://doi.org/10.26565/2519-2310-2024-2-05.
Full textGolikov, Yu L. "Study of the current state and prospects of artificial intelligence in cybersecurity." Radiotekhnika, no. 220 (April 10, 2025): 40–49. https://doi.org/10.30837/rt.2025.1.220.03.
Full textKuzior, Aleksandra, Paulina Brożek, Olha Kuzmenko, Hanna Yarovenko, and Tetyana Vasilyeva. "Countering Cybercrime Risks in Financial Institutions: Forecasting Information Trends." Journal of Risk and Financial Management 15, no. 12 (2022): 613. http://dx.doi.org/10.3390/jrfm15120613.
Full textOmojemite, Matthew, and Olugbenga Ige. "Impact of Cooperative Learning Strategieson Social Studies Pre-Service Teachers’ Performance in Cybercrime Prevention." International Journal of Computing Sciences Research 8 (January 1, 2024): 2933–50. https://doi.org/10.25147/ijcsr.2017.001.1.194.
Full text