Littérature scientifique sur le sujet « Computer crimes Computer crimes Computer networks »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Computer crimes Computer crimes Computer networks ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "Computer crimes Computer crimes Computer networks"

1

Stratonov, Vasyl. ""Computer crimes": some features and characteristics." Naukovyy Visnyk Dnipropetrovs'kogo Derzhavnogo Universytetu Vnutrishnikh Sprav 2, no. 2 (2020): 134–41. http://dx.doi.org/10.31733/2078-3566-2020-2-134-141.

Texte intégral
Résumé :
Unfortunately, along with positive achievements, informatization also has negative manifestations, namely, the possibility of using computer technology to commit crimes. The world has long been talking about "cy-bercrime" about "computer crime," and chapter 16 of the Criminal Code of Ukraine deals with crimes in the use of computers, computer systems and networks, as well as telecommunications. Therefore, we can state that a unified approach to the definition of a concept does not exist. However, the introduction of certain norms into the law does not solve the problems. Problems arise with th
Styles APA, Harvard, Vancouver, ISO, etc.
2

М.M., Haryha, Verhun L.O., and Kuznetsov O.O. "Some aspects of criminal characteristics of cyber crimes." Scientific Herald of Sivershchyna. Series: Law 2020, no. 3 (2020): 89–99. http://dx.doi.org/10.32755/sjlaw.2020.03.089.

Texte intégral
Résumé :
The article analyzes the dynamics of crimes in the use of computers, systems, computer networks and telecommunications networks for 2019-2020, and focuses on the high “adaptive” ability of this criminal segment as well as the need to improve existing and create new effective mechanisms to combat relevant criminal acts. One of the conditions for the existence of such mechanisms is the presence of thorough forensic characteristics of this group of crimes, which allows identifying and understanding the training, commission and concealment of the group of illegal acts. The research describes the m
Styles APA, Harvard, Vancouver, ISO, etc.
3

Walden, Ian. "Harmonising Computer Crime Laws in Europe." European Journal of Crime, Criminal Law and Criminal Justice 12, no. 4 (2004): 321–36. http://dx.doi.org/10.1163/1571817042523095.

Texte intégral
Résumé :
AbstractAs the ‘Information Society’ emerges, the European economy and its citizens have become dependent on computers and communication networks. However, with the ravages of the viruses MyDoom and MS Blaster still being felt around the world, the vulnerability of computer systems and networks to criminal crime, as well as potentially terrorist activity, is still fresh in our minds. There is no agreed definition of what constitutes a ‘computer crime’. A computer may constitute the instrument of the crime, such as in murder and fraud; the object of the crime, such as the theft of processor chi
Styles APA, Harvard, Vancouver, ISO, etc.
4

Rossinskaya, E. R., and I. A. Ryadovskiy. "Modern means of committing computer crimes and patterns of their execution." Lex Russica, no. 3 (April 5, 2019): 87–99. http://dx.doi.org/10.17803/1729-5920.2019.148.3.087-099.

Texte intégral
Résumé :
The paper notes that the integration of modern information technologies in all spheres of human activity has led to the informatization and computerization of crime, when it is possible to commit almost any crime by means of computer tools and systems. There is a commonality of some elements of the mechanism of computer crimes, including information about the methods of these crimes.Means of committing computer crimes are considered from the standpoint of a new private theory of information and computer support of forensic activities, the subject of which are the laws of occurrence, movement,
Styles APA, Harvard, Vancouver, ISO, etc.
5

Futra, Yumelfi. "TINJAUAN PERISTIWA CYBER CRIME YANG TERJADI PADA TAHUN 2019 DI KOTA SAWAHLUNTO." UNES Law Review 3, no. 1 (2020): 55–68. http://dx.doi.org/10.31933/unesrev.v3i1.145.

Texte intégral
Résumé :
Cyber ​​Crimeis a form of virtual crime by utilizing computer which connected to the internet network, and exploiting other devices or computers that is connected to the internet. Cybercrime was previously regulated in the regulation Number 36 Year 1999 concerning Telecommunications, however this regulation has not been able to accommodate virtual and computer crimes. To anticipate the development of information technology, regulation Number 19 Year 2016 concerning Amendments to regulation Number 11 of 2008 concerning Electronic Information and Transactions was issued. In Sawahlunto City in 20
Styles APA, Harvard, Vancouver, ISO, etc.
6

Rostami, Soraya. "Juridical Study of Crimes Committed with Computer." Asian Social Science 12, no. 11 (2016): 79. http://dx.doi.org/10.5539/ass.v12n11p79.

Texte intégral
Résumé :
<p class="a">By development of computer networks, computer -related crime spreading immoral that had negative impact on social systems including families and organizations and, more children were invaded by, the spread of computer crimes in the third world called cultural invasion.</p><p class="a">Committing dishonest acts in ignorance or belief that the right to intervene in the operation of computer systems or data entry, or data deletion, or the messages. those committed acts does not categorize in fraud documentary, if the aforementioned act intended to endamage business
Styles APA, Harvard, Vancouver, ISO, etc.
7

Klebanov, Lev R., and Svetlana V. Polubinskaya. "COMPUTER TECHNOLOGIES FOR COMMITTING SABOTAGE AND TERRORISM." RUDN Journal of Law 24, no. 3 (2020): 717–34. http://dx.doi.org/10.22363/2313-2337-2020-24-3-717-734.

Texte intégral
Résumé :
The article discusses the problems that arise in connection with the crimes against state and public security committed by use of computer and network technologies. This topic is becoming relevant because some states have already experienced the effects of combat computer viruses, which can be regarded as waging war using cyber weapons. The most famous example is the attack by the Stuxnet computer virus on an Iranian uranium enrichment plant. The virus was created specifically to disable industrial control systems. The use of unmanned ground and air vehicles to carry out terrorist acts is of p
Styles APA, Harvard, Vancouver, ISO, etc.
8

Tkalichenko, Sergiy, Valentyna Khotskina, Zhanna Tsymbal, Victoria Solovieva, and Olena Burunova. "Modern Structural Level and Dynamics of Crimes with The Use of Computers, Automation Systems, Computer Networks and Electric Connection Systems." SHS Web of Conferences 100 (2021): 01014. http://dx.doi.org/10.1051/shsconf/202110001014.

Texte intégral
Résumé :
Actuality of surveillance the cyber-criminality problem and its impact upon a society is proved out by the rapid increase in a quantity of such crimes and material losses accordingly. The statistical analysis of their number increases and the caused losses is made in the process of cybercrimes studying. It’s revealed that besides the catastrophic number growth of such crimes, the relative size of losses is increased too. The analysis of the actual data for the nine years is made, on which basis the indicators’ table of the cyber-attacks number, the general losses and the indexes of their dynam
Styles APA, Harvard, Vancouver, ISO, etc.
9

Ovalle Lizcano, Tatiana Valentina, Diego Luis Coronel Peñuela, Rocío de Belén Contreras Manrique, and Alfonso Cabrera Reyes. "Impact on personal security against the regulation of cybercrime at the University of Pamplona, Villa del Rosario headquarters." Respuestas 24, no. 3 (2019): 14–25. http://dx.doi.org/10.22463/0122820x.1845.

Texte intégral
Résumé :
Computer crime and its evolution in Colombia, is relevant, the computer crimes described in Law 1273 of January 5, 2009 on the protection of information and data. Therefore, in the political constitution, article 15. All persons have the right to their personal and family privacy and their good name, and the State must respect them and enforce them, also, they have the right to know, update and rectify the information that they have been collected on them in databases and in archives of public and private entities. For this reason, cybercriminals, have specialized mainly in theft through compu
Styles APA, Harvard, Vancouver, ISO, etc.
10

Tariq, Haseeb, Muhammad Kashif Hanif, Muhammad Umer Sarwar, Sabeen Bari, Muhammad Shahzad Sarfraz, and Rozita Jamili Oskouei. "Employing Deep Learning and Time Series Analysis to Tackle the Accuracy and Robustness of the Forecasting Problem." Security and Communication Networks 2021 (March 31, 2021): 1–10. http://dx.doi.org/10.1155/2021/5587511.

Texte intégral
Résumé :
Crime is a bone of contention that can create a societal disturbance. Crime forecasting using time series is an efficient statistical tool for predicting rates of crime in many countries around the world. Crime data can be useful to determine the efficacy of crime prevention steps and the safety of cities and societies. However, it is a difficult task to predict the crime accurately because the number of crimes is increasing day by day. The objective of this study is to apply time series to predict the crime rate to facilitate practical crime prevention solutions. Machine learning can play an
Styles APA, Harvard, Vancouver, ISO, etc.
Plus de sources

Thèses sur le sujet "Computer crimes Computer crimes Computer networks"

1

Costantini, Kevin C. "Development of a cyber attack simulator for network modeling and cyber security analysis /." Online version of thesis, 2007. http://hdl.handle.net/1850/5440.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Sanyamahwe, Tendai. "Digital forensic model for computer networks." Thesis, University of Fort Hare, 2011. http://hdl.handle.net/10353/d1000968.

Texte intégral
Résumé :
The Internet has become important since information is now stored in digital form and is transported both within and between organisations in large amounts through computer networks. Nevertheless, there are those individuals or groups of people who utilise the Internet to harm other businesses because they can remain relatively anonymous. To prosecute such criminals, forensic practitioners have to follow a well-defined procedure to convict responsible cyber-criminals in a court of law. Log files provide significant digital evidence in computer networks when tracing cyber-criminals. Network log
Styles APA, Harvard, Vancouver, ISO, etc.
3

Argauer, Brian John. "VTAC : virtual terrain assisted impact assessment for cyber attacks /." Online version of thesis, 2007. http://hdl.handle.net/1850/4872.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Van, Heerden Renier Pelser. "A formalised ontology for network attack classification." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011603.

Texte intégral
Résumé :
One of the most popular attack vectors against computers are their network connections. Attacks on computers through their networks are commonplace and have various levels of complexity. This research formally describes network-based computer attacks in the form of a story, formally and within an ontology. The ontology categorises network attacks where attack scenarios are the focal class. This class consists of: Denial-of- Service, Industrial Espionage, Web Defacement, Unauthorised Data Access, Financial Theft, Industrial Sabotage, Cyber-Warfare, Resource Theft, System Compromise, and Runaway
Styles APA, Harvard, Vancouver, ISO, etc.
5

Seeley, Nathaniel. "Digital receipts : a system to detect the compromise of digital certificates /." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1590.pdf.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Fava, Daniel Schnetzer. "Characterization of cyber attacks through variable length Markov models /." Online version of thesis, 2007. http://hdl.handle.net/1850/4776.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Foster, Mark S. "Process forensics the crossroads of checkpointing and intrusion detection /." [Gainesville, Fla.] : University of Florida, 2004. http://purl.fcla.edu/fcla/etd/UFE0008063.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Lee, Christopher Patrick. "Framework for botnet emulation and analysis." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/28191.

Texte intégral
Résumé :
Thesis (M. S.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2009.<br>Committee Chair: Copeland, John; Committee Member: Durgin, Gregory; Committee Member: Goodman, Seymour; Committee Member: Owen, Henry; Committee Member: Riley, George.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Judd, Aaron C. "Improved Network Security and Disguising TCP/IP Fingerprint Through Dynamic Stack Modification /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FJudd.pdf.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Kortjan, Noloxolo. "A cyber security awareness and education framework for South Africa." Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1014829.

Texte intégral
Résumé :
The Internet is becoming increasingly interwoven in the daily life of many individuals, organisations and nations. It has, to a large extent, had a positive effect on the way people communicate. It has also introduced new avenues for business and has offered nations an opportunity to govern online. Nevertheless, although cyberspace offers an endless list of services and opportunities, it is also accompanied by many risks. One of these risks is cybercrime. The Internet has given criminals a platform on which to grow and proliferate. As a result of the abstract nature of the Internet, it is easy
Styles APA, Harvard, Vancouver, ISO, etc.
Plus de sources

Livres sur le sujet "Computer crimes Computer crimes Computer networks"

1

Vacca, John R. Computer forensics: Computer crime scene investigation. 3rd ed. Jones and Bartlett Publishers, 2010.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Computer forensics: Computer crime scene investigation. 2nd ed. Charles River Media, 2005.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Diane, Barrett, and Broom Neil, eds. Computer forensics jumpstart. SYBEX, 2004.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

author, Rudolph K., Tittel Ed author, Broom Neil author, and Barrett Diane author, eds. Computer forensics jumpstart. Wiley Publishing, Inc., 2011.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Branigan, Steven. High-tech crimes revealed: Cyberwar stories from the digital front. Addison-Wesley, 2005.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

High-tech crimes revealed: Cyberwar stories from the digital front. Addison-Wesley, 2005.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Casey, Eoghan. Digital evidence and computer crime: Forensic science, computers and the Internet. Academic, 2000.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Digital evidence and computer crime: Forensic science, computers and the Internet. Academic, 1999.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Digital evidence and computer crime: Forensic science, computers, and the Internet. 2nd ed. Academic Press, 2004.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Denning, Peter J. Threats and countermeasures for network security. Research Institute for Advanced Computer Science, NASA Ames Research Center, 1989.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Plus de sources

Chapitres de livres sur le sujet "Computer crimes Computer crimes Computer networks"

1

Kizza, Joseph Migga. "Computer Networks and Online Crimes." In Texts in Computer Science. Springer London, 2010. http://dx.doi.org/10.1007/978-1-84996-038-0_12.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Kizza, Joseph Migga. "Cyber Crimes and Hackers." In Guide to Computer Network Security. Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_5.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Kizza, Joseph Migga. "Cyber Crimes and Hackers." In Guide to Computer Network Security. Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4543-1_5.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Kizza, Joseph Migga. "Cyber Crimes and Hackers." In Guide to Computer Network Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-55606-2_5.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Patra, Manas Ranjan, and Bipin Bihari Jayasingh. "A Software Agent Based Approach for Fraud Detection in Network Crimes." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30176-9_40.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Kizza, Joseph Migga. "Computer Crimes." In Texts in Computer Science. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70712-9_9.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Kizza, Joseph Migga. "Computer Crimes." In Texts in Computer Science. Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-4990-3_9.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Kizza, Joseph Migga. "Computer Crimes." In Undergraduate Topics in Computer Science. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-03937-0_8.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Kizza, Joseph Migga. "Computer Crimes." In Texts in Computer Science. Springer London, 2010. http://dx.doi.org/10.1007/978-1-84996-038-0_9.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Kizza, Joseph Migga. "Computer Crimes." In Ethics in Computing. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29106-2_8.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "Computer crimes Computer crimes Computer networks"

1

Zhu, Shijie. "Research of Computer Network Crimes Investigation and Legal Supervision Measures." In 2016 2nd International Conference on Education, Social Science, Management and Sports (ICESSMS 2016). Atlantis Press, 2017. http://dx.doi.org/10.2991/icessms-16.2017.4.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Arias, Alejandra Ivone, and Mario Jose Divan. "Contributions to the Genre Violence Analysis in Jujuy: Initial Characterization of Crimes." In 2019 4th International Conference on Information Systems and Computer Networks (ISCON). IEEE, 2019. http://dx.doi.org/10.1109/iscon47742.2019.9036189.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Zaliwski, Andrzej. "Computer Network Simulation and Network Security Auditing in a Spatial Context of an Organization." In InSITE 2005: Informing Science + IT Education Conference. Informing Science Institute, 2005. http://dx.doi.org/10.28945/2857.

Texte intégral
Résumé :
The business organizations currently functioning inside cyberspace are vulnerable to threats and forms of crimes that were unknown prior to the Internet era. New challenges for security have emerged from this situation. It has become increasingly necessary to educate a large number of professionals to be better prepared to maintain the growing number of computer networks. Also, there is a need to place strong emphasis on the security aspects of a network. These goals are impossible to realize without solving the following problems: lack of safe infrastructure, where security experiments can no
Styles APA, Harvard, Vancouver, ISO, etc.
4

Kizza, Joseph M. "Combating computer crimes." In the conference. ACM Press, 1994. http://dx.doi.org/10.1145/199544.199609.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Quintiliano, Paulo. "Crimes Cibernéticos e seus Efeitos Internacionais." In First International Conference on Forensic Computer Science. ABEAT, 2006. http://dx.doi.org/10.5769/c2006002.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Bueno, Pedro. "Cyber Crimes - a trilha do dinheiro." In First International Conference on Forensic Computer Science. ABEAT, 2006. http://dx.doi.org/10.5769/c2006013.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Ianelli, Nicholas, and Aaron Hackworth. "Botnets as a Vehicle for Online Crimes." In First International Conference on Forensic Computer Science. ABEAT, 2006. http://dx.doi.org/10.5769/c2006003.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Carvalho, Ana, Fernando Sousa, José Neto, Paulo Neves, Rafael Fragoso, and Rodolfo Mazzonetto. "Crimes da Informática no Código Penal Brasileiro." In The Third International Conference on Forensic Computer Science. ABEAT, 2008. http://dx.doi.org/10.5769/c2008010.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Jian, Shuyi, and Hongyan Chen. "Legal explore & analyse on computer and cyber crime." In 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet). IEEE, 2012. http://dx.doi.org/10.1109/cecnet.2012.6201653.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Olinder, Nina, and Aleksej Tsvetkov. "Leading Forensic and Sociological Aspects in Investigating Computer Crimes." In 6th International Conference on Social, economic, and academic leadership (ICSEAL-6-2019). Atlantis Press, 2020. http://dx.doi.org/10.2991/assehr.k.200526.037.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!