Articles de revues sur le sujet « Computer crimes Computer crimes Computer networks »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les 50 meilleurs articles de revues pour votre recherche sur le sujet « Computer crimes Computer crimes Computer networks ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Parcourez les articles de revues sur diverses disciplines et organisez correctement votre bibliographie.
Stratonov, Vasyl. ""Computer crimes": some features and characteristics." Naukovyy Visnyk Dnipropetrovs'kogo Derzhavnogo Universytetu Vnutrishnikh Sprav 2, no. 2 (2020): 134–41. http://dx.doi.org/10.31733/2078-3566-2020-2-134-141.
Texte intégralМ.M., Haryha, Verhun L.O., and Kuznetsov O.O. "Some aspects of criminal characteristics of cyber crimes." Scientific Herald of Sivershchyna. Series: Law 2020, no. 3 (2020): 89–99. http://dx.doi.org/10.32755/sjlaw.2020.03.089.
Texte intégralWalden, Ian. "Harmonising Computer Crime Laws in Europe." European Journal of Crime, Criminal Law and Criminal Justice 12, no. 4 (2004): 321–36. http://dx.doi.org/10.1163/1571817042523095.
Texte intégralRossinskaya, E. R., and I. A. Ryadovskiy. "Modern means of committing computer crimes and patterns of their execution." Lex Russica, no. 3 (April 5, 2019): 87–99. http://dx.doi.org/10.17803/1729-5920.2019.148.3.087-099.
Texte intégralFutra, Yumelfi. "TINJAUAN PERISTIWA CYBER CRIME YANG TERJADI PADA TAHUN 2019 DI KOTA SAWAHLUNTO." UNES Law Review 3, no. 1 (2020): 55–68. http://dx.doi.org/10.31933/unesrev.v3i1.145.
Texte intégralRostami, Soraya. "Juridical Study of Crimes Committed with Computer." Asian Social Science 12, no. 11 (2016): 79. http://dx.doi.org/10.5539/ass.v12n11p79.
Texte intégralKlebanov, Lev R., and Svetlana V. Polubinskaya. "COMPUTER TECHNOLOGIES FOR COMMITTING SABOTAGE AND TERRORISM." RUDN Journal of Law 24, no. 3 (2020): 717–34. http://dx.doi.org/10.22363/2313-2337-2020-24-3-717-734.
Texte intégralTkalichenko, Sergiy, Valentyna Khotskina, Zhanna Tsymbal, Victoria Solovieva, and Olena Burunova. "Modern Structural Level and Dynamics of Crimes with The Use of Computers, Automation Systems, Computer Networks and Electric Connection Systems." SHS Web of Conferences 100 (2021): 01014. http://dx.doi.org/10.1051/shsconf/202110001014.
Texte intégralOvalle Lizcano, Tatiana Valentina, Diego Luis Coronel Peñuela, Rocío de Belén Contreras Manrique, and Alfonso Cabrera Reyes. "Impact on personal security against the regulation of cybercrime at the University of Pamplona, Villa del Rosario headquarters." Respuestas 24, no. 3 (2019): 14–25. http://dx.doi.org/10.22463/0122820x.1845.
Texte intégralTariq, Haseeb, Muhammad Kashif Hanif, Muhammad Umer Sarwar, Sabeen Bari, Muhammad Shahzad Sarfraz, and Rozita Jamili Oskouei. "Employing Deep Learning and Time Series Analysis to Tackle the Accuracy and Robustness of the Forecasting Problem." Security and Communication Networks 2021 (March 31, 2021): 1–10. http://dx.doi.org/10.1155/2021/5587511.
Texte intégralAmbika, Dr T., and Dr K. Senthilvel. "Cyber Crimes against the State: A Study on Cyber Terrorism in India." Webology 17, no. 2 (2020): 65–72. http://dx.doi.org/10.14704/web/v17i2/web17016.
Texte intégralRiadi, Imam, Sunardi Sunardi, and Muhamad Ermansyah Rauli. "Identifikasi Bukti Digital WhatsApp pada Sistem Operasi Proprietary Menggunakan Live Forensics." Jurnal Teknik Elektro 10, no. 1 (2018): 18–22. http://dx.doi.org/10.15294/jte.v10i1.14070.
Texte intégralPadirayon, Lourdes M., Melvin S. Atayan, Jose Sherief Panelo, and Carlito R. Fagela, Jr. "Mining the crime data using naïve Bayes model." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 2 (2021): 1084. http://dx.doi.org/10.11591/ijeecs.v23.i2.pp1084-1092.
Texte intégralHu, Jing Fang, and Bu Sheng Li. "Research the Computer Forensics Based on Network." Advanced Materials Research 694-697 (May 2013): 2282–85. http://dx.doi.org/10.4028/www.scientific.net/amr.694-697.2282.
Texte intégralMartínez-Mascorro, Guillermo A., José R. Abreu-Pederzini, José C. Ortiz-Bayliss, Angel Garcia-Collantes, and Hugo Terashima-Marín. "Criminal Intention Detection at Early Stages of Shoplifting Cases by Using 3D Convolutional Neural Networks." Computation 9, no. 2 (2021): 24. http://dx.doi.org/10.3390/computation9020024.
Texte intégralKirilenko, Viktor, and Georgy Alekseev. "The Harmonization of Russian Criminal Legislation on Counteracting Cybercrime with the Legal Standards of the Council of Europe." Russian Journal of Criminology 14, no. 6 (2020): 898–913. http://dx.doi.org/10.17150/2500-4255.2020.14(6).898-913.
Texte intégralKu, Chih-Hao, and Gondy Leroy. "A crime reports analysis system to identify related crimes." Journal of the American Society for Information Science and Technology 62, no. 8 (2011): 1533–47. http://dx.doi.org/10.1002/asi.21552.
Texte intégralArkhipova, E. A., and V. N. Dodonov. "International Legal Problems of Cooperation in the Detection, Investigation and Prevention of Crimes Committed Using Information and Telecommunication Networks and in the Field of Computer Information." Moscow Journal of International Law, no. 2 (November 19, 2020): 77–87. http://dx.doi.org/10.24833/0869-0049-2020-2-77-87.
Texte intégralPlotnikova, T. V., and O. V. Kotelnikova. "The Phenomenon of Cybercrime in the 21st Century." Pravo: istoriya i sovremennost', no. 3(12) (2020): 141–50. http://dx.doi.org/10.17277/pravo.2020.03.pp.141-150.
Texte intégralKotwal, Shallu, and Jatinder Manhas. "Investigation of Different Constraints in Cybercrime & Digital Forensics." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (2017): 222. http://dx.doi.org/10.23956/ijarcsse/v7i7/0209.
Texte intégralGonov, Shamil Khasanovich, and Anton Vladimirovich Milovanov. "Topical questions of crime prevention in the Darknet." Полицейская и следственная деятельность, no. 1 (January 2021): 26–34. http://dx.doi.org/10.25136/2409-7810.2021.1.34560.
Texte intégralSolovyev, V. S., and M. N. Urda. "Importance of the Internet in Illegal Migration and Migration Crimes Determination." Actual Problems of Russian Law 1, no. 12 (2020): 114–22. http://dx.doi.org/10.17803/1994-1471.2019.109.12.114-122.
Texte intégralPANDELICĂ, Ioana-Lucia. "The Phenomenon of Cyber Crime." International Journal of Information Security and Cybercrime 9, no. 1 (2020): 29–36. http://dx.doi.org/10.19107/ijisc.2020.01.04.
Texte intégralDronova, Olga Borisovna, Aleksey Aleksandrovich Kurin, Anna Pavlovna Alekseeva, Dmitriy Nikolaevich Sidorenko, and Svetlana Dmitrievna Guseva. "Information and analytical support for the detection and investigation of crimes." SHS Web of Conferences 108 (2021): 04010. http://dx.doi.org/10.1051/shsconf/202110804010.
Texte intégralLydia Jane G. and Seetha Hari. "Crime Prediction Using Twitter Data." International Journal of e-Collaboration 17, no. 3 (2021): 62–74. http://dx.doi.org/10.4018/ijec.2021070104.
Texte intégralSamoilenko, Olena, and Kateryna Titunina. "Internet fraud: technologies of performance, ways of counteraction and prevention." ScienceRise: Juridical Science, no. 2(16) (June 30, 2021): 65–70. http://dx.doi.org/10.15587/2523-4153.2021.235769.
Texte intégralZahoor, Rashida, and Naseem Razi. "Cyber-Crimes and Cyber Laws of Pakistan: An Overview." Progressive Research Journal of Arts & Humanities (PRJAH) 2, no. 2 (2020): 133–43. http://dx.doi.org/10.51872/prjah.vol2.iss2.43.
Texte intégralMalov, Aleksandr A. "INTERNATIONAL LAW STANDARDS FOR OBTAINING OF ELECTRONIC EVIDENCE FROM FOREIGN JURISDICTIONS." International criminal law and international justice 1 (January 14, 2021): 19–23. http://dx.doi.org/10.18572/2071-1190-2021-1-19-23.
Texte intégralGerasimenko, N. I. "Specifics of using the Internet in the investigation of extremist crimes." Penitentiary Science 14, no. 3 (2020): 388–93. http://dx.doi.org/10.46741/2686-9764-2020-14-3-388-393.
Texte intégralKagawa, Takuhiro, Sachio Saiki, and Masahide Nakamura. "Analyzing street crimes in Kobe city using PRISM." International Journal of Web Information Systems 15, no. 2 (2019): 183–200. http://dx.doi.org/10.1108/ijwis-04-2018-0032.
Texte intégralPutri, M.Kom, Anggia Dasa. "SISTEM PAKAR MENDETEKSI TINDAK PIDANA CYBERCRIME MENGGUNAKAN METODE FORWARD CHAINING BERBASIS WEB DI KOTA BATAM." Edik Informatika 3, no. 2 (2017): 197–210. http://dx.doi.org/10.22202/ei.2017.v3i2.2244.
Texte intégralGilmanov, Eduard, and Danila Kirpichnikov. "On the need to develop a methodology for investigating crimes in the field of digital information circulation." Current Issues of the State and Law, no. 14 (2020): 262–77. http://dx.doi.org/10.20310/2587-9340-2020-4-14-262-277.
Texte intégralBorysova, L., P. Bilenchuk, M. Malii, and V. Vynohradova. "EXAMINATION AS A MEANS OF ESTABLISHING THE FACTS AND CIRCUMSTANCES OF COMMISSION OF TRANSNATIONAL COMPUTER CRIMES." Criminalistics and Forensics, no. 65 (May 18, 2020): 230–39. http://dx.doi.org/10.33994/kndise.2020.65.22.
Texte intégralSuryadi, Ahmad. "Responsiveness of Criminal Law to Skimming Crimes in The Era of Industrial Revolution 4.0 (Four Point Zero)." Jurnal Hukum Volkgeist 5, no. 2 (2021): 130–42. http://dx.doi.org/10.35326/volkgeist.v5i2.845.
Texte intégralOlukolu, Rasul Oriyomi. "An Assessment of the Impact of Municipal Laws on the Policing of Cybercrimes in Nigeria." African Journal of Legal Studies 11, no. 2-3 (2018): 234–53. http://dx.doi.org/10.1163/17087384-12340034.
Texte intégralKhatun, Most Rokeya, Safial Islam Ayon, Md Rahat Hossain, and Md Jaber Alam. "Data mining technique to analyse and predict crime using crime categories and arrest records." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 2 (2021): 1052. http://dx.doi.org/10.11591/ijeecs.v22.i2.pp1052-1060.
Texte intégralGribina, E., and E. Savchenko. "UK Revenue Service Best Practices for Fighting Tax Evasion." Auditor 7, no. 6 (2021): 41–45. http://dx.doi.org/10.12737/1998-0701-2021-7-6-41-45.
Texte intégralRossinskaya, E. R., and A. I. Semikalenova. "Counterfeit Information and Computer Product as an Object of Forensic Research of Computer Tools and Systems." Lex Russica, no. 8 (August 25, 2020): 86–95. http://dx.doi.org/10.17803/1729-5920.2020.165.8.086-095.
Texte intégralShut, Oksana A. "Fraud in Social Networks and Ways to Implement." Herald of Omsk University. Series: Law 17, no. 4 (2020): 97–106. http://dx.doi.org/10.24147/1990-5173.2020.17(4).97-106.
Texte intégralBaird, Lindsay. "The Detection of Crimes and Errors and Omissions." EDPACS 29, no. 3 (2001): 1–8. http://dx.doi.org/10.1201/1079/43274.29.3.20010901/31729.1.
Texte intégralVolinsky, Alexander Fomich, and Vladimir Antonovich Prorvich. "Features of Formation of Integrated Legal Foundation for Electronic Litigation on Crimesin the Sphere of Eco." Russian Journal of Legal Studies 6, no. 1 (2019): 149–58. http://dx.doi.org/10.17816/rjls18487.
Texte intégralSONG, RONGGONG, LARRY KORBA, GEORGE YEE, and YING-CHIEH CHEN. "PROTECT VIRTUAL PROPERTY IN ONLINE GAMING SYSTEM." International Journal of Software Engineering and Knowledge Engineering 17, no. 04 (2007): 483–96. http://dx.doi.org/10.1142/s0218194007003367.
Texte intégralStevanovic, Ivana. "Criminal acts related to the exploitation of child pornography through abuse of computer systems and networks: International and domestic criminal legislation framework." Temida 12, no. 3 (2009): 27–41. http://dx.doi.org/10.2298/tem0903027s.
Texte intégralMaimon, D., A. Kamerdze, M. Cukier, and B. Sobesto. "Daily Trends and Origin of Computer-Focused Crimes Against a Large University Computer Network: An Application of the Routine-Activities and Lifestyle Perspective." British Journal of Criminology 53, no. 2 (2013): 319–43. http://dx.doi.org/10.1093/bjc/azs067.
Texte intégralStéphano Rufino Belezzi, Hugo. "AS NOVAS MODALIDADES DE CRIMES CIBERNÉTICOS: O CYBERBULLYING, VINGANÇA PORNOGRÁFICA E A INTERNET PROFUNDA (DEEP WEB)." Colloquium Socialis 2, Especial 2 (2018): 154–61. http://dx.doi.org/10.5747/cs.2018.v02.nesp2.s0271.
Texte intégralЕфремов, Андрей, and Andrey Efremov. "THE DEVELOPMENT OF THE USA LEGISLATION ON THE FIGHT AGAINST TERRORISM AFTER 11 SEPTEMBER 2001." Journal of Foreign Legislation and Comparative Law 3, no. 3 (2017): 86–92. http://dx.doi.org/10.12737/article_593fc343c391e2.71878517.
Texte intégralWahyono, Irawan Dwi, Djoko Saryono, Khoirudin Asfani, Muhammad Ashar, and Sunarti Sunarti. "Smart Online Courses Using Computational Intelligence." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 12 (2020): 29. http://dx.doi.org/10.3991/ijim.v14i12.15601.
Texte intégralDumchykov, M. "THE PROCESSES OF DIGITIZATION AND FORENSICS: A RETROSPECTIVE ANALYSIS." Criminalistics and Forensics, no. 65 (May 18, 2020): 100–108. http://dx.doi.org/10.33994/kndise.2020.65.10.
Texte intégralNurdin, Rizki. "ANALISA KEAMANAN INTERNET MENGGUNAKAN NESSUS DAN ETHEREAL UNIVERSITAS PUTRA INDONESIA “YPTK” PADANG." Jurnal Teknologi Informasi dan Pendidikan 10, no. 3 (2018): 11–25. http://dx.doi.org/10.24036/tip.v10i3.9.
Texte intégralSalhi, Dhai Eddine, Abdelkamel Tari, and Mohand Tahar Kechadi. "Email Classification for Forensic Analysis by Information Gain Technique." International Journal of Software Science and Computational Intelligence 13, no. 4 (2021): 40–53. http://dx.doi.org/10.4018/ijssci.2021100103.
Texte intégral