Toward a cybercrime classification ontology: A knowledge-based approach
暂无分享,去创建一个
[1] Björn Niehaves,et al. Design science research genres: introduction to the special issue on exemplars and criteria for applicable design science research , 2018, Eur. J. Inf. Syst..
[2] John D. Howard,et al. An analysis of security incidents on the Internet 1989-1995 , 1998 .
[3] Nicola Guarino,et al. Ontologies and Knowledge Bases. Towards a Terminological Clarification , 1995 .
[4] Lila Rao-Graham,et al. Towards defining dimensions of knowledge systems quality , 2007, Expert Syst. Appl..
[5] Richard Ford,et al. On the definition and classification of cybercrime , 2006, Journal in Computer Virology.
[6] George M. Mohay,et al. Dealing with the Problem of Cybercrime , 2010, ICDF2C.
[7] Maria Kjaerland,et al. A taxonomy and comparison of computer security incidents from the commercial and government sectors , 2006, Comput. Secur..
[8] M. B. Peterson,et al. Law Enforcement Analytic Standards , 2012 .
[9] Alan R. Hevner,et al. POSITIONING AND PRESENTING DESIGN SCIENCE RESEARCH FOR MAXIMUM IMPACT 1 , 2013 .
[10] Georgios Paliouras,et al. Ontology Population and Enrichment: State of the Art , 2011, Knowledge-Driven Multimedia Information Extraction and Ontology Evolution.
[11] José H. Canós,et al. On the way to learning style models integration: a Learner's Characteristics Ontology , 2017, Comput. Hum. Behav..
[12] Geert Poels,et al. Evaluating Quality of Conceptual Models Based on User Perceptions , 2006, ER.
[13] Thomas R. Gruber,et al. Toward principles for the design of ontologies used for knowledge sharing? , 1995, Int. J. Hum. Comput. Stud..
[14] Samir Chatterjee,et al. A Design Science Research Methodology for Information Systems Research , 2008 .
[15] cyberdetective. Convention on Cybercrime , 2007 .
[16] Andrew James Simmonds,et al. An Ontology for Network Security Attacks , 2004, AACC.
[17] Suliman Al-Hawamdeh,et al. Knowledge management in the public sector: principles and practices in police work , 2001, J. Inf. Sci..
[18] Danielle Boulanger,et al. Managing the domain knowledge: application to cultural patrimony , 2012 .
[19] Russell G. Smith,et al. Cyber Criminals on Trial: List of figures and tables , 2004 .
[20] Ray Hunt,et al. A taxonomy of network and computer attacks , 2005, Comput. Secur..
[21] Kweku-Muata Osei-Bryson,et al. A Cybercrime Taxonomy: Case of the Jamaican Jurisdiction , 2014, CONF-IRM.
[22] Weiping Chang,et al. Knowledge Management in Cybercrime Investigation - A Case Study of Identifying Cybercrime Investigation Knowledge in Taiwan , 2014, PAISI.
[23] Jerry H. Ratcliffe,et al. Knowledge Management Challenges in the Development of Intelligence‐Led Policing , 2008 .
[24] Petter Gottschalk,et al. Police officers’ professional knowledge , 2008 .
[25] Fawn T. Ngo,et al. Commemorating a Decade in Existence of the International Journal of Cyber Criminology: A Research Agenda to Advance the Scholarship on Cyber Crime , 2017 .
[26] Faten Kharbat,et al. Building Ontology from Knowledge Base Systems , 2008 .
[27] Kim-Kwang Raymond Choo,et al. The cyber threat landscape: Challenges and future research directions , 2011, Comput. Secur..
[28] Soumyo D. Moitra,et al. Cybercrime: Towards an Assessment of its Nature and Impact , 2004 .
[29] Rosa Gil,et al. Emotions ontology for collaborative modelling and learning of emotional responses , 2015, Comput. Hum. Behav..
[30] Richard Gil,et al. SMOL: a systemic methodology for ontology learning from heterogeneous sources , 2014, Journal of Intelligent Information Systems.
[31] David S. Wall,et al. The Internet as a Conduit for Criminal Activity , 2015 .
[32] Kenneth C. Laudon,et al. Essentials of Management Information Systems , 2000 .
[33] Jose Manuel Corera,et al. Building and Reusing Ontologies for Electrical Network Applications , 1996, ECAI.
[34] Alan R. Hevner,et al. Design Science in Information Systems Research , 2004, MIS Q..
[35] Angelos Stavrou,et al. Towards a Cyber Conflict Taxonomy , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).
[36] Kim-Kwang Raymond Choo. Organised crime groups in cyberspace: a typology , 2008 .
[37] Steven Furnell,et al. Cybercrime: Vandalizing the Information Society , 2003, ICWE.
[38] Simon Brown,et al. The Case for a Consistent Cyberscam Classification Framework (CCCF) , 2009, 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing.
[39] Pawel Garbacz,et al. A formal ontology of knowing and knowledge , 2012 .
[40] Demetrios G. Sampson,et al. A SKOS-based framework for Subject Ontologies to improve learning experiences , 2016, Comput. Hum. Behav..
[41] Hsinchun Chen,et al. COPLINK Center: Information and Knowledge Management for Law Enforcement , 2004, DG.O.
[42] Juana María Ruiz-Martínez,et al. An ontological model for managing professional expertise , 2016 .
[43] Yingwei Luo,et al. The Study and Application of Crime Emergency Ontology Event Model , 2005, KES.
[44] Balbir S. Barn,et al. An Ontological Representation of a Taxonomy for Cybercrime , 2016, ECIS.
[45] Dale Dzemydiene,et al. Ontology-Based Decision Support System for Crime Investigation Processes , 2005 .
[46] Lynne M. Coventry,et al. Costly but effective: Comparing the factors that influence employee anti-malware behaviours , 2018, Comput. Hum. Behav..
[47] Louise Leenen,et al. A Computer Network Attack Taxonomy and Ontology , 2012, Int. J. Cyber Warf. Terror..