A Survey On CyberCrime Prediction Techniques

This paper is a review paper of journal and conference papers published in the field of crime prediction. Crime prediction is a growing field in the field of prediction. More and more law enforcement agencies are using or going to implement crime prediction software. In this paper firstly, data collection methods and findings of this paper are described and afterward the collected papers are described and their methods and findings are explained.

[1]  Reda Alhajj,et al.  Crime Hot-Spots Prediction Using Support Vector Machine , 2006, IEEE International Conference on Computer Systems and Applications, 2006..

[2]  Woonyon Kim,et al.  Internet Threat Detection, Prediction and Relevant Reaction System for Pattern-freeWorm , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).

[3]  D.E. Brown,et al.  A Crime Forecasting Tool for the Web-Based Crime Analysis Toolkit , 2007, 2007 IEEE Systems and Information Engineering Design Symposium.

[4]  Jianping Yin,et al.  A Prediction Model of DoS Attack's Distribution Discrete Probability , 2008, 2008 The Ninth International Conference on Web-Age Information Management.

[5]  Ali Dehghantanha Xml-Based Privacy Model in Pervasive Computing , 2008 .

[6]  Donald E. Brown,et al.  A Statistical Threat Assessment , 2009, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[7]  Ali Dehghantanha,et al.  UPM: User-Centered Privacy Model in Pervasive Computing Systems , 2009, 2009 International Conference on Future Computer and Communication.

[8]  Ali Dehghantanha,et al.  User-centered Privacy and Trust Model in Cloud Computing Systems , 2009 .

[9]  Nur Izura Udzir,et al.  A XML based, user-centered privacy model in pervasivecomputing systems , 2009 .

[10]  Ali Dehghantanha,et al.  Towards a Pervasive Formal Privacy Language , 2010, 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops.

[11]  Dawei Song,et al.  Prediction of Series Criminals: An Approach Based on Modeling , 2010, 2010 International Conference on Computational and Information Sciences.

[12]  Ali Dehghantanha,et al.  A Guideline to Enforce Data Protection and Privacy Digital Laws in Malaysia , 2010, 2010 Second International Conference on Computer Research and Development.

[13]  Renjie Liao,et al.  A novel serial crime prediction model based on Bayesian learning theory , 2010, 2010 International Conference on Machine Learning and Cybernetics.

[14]  Ali Dehghantanha,et al.  Utilizing trusted platform module to mitigate botnet attacks , 2010, 2010 International Conference on Computer Applications and Industrial Electronics.

[15]  Ali Dehghantanha,et al.  A User-Centered Context-Sensitive Privacy Model in Pervasive Systems , 2010, 2010 Second International Conference on Communication Software and Networks.

[16]  Ali Dehghantanha,et al.  Towards data centric mobile security , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).

[17]  Ali Dehghantanha,et al.  Analysis of virtual honeynet and VLAN-based virtual networks , 2011, 2011 International Symposium on Humanities, Science and Engineering Research.

[18]  Ali Dehghantanha,et al.  A Mitigation Approach to the Privacy and Malware Threats of Social Network Services , 2011, ICDIPC.

[19]  Ali Dehghantanha,et al.  Greening Digital Forensics: Opportunities and Challenges , 2011, SPIT/IPC.

[20]  George E. Tita,et al.  Self-Exciting Point Process Modeling of Crime , 2011 .

[21]  SeyedHossein Mohtasebi,et al.  SMARTPHONE FORENSICS: A CASE STUDY WITH NOKIA E5-00 MOBILE PHONE , 2011 .

[22]  Ali Dehghantanha,et al.  Framework of digital forensics for the Samsung Star Series phone , 2011, 2011 3rd International Conference on Electronics Computer Technology.

[23]  Ali Dehghantanha,et al.  Investigation of bypassing malware defences and malware detections , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).

[24]  Ali Dehghantanha,et al.  Evaluating User-Centered Privacy Model (UPM) in Pervasive Computing Systems , 2011, CISIS.

[25]  Farid Daryabar,et al.  INVESTIGATION OF MALWARE DEFENCE AND DETECTION TECHNIQUES , 2011 .

[26]  Xiaofeng Wang,et al.  The spatio-temporal generalized additive model for criminal incidents , 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics.

[27]  Yang Cao,et al.  A mathematical modeling approach for geographical profiling and crime prediction , 2011, 2011 IEEE 2nd International Conference on Software Engineering and Service Science.

[28]  Ali Dehghantanha,et al.  Defusing the Hazards of Social Network Services , 2011 .

[29]  Ali Dehghantanha,et al.  Towards secure model for SCADA systems , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).

[30]  Ali Dehghantanha,et al.  VoIP evidence model: A new forensic method for investigating VoIP malicious attacks , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).

[31]  Donald E. Brown,et al.  Using Temporal Indicator Functions with Generalized Linear Models for Spatial-Temporal Event Prediction , 2012, CSER.

[32]  Ali Dehghantanha,et al.  Volatile memory acquisition using backup for forensic investigation , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).

[33]  Xiaofeng Wang,et al.  Spatio-temporal modeling of criminal incidents using geographic, demographic, and twitter-derived information , 2012, 2012 IEEE International Conference on Intelligence and Security Informatics.

[34]  Ali Dehghantanha,et al.  Forensics investigation challenges in cloud computing environments , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).

[35]  Ali Dehghantanha,et al.  A Framework of TPM, SVM and Boot Control for Securing Forensic Logs , 2012 .

[36]  Ali Dehghantanha,et al.  Towards green frameworks for digital forensics investigation , 2013 .

[37]  Ramlan Mahmoud,et al.  Digital forensics trends and future , 2013 .

[38]  Ali Dehghantanha,et al.  A Survey On Cyber-Crime Prediction Techniques , 2013 .

[39]  Ali Dehghantanha,et al.  A survey about impacts of cloud computing on digital forensics , 2013 .

[40]  Ali Dehghantanha,et al.  A SURVEY ON PRIVACY ISSUES IN DIGITAL FORENSICS , 2014 .