A Survey On CyberCrime Prediction Techniques
暂无分享,去创建一个
[1] Reda Alhajj,et al. Crime Hot-Spots Prediction Using Support Vector Machine , 2006, IEEE International Conference on Computer Systems and Applications, 2006..
[2] Woonyon Kim,et al. Internet Threat Detection, Prediction and Relevant Reaction System for Pattern-freeWorm , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).
[3] D.E. Brown,et al. A Crime Forecasting Tool for the Web-Based Crime Analysis Toolkit , 2007, 2007 IEEE Systems and Information Engineering Design Symposium.
[4] Jianping Yin,et al. A Prediction Model of DoS Attack's Distribution Discrete Probability , 2008, 2008 The Ninth International Conference on Web-Age Information Management.
[5] Ali Dehghantanha. Xml-Based Privacy Model in Pervasive Computing , 2008 .
[6] Donald E. Brown,et al. A Statistical Threat Assessment , 2009, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[7] Ali Dehghantanha,et al. UPM: User-Centered Privacy Model in Pervasive Computing Systems , 2009, 2009 International Conference on Future Computer and Communication.
[8] Ali Dehghantanha,et al. User-centered Privacy and Trust Model in Cloud Computing Systems , 2009 .
[9] Nur Izura Udzir,et al. A XML based, user-centered privacy model in pervasivecomputing systems , 2009 .
[10] Ali Dehghantanha,et al. Towards a Pervasive Formal Privacy Language , 2010, 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops.
[11] Dawei Song,et al. Prediction of Series Criminals: An Approach Based on Modeling , 2010, 2010 International Conference on Computational and Information Sciences.
[12] Ali Dehghantanha,et al. A Guideline to Enforce Data Protection and Privacy Digital Laws in Malaysia , 2010, 2010 Second International Conference on Computer Research and Development.
[13] Renjie Liao,et al. A novel serial crime prediction model based on Bayesian learning theory , 2010, 2010 International Conference on Machine Learning and Cybernetics.
[14] Ali Dehghantanha,et al. Utilizing trusted platform module to mitigate botnet attacks , 2010, 2010 International Conference on Computer Applications and Industrial Electronics.
[15] Ali Dehghantanha,et al. A User-Centered Context-Sensitive Privacy Model in Pervasive Systems , 2010, 2010 Second International Conference on Communication Software and Networks.
[16] Ali Dehghantanha,et al. Towards data centric mobile security , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).
[17] Ali Dehghantanha,et al. Analysis of virtual honeynet and VLAN-based virtual networks , 2011, 2011 International Symposium on Humanities, Science and Engineering Research.
[18] Ali Dehghantanha,et al. A Mitigation Approach to the Privacy and Malware Threats of Social Network Services , 2011, ICDIPC.
[19] Ali Dehghantanha,et al. Greening Digital Forensics: Opportunities and Challenges , 2011, SPIT/IPC.
[20] George E. Tita,et al. Self-Exciting Point Process Modeling of Crime , 2011 .
[21] SeyedHossein Mohtasebi,et al. SMARTPHONE FORENSICS: A CASE STUDY WITH NOKIA E5-00 MOBILE PHONE , 2011 .
[22] Ali Dehghantanha,et al. Framework of digital forensics for the Samsung Star Series phone , 2011, 2011 3rd International Conference on Electronics Computer Technology.
[23] Ali Dehghantanha,et al. Investigation of bypassing malware defences and malware detections , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).
[24] Ali Dehghantanha,et al. Evaluating User-Centered Privacy Model (UPM) in Pervasive Computing Systems , 2011, CISIS.
[25] Farid Daryabar,et al. INVESTIGATION OF MALWARE DEFENCE AND DETECTION TECHNIQUES , 2011 .
[26] Xiaofeng Wang,et al. The spatio-temporal generalized additive model for criminal incidents , 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics.
[27] Yang Cao,et al. A mathematical modeling approach for geographical profiling and crime prediction , 2011, 2011 IEEE 2nd International Conference on Software Engineering and Service Science.
[28] Ali Dehghantanha,et al. Defusing the Hazards of Social Network Services , 2011 .
[29] Ali Dehghantanha,et al. Towards secure model for SCADA systems , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).
[30] Ali Dehghantanha,et al. VoIP evidence model: A new forensic method for investigating VoIP malicious attacks , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).
[31] Donald E. Brown,et al. Using Temporal Indicator Functions with Generalized Linear Models for Spatial-Temporal Event Prediction , 2012, CSER.
[32] Ali Dehghantanha,et al. Volatile memory acquisition using backup for forensic investigation , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).
[33] Xiaofeng Wang,et al. Spatio-temporal modeling of criminal incidents using geographic, demographic, and twitter-derived information , 2012, 2012 IEEE International Conference on Intelligence and Security Informatics.
[34] Ali Dehghantanha,et al. Forensics investigation challenges in cloud computing environments , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).
[35] Ali Dehghantanha,et al. A Framework of TPM, SVM and Boot Control for Securing Forensic Logs , 2012 .
[36] Ali Dehghantanha,et al. Towards green frameworks for digital forensics investigation , 2013 .
[37] Ramlan Mahmoud,et al. Digital forensics trends and future , 2013 .
[38] Ali Dehghantanha,et al. A Survey On Cyber-Crime Prediction Techniques , 2013 .
[39] Ali Dehghantanha,et al. A survey about impacts of cloud computing on digital forensics , 2013 .
[40] Ali Dehghantanha,et al. A SURVEY ON PRIVACY ISSUES IN DIGITAL FORENSICS , 2014 .