A framework to detect cybercrime in the virtual environment
暂无分享,去创建一个
S. Basri | S. Sulaiman | M. Thangiah | S. Sulaiman | S. Basri | M. Thangiah
[1] Rowan Bosworth‐Davies. Money laundering – chapter four , 2007 .
[2] Massimo Nardo,et al. Building synergies between theory and practice , 2006 .
[3] Enid Mumford,et al. Dangerous Decisions: Problem Solving in Tomorrow's World , 1999 .
[4] Brigitte Lebens Nacos,et al. Terrorism and Counterterrorism: Understanding Threats and Responses in the Post 9/11 World , 2009 .
[5] Aurel Croissant,et al. Following the Money Trail: Terrorist Financing and Government Responses in Southeast Asia 1 , 2007 .
[6] M.K.O. Lee. Hacking and computer viruses-the legal dimension , 1990 .
[7] Kim-Kwang Raymond Choo,et al. Criminal Exploitation of Online Systems by Organised Crime Groups , 2008 .