2012 International Conference on Computer &Amp; Information Science (ICCIS) 2012
DOI: 10.1109/iccisci.2012.6297307
|View full text |Cite
|
Sign up to set email alerts
|

A framework to detect cybercrime in the virtual environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 5 publications
0
6
0
Order By: Relevance
“…According to the researchers, the results of their studies performed very well in detecting cyberbullying in both languages. In this way, their model can therefore detect multiple languages in the cyberbullying space [40], [41].…”
Section: A Cyberbullying Text Detectionmentioning
confidence: 99%
“…According to the researchers, the results of their studies performed very well in detecting cyberbullying in both languages. In this way, their model can therefore detect multiple languages in the cyberbullying space [40], [41].…”
Section: A Cyberbullying Text Detectionmentioning
confidence: 99%
“…Based on [25], cyber crime could be categorized in two ways: content based and technology based crimes. The former is managed by any specific terrorist organization related to the article of threating , national security, child pornography, sexual harassment, etc.…”
Section: Cybercrime Analysismentioning
confidence: 99%
“…The second group consists of the people who may not expert users of computer but utilize computers and the Internet to harass other users, such as to bully someone using social media, to threaten national security using Internet services, and to send threatening e-mails. Given these characteristics, cybercrime is classified into two broad categories, namely, (i) technology-based cybercrimes and (ii) content-based cyber [57], as shown in Fig. 1.…”
Section: Cybercrime and Its Taxonomymentioning
confidence: 99%
“…This type of cybercrime is performed by technical experts and involves hacking, injection of malicious codes, and incidents of espionage [57]. Cyberattack, a type of technology-based cybercrime, is any sort of offensive act utilized by people or entire associations that targets information systems, critical infrastructure, computer networks, and/or personal computers via different methods for pernicious acts normally starting from an unknown source that either takes, changes, or decimates a predefined focus by hacking into a susceptible system [58].…”
Section: Technology-based Cybercrimementioning
confidence: 99%
See 1 more Smart Citation