A Data Analytics Strategy to the Underground Economy of Cybercrime
Massive cyberattacks and cybercrimes such as ransomware and distributed denial of service (DDoS) attacks have become more and more of a danger, and individuals, organizations, and governments have struggled to discover effective means to defend against them. In 2017, the WannaCry ransomware wa...
| Main Authors: | Varun, P.R., Usha, Sree, Malathy, Batumalay |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
INTI International University
2024
|
| Subjects: | |
| Online Access: | http://eprints.intimal.edu.my/1928/ http://eprints.intimal.edu.my/1928/1/jods2024_12.pdf |
Similar Items
Locating and collecting cybercrime evidences on cloud storage: review
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
Monitoring Unusual Activity Using Remote-Controlled Computer and Android Based Application
by: Chitra, Batumalai, et al.
Published: (2019)
by: Chitra, Batumalai, et al.
Published: (2019)
Social Media Website with Python using Django
by: Shreyanjali, P.B., et al.
Published: (2024)
by: Shreyanjali, P.B., et al.
Published: (2024)
Smart Lighting System for Library Using IoT Technology
by: Chitra, Batumalai, et al.
Published: (2019)
by: Chitra, Batumalai, et al.
Published: (2019)
Adoption of Internet of Things in Water Drinking Reminder System
by: Ng, Hui Xin, et al.
Published: (2022)
by: Ng, Hui Xin, et al.
Published: (2022)
Traffic Sign Board Recognition and Voice Alert System using CNN
by: Yogesh, C.M., et al.
Published: (2024)
by: Yogesh, C.M., et al.
Published: (2024)
Reducing Risks and Enhancing Security and Privacy in IoT-based Health Monitoring Application using Blockchain Technology
by: Chitra, Batumalai, et al.
Published: (2022)
by: Chitra, Batumalai, et al.
Published: (2022)
Cloud-Based Enhanced Storage System Using Android Technology
by: Malathy, Batumalay, et al.
Published: (2021)
by: Malathy, Batumalay, et al.
Published: (2021)
Phishing Website Detection using Machine Learning
by: Padmini, Y, et al.
Published: (2024)
by: Padmini, Y, et al.
Published: (2024)
Mobile-Based Digital Car Plate Number for Future Automotive Industry
by: Malathy, Batumalay, et al.
Published: (2019)
by: Malathy, Batumalay, et al.
Published: (2019)
BSRCA: Biological sequence analysis approach to robotic soccer with cellular automata classifier
by: P., Kiran Sree, et al.
Published: (2008)
by: P., Kiran Sree, et al.
Published: (2008)
Cybercrime behaviour in the context of youth development
by: Jaya, M. Izham, et al.
Published: (2022)
by: Jaya, M. Izham, et al.
Published: (2022)
Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
Blending big data analytics: review on challenges and a recent study
by: Fairuz, Amalina, et al.
Published: (2020)
by: Fairuz, Amalina, et al.
Published: (2020)
Flower pollination algorithm for data generation and analytics - a diagnostic analysis
by: Odili, Julius Beneoluchi, et al.
Published: (2020)
by: Odili, Julius Beneoluchi, et al.
Published: (2020)
Agent-based Big Data Analytics in Retailing: A Case Study
by: Firas, D. Ahmed, et al.
Published: (2015)
by: Firas, D. Ahmed, et al.
Published: (2015)
Big Data and Learning Analytics: A Big Potential to Improve E-Learning
by: Khalid Adam, Ismail Hammad, et al.
Published: (2018)
by: Khalid Adam, Ismail Hammad, et al.
Published: (2018)
SDN Enabled Big Data Analytics and Framework for Sensor Data of Vehicle Health, Safety and Monitoring System
by: Ahmad, Tanvir, et al.
Published: (2023)
by: Ahmad, Tanvir, et al.
Published: (2023)
Study and Implementation of Internet of Things (IoT) Based on Rainwater Sensor Using Arduino through Mobile Application
by: Malathy, Batumalay, et al.
Published: (2019)
by: Malathy, Batumalay, et al.
Published: (2019)
Systematic Literature Review on Visual Analytics of Predictive
Maintenance in the Manufacturing Industry
by: Cheng, Xiang, et al.
Published: (2022)
by: Cheng, Xiang, et al.
Published: (2022)
Comparison of Utility-First CSS Framework
by: Nandan, S., et al.
Published: (2024)
by: Nandan, S., et al.
Published: (2024)
Cybersecurity in Big Data Era: From Securing Big Data to Data-Driven Security
by: Manjunatha, V., et al.
Published: (2024)
by: Manjunatha, V., et al.
Published: (2024)
Uncovering Relationship between Sleep Disorder and Lifestyle using Predictive Analytics
by: Ying, Sham Fang, et al.
Published: (2022)
by: Ying, Sham Fang, et al.
Published: (2022)
Software Requirement Prioritization Prototype Using Analytical Hierarchical Process (AHP)
by: Rohani, Abu Bakar, et al.
Published: (2014)
by: Rohani, Abu Bakar, et al.
Published: (2014)
Cloud based Heartbeat Rate Monitoring System with Location Tracking
by: Malathy, Batumalay*, et al.
Published: (2020)
by: Malathy, Batumalay*, et al.
Published: (2020)
Analytical approximate solutions for the Helmholtz-Duffing oscillator
by: Md. Alal, Hosen, et al.
Published: (2015)
by: Md. Alal, Hosen, et al.
Published: (2015)
Talent Analytics System for UMP Lecturer Performance
by: Wong Weng, Tim
Published: (2013)
by: Wong Weng, Tim
Published: (2013)
An Analytical Solution for Sales of Seafood in District Karang Agung Ilir
by: Marlindawati, ., et al.
Published: (2024)
by: Marlindawati, ., et al.
Published: (2024)
Pre-Fetch Data Caching Strategy in Mobile Database System for Integrity Constraints Checking
by: Zarina, Dzolkhifli, et al.
Published: (2015)
by: Zarina, Dzolkhifli, et al.
Published: (2015)
MT2Way: A novel strategy for pair-wise test data generation
by: Rabbi, Khandakar Fazley, et al.
Published: (2012)
by: Rabbi, Khandakar Fazley, et al.
Published: (2012)
A Systematic Survey on the Research of AI-predictive Models for Wastewater Treatment Processes
by: Mohan, Varun Geetha, et al.
Published: (2023)
by: Mohan, Varun Geetha, et al.
Published: (2023)
Solution of prey–predator problem by numeric–analytic technique
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2007)
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2007)
Solution of prey–predator problem by numeric–analytic technique
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2009)
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2009)
Hybrid numeric-analytic method for solving chaotic system
by: Razali, NurIsnida, et al.
Published: (2013)
by: Razali, NurIsnida, et al.
Published: (2013)
Pembersihan data untuk gudang data dan pelombong data / Siti Nor Fauzi Razali
by: Siti Nor Fauzi , Razali
Published: (2003)
by: Siti Nor Fauzi , Razali
Published: (2003)
A hybrid kidney algorithm strategy for combinatorial interaction testing problem
by: Ameen Ali, Mohammed Ba Homaid
Published: (2022)
by: Ameen Ali, Mohammed Ba Homaid
Published: (2022)
Data management in biodiversity / Kho Soon Jye
by: Kho, Soon Jye
Published: (2014)
by: Kho, Soon Jye
Published: (2014)
Analytical solution of the fin problem by extended homotopy perturbation method
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2007)
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2007)
Data-Driven Analysis of Computer-Based Testing to Advance Machinist Performance
by: Irwansyah, ., et al.
Published: (2024)
by: Irwansyah, ., et al.
Published: (2024)
Analytical treatment of system of linear and nonlinear PDEs by Homotopy-Perturbation method
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2010)
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2010)
Similar Items
-
Locating and collecting cybercrime evidences on cloud storage: review
by: Ahmed, Abdulghani Ali, et al.
Published: (2017) -
Monitoring Unusual Activity Using Remote-Controlled Computer and Android Based Application
by: Chitra, Batumalai, et al.
Published: (2019) -
Social Media Website with Python using Django
by: Shreyanjali, P.B., et al.
Published: (2024) -
Smart Lighting System for Library Using IoT Technology
by: Chitra, Batumalai, et al.
Published: (2019) -
Adoption of Internet of Things in Water Drinking Reminder System
by: Ng, Hui Xin, et al.
Published: (2022)