A survey on cyber-crime prediction techniques
This paper is a review paper of journal and conference papers published in the field of crime prediction. Crime prediction is a growing field in the field of prediction. More and more law enforcement agencies are using or going to implement crime prediction software. In this paper firstly,data colle...
| Main Authors: | Shaerpour, Kaveh, Dehghantanha, Ali, Mahmod, Ramlan |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Advanced Institute of Convergence Information Technology
2013
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/30586/ http://psasir.upm.edu.my/id/eprint/30586/1/A%20survey%20on%20cyber.pdf |
Similar Items
A systematic literature review for topic detection in chat conversation for cyber-crime investigation
by: Husin, Norzihan, et al.
Published: (2014)
by: Husin, Norzihan, et al.
Published: (2014)
An analysis method of forensic investigation for platform-as-a-service cloud storage services
by: Shaerpour, Kaveh
Published: (2016)
by: Shaerpour, Kaveh
Published: (2016)
A survey on digital forensics trends
by: Dehghantanha, Ali, et al.
Published: (2014)
by: Dehghantanha, Ali, et al.
Published: (2014)
A survey on malware propagation, analysis, and detection
by: Damshenas, Mohsen, et al.
Published: (2013)
by: Damshenas, Mohsen, et al.
Published: (2013)
Cyber warfare trends and future
by: Ganji, Majid, et al.
Published: (2013)
by: Ganji, Majid, et al.
Published: (2013)
A survey on cyber security of CAV
by: He, Qiyi, et al.
Published: (2017)
by: He, Qiyi, et al.
Published: (2017)
An ideal legal system to combat cyber crime: issues and way forward
by: Abdul Ghani Azmi, Ida Madieha, et al.
Published: (2010)
by: Abdul Ghani Azmi, Ida Madieha, et al.
Published: (2010)
Royal Malaysia Police Perspective Computer And Cyber Crime Investigation In Malaysia
by: Lee, Keang Hong
Published: (2008)
by: Lee, Keang Hong
Published: (2008)
Jurisdictional and definitional concerns with computer-mediated interpersonal crimes: An Analysis on Cyber Stalking.
by: Roberts, Lynne
Published: (2008)
by: Roberts, Lynne
Published: (2008)
The legal critiques of the computer crimes act 1997 in regulating cyber crime / Zaiton Hamin, Hartini Saripan and Rafizah Abu Hassan
by: Hamin, Zaiton, et al.
Published: (2011)
by: Hamin, Zaiton, et al.
Published: (2011)
A XML based, user-centered privacy model in pervasive
computing systems
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
Mini-review of street crime prediction and classification methods
by: Nurul Farhana Mohamad Zamri,, et al.
Published: (2021)
by: Nurul Farhana Mohamad Zamri,, et al.
Published: (2021)
An experimental study of classification algorithms for crime prediction.
by: Iqbal, Rizwan, et al.
Published: (2013)
by: Iqbal, Rizwan, et al.
Published: (2013)
Improved method of classification algorithms for crime prediction
by: Babakura, Abba, et al.
Published: (2014)
by: Babakura, Abba, et al.
Published: (2014)
Crime rate prediction using machine learning
by: Chee, Man Hang
Published: (2022)
by: Chee, Man Hang
Published: (2022)
Towards green frameworks for digital forensics investigation
by: Dehghantanha, Ali, et al.
Published: (2013)
by: Dehghantanha, Ali, et al.
Published: (2013)
Conflict and Cyber-espionage: Ridding the World of Cyber War?
by: Ford, Shannon
Published: (2014)
by: Ford, Shannon
Published: (2014)
Towards data centric mobile security
by: Dehghantanha, Ali, et al.
Published: (2011)
by: Dehghantanha, Ali, et al.
Published: (2011)
A study on classification learning algorithms to predict crime status.
by: Shojaee, Somayeh, et al.
Published: (2013)
by: Shojaee, Somayeh, et al.
Published: (2013)
Leveraging transfer learning with deep learning for crime prediction
by: Butt, Umair Muneer, et al.
Published: (2024)
by: Butt, Umair Muneer, et al.
Published: (2024)
Multi-cyber framework for availability enhancement of cyber physical systems
by: Parvin, Sazia, et al.
Published: (2012)
by: Parvin, Sazia, et al.
Published: (2012)
Cyber hygiene during Covid-19 to avoid cyber attacks
by: Lee, Yvonne Yi Jin
Published: (2022)
by: Lee, Yvonne Yi Jin
Published: (2022)
A Prediction Algorithm to Enhance Grid Resilience Towards Cyber Attacks in WACS Applications
by: Musleh, M.A.S., et al.
Published: (2019)
by: Musleh, M.A.S., et al.
Published: (2019)
Forensics investigation challenges in cloud computing environments
by: Damshenas, Mohsen, et al.
Published: (2012)
by: Damshenas, Mohsen, et al.
Published: (2012)
A social network of crime : A review of the use of social networks for crime and the detection of crime
by: Drury, Brett, et al.
Published: (2022)
by: Drury, Brett, et al.
Published: (2022)
Mapping Developmental Precursors of Cyber-Aggression: Trajectories of Risk Predict Perpetration and Victimization
by: Modecki, K., et al.
Published: (2013)
by: Modecki, K., et al.
Published: (2013)
Islam and the cyber world
by: Shuriye, Abdi Omar, et al.
Published: (2014)
by: Shuriye, Abdi Omar, et al.
Published: (2014)
Cyber law in Malaysia
by: Ibrahim, Azmuddin
Published: (2009)
by: Ibrahim, Azmuddin
Published: (2009)
Cyber Safety in Malaysia
by: Soon , Seng Thah
Published: (2017)
by: Soon , Seng Thah
Published: (2017)
Cyber Identity Theft
by: Roberts, Lynne
Published: (2009)
by: Roberts, Lynne
Published: (2009)
Cyber attacks analysis and mitigation with machine learning techniques in ICS SCADA systems
by: Mubarak, Sinil, et al.
Published: (2019)
by: Mubarak, Sinil, et al.
Published: (2019)
Crime
by: Wardrop, Joan
Published: (2003)
by: Wardrop, Joan
Published: (2003)
Down the cyber rabbit hole: whistleblowing as a means to fulfilling moral obligations in cyber space
by: Hazlina Shaik Md Noor Alam,
Published: (2020)
by: Hazlina Shaik Md Noor Alam,
Published: (2020)
War crimes, crime against humanity and genocide
by: Eishan Jan, Mohammad Naqib
Published: (2013)
by: Eishan Jan, Mohammad Naqib
Published: (2013)
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
A Dynamic Cyber Terrorism Framework
by: Rabiah, Ahmad, et al.
Published: (2012)
by: Rabiah, Ahmad, et al.
Published: (2012)
Interplay between cyber supply chain risk management practices and cyber security performance
by: Gani, Anisha Banu Dawood, et al.
Published: (2022)
by: Gani, Anisha Banu Dawood, et al.
Published: (2022)
Edge assisted crime prediction and evaluation framework for machine learning algorithms
by: Adhikary, Apurba, et al.
Published: (2022)
by: Adhikary, Apurba, et al.
Published: (2022)
Clustering Ensemble And Hybrid Of
Deep Learning For Spatio-Temporal
Crime Predictions
by: Butt, Umair Muneer
Published: (2024)
by: Butt, Umair Muneer
Published: (2024)
Determinants and practices towards cyber supply chain performance with cyber supply chain visibility as a mediator
by: Anisha Banu, Dawood Gani
Published: (2022)
by: Anisha Banu, Dawood Gani
Published: (2022)
Similar Items
-
A systematic literature review for topic detection in chat conversation for cyber-crime investigation
by: Husin, Norzihan, et al.
Published: (2014) -
An analysis method of forensic investigation for platform-as-a-service cloud storage services
by: Shaerpour, Kaveh
Published: (2016) -
A survey on digital forensics trends
by: Dehghantanha, Ali, et al.
Published: (2014) -
A survey on malware propagation, analysis, and detection
by: Damshenas, Mohsen, et al.
Published: (2013) -
Cyber warfare trends and future
by: Ganji, Majid, et al.
Published: (2013)