2019
DOI: 10.1007/978-981-13-3600-3_18
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Intelligence Alternatives to Offset Online Sedition by in-Website Image Analysis Through WebCrawler Cyberforensics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…(106), Teaching and Non-Teaching Faculty (88) of the JNTUH University are registrants. It is a big data crime with the degree of crime being nearly 16,112 (=2 x 2014 x 4) and the Table 1 shows the brief figurative details of cybercrimes related to our case study and illustrates the measure of 'degree of cybercrime' [24]. In spite of relentless efforts made by the author through the complaints to JNTUH V.C.…”
Section: Introductionmentioning
confidence: 97%
“…(106), Teaching and Non-Teaching Faculty (88) of the JNTUH University are registrants. It is a big data crime with the degree of crime being nearly 16,112 (=2 x 2014 x 4) and the Table 1 shows the brief figurative details of cybercrimes related to our case study and illustrates the measure of 'degree of cybercrime' [24]. In spite of relentless efforts made by the author through the complaints to JNTUH V.C.…”
Section: Introductionmentioning
confidence: 97%
“…Data thieves in cyberspace can quickly gain access to sensitive information by targeting a specific location (Sitorus & Tannady, 2021). Micro-destructive phases, such as disagreements between several parties, can easily snowball into macro-destructive stages, threatening national security worldwide (Santhoshi et al, 2019).…”
Section: Introductionmentioning
confidence: 99%