2018 International Conference on Computer, Communication, Chemical, Material and Electronic Engineering (IC4ME2) 2018
DOI: 10.1109/ic4me2.2018.8465618
|View full text |Cite
|
Sign up to set email alerts
|

Simplistic Approach to Detect Cybercrimes and Deter Cyber Criminals

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…However, in the cybersecurity domain, the dynamic nature of cybercrimes makes it difficult and challenging to detect and predict the threat probabilities and the cascading impact of cybercrimes in an evolving organization landscape (Morgan, 2020). Further, cybercrime happens through advanced communication devices utilizing Internet connections, which is challenging to detect the crime and identify the offenders (Ahmed et al, 2018). According to the 2021 Data Breach Investigation Report, ransomware played a significantly increased role in Malware associated breaches of about 61.2% concerning previous years (Verizon, 2021).…”
Section: Impart Cybercrime On Organizationsmentioning
confidence: 99%
See 2 more Smart Citations
“…However, in the cybersecurity domain, the dynamic nature of cybercrimes makes it difficult and challenging to detect and predict the threat probabilities and the cascading impact of cybercrimes in an evolving organization landscape (Morgan, 2020). Further, cybercrime happens through advanced communication devices utilizing Internet connections, which is challenging to detect the crime and identify the offenders (Ahmed et al, 2018). According to the 2021 Data Breach Investigation Report, ransomware played a significantly increased role in Malware associated breaches of about 61.2% concerning previous years (Verizon, 2021).…”
Section: Impart Cybercrime On Organizationsmentioning
confidence: 99%
“…Their work focused on subjects either part of victimization by cybercrimes (Sattar et al, 2018). Ahmed et al (2018) proposed a framework for automatic and manual techniques to detect cybercrime and charge the offender with proof (Ahmed et al, 2018). Furthermore, Bissell et al (2022) explored what ultimately sets cybersecurity leaders apart in aiding and combating cybercrimes.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Then, a visual similarity-based technique was used to identify the legitimacy of URL via finding the most similar scores either it is legitimate or suspicious URLs. Another researchers used biometric techniques to defend cyber crimes such as Ahmed et al in [103] proposed an approach to be applied in Bangladesh to detect cybercrimes over the Internet. The new framework requires each Internet's user to register a national ID and password to gain access to the Internet, and foreigners can gain access using their visa's number.…”
Section: G Cybercrime Detection Using Other Techniquesmentioning
confidence: 99%
“…Although technologies and the Internet make life easier, they have been used for harmful purposes. Cybersecurity crimes impact society [2] since these crimes occur through modern communication devices using internet connections. The actors who cause a cybercrime are called attackers, and they are different kinds and have multiple goals; one of those kinds is APT Attacks.…”
Section: Introductionmentioning
confidence: 99%