Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cybercrime
biblio
Criminal Profiling in Digital Forensics: Assumptions, Challenges and Probable Solution
Submitted by aekwall on Wed, 05/08/2019 - 9:42am
Human behavior
tools
Stakeholders
Scalability
resilience
pubcrawl
probable solution
Metrics
investigation
Internet technologies
internet
information forensics
Complexity theory
Digital Forensics
data privacy
Cyberspace
cybercriminals
cybercrime investigations
Cybercrime
cyber-scene
cyber scene
criminal profiling
Computer crime
biblio
Crisis and Collective Problem Solving in Dark Web: An Exploration of a Black Hat Forum
Submitted by grigby1 on Wed, 09/12/2018 - 11:16am
Collective Problem Solving
Crisis Social Interaction
Cybercrime
dark web
darknet
darkweb
Hidden Organization
Human behavior
Human Factors
pubcrawl
virtual organization
biblio
A First Estimation of the Proportion of Cybercriminal Entities in the Bitcoin Ecosystem Using Supervised Machine Learning
Submitted by grigby1 on Mon, 03/05/2018 - 1:14pm
Public key
learning (artificial intelligence)
machine learning
malware
Metrics
pattern classification
Peer-to-peer computing
peer-to-peer payment system
proportion estimation
pubcrawl
illicit activities
Ransomware
resilience
Resiliency
security of data
supervised learning
supervised learning classifiers
supervised machine learning
uncategorised observations
Cybercrime
bitcoin
Bitcoin ecosystem
Bitcoin transactions
blockchain
composability
Computer crime
cryptocurrency
cyber-criminal entities
Bagging classifiers
cybercrime-related categories
cybercriminal entities
Ecosystem
Ecosystems
financial data processing
Gradient Boosting classifiers
gradient methods
illegal goods trading
biblio
Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin
Submitted by grigby1 on Fri, 11/03/2017 - 11:27am
pubcrawl
financial data processing
financial infrastructure
Human behavior
Metrics
Online banking
online fora
privacy
Protocols
erratic cybercrime landscape
Public key
ransom payments
Ransomware
reddit
Resiliency
security
sheep marketplace scam
threat intelligence
Cryptography
bitcoin
Bitcoin ecosystem
Bitcoin Fog
Bitcoin services
BitcoinTalk
BTC-e
composability
Computer crime
auxiliary information
CryptoLocker
CryptoLocker economy
CryptoLocker operation
Cryptolocker ransoms
Cybercrime
cybercrimes
decentralized cryptographic currency
Electronic mail
biblio
Hackers topology matter geography: Mapping the dynamics of repeated system trespassing events networks
Submitted by grigby1 on Wed, 03/08/2017 - 2:38pm
SNA technique
Honey-pots network
Hot-spots
internet
IP networks
network topology
pubcrawl170114
repeated system trespassing event network dynamics mapping
SNA
hacking spatial context
social network analysis technique
social networking (online)
spatial attributes
system trespassers
topological positions
Topology
victimized computers
attacker behavior
hacking patterns
hacking network topology
Hacking
hackers topology
Geography
geographic position
Cyberspace Policies
Cybersecurity
Cybercrime
Computers
computer networks
Computer hacking
Computer crime
brute force attacks
BFA
biblio
Mitigating Circumstances in Cybercrime: A Position Paper
Submitted by grigby1 on Tue, 03/07/2017 - 1:40pm
Media
warning messages
user cyber behaviour
software features
software engineering
Software
social responsibility
pubcrawl170109
psychology
mitigating circumstances
Mental disorders
circumstance mitigation
law aspect
irrational unconscious actions
interrelation analysis
Digital Forensics
Decision Making
cyberspace design
Cyberspace
Cybercrime
cyber psychology
Computer crime
biblio
A model for the design of next generation e-supply chain digital forensic readiness tools
Submitted by grigby1 on Tue, 03/07/2017 - 1:36pm
Filtering
trading partners
supply chain management
Software
pubcrawl170109
Next generation networking
network forensics
Monitoring tools
Monitoring
internet
information and communications technology
ICT
Forensics domains
Business
eSC environment
electronic supply chain
electronic commerce
e-Supply Chains (eSCs)
e-supply chain
Digital Forensics
digital forensic readiness tools
Digital forensic readiness (DFR)
Digital forensic Investigation (DFI)
Digital forensic data analysis tools
Cybercrime
cyber-crime
biblio
A Digital Triage Forensics framework of Window malware forensic toolkit: Based on ISO}/IEC 27037:2012
Submitted by grigby1 on Tue, 03/07/2017 - 1:31pm
DTF methodologies
Window malware forensic toolkit
pubcrawl170109
operating systems (computers)
malware forensics
malware
ISO/IEC 27037:2012
ISO/IEC 27037
ISO standards
invasive software
internet
IEC standards
Hacker
Computer crime
digital triage forensics framework
digital triage forensics
Digital Forensics
digital forensic
digital evidence handling
data leakage
Cybercrime
cyber security incident
critical analysis
crime scene investigation
Computers
biblio
"Discarded hard disks ??? A treasure trove for cybercriminals: A case study of recovered sensitive data from a discarded hard disk"
Submitted by abfox on Tue, 02/14/2017 - 12:25pm
security threats
malware
Media
Organizations
pubcrawl170101
reconnaissance activities
recovered sensitive data
Security and Privacy Awareness
security controls
malicious link
sensitive-personal organizational data
social network analysis
Software
Spear-phishing
stolen storage devices
Trust management
unsolicited e-mail
e-mail credibility
background information
Cybercrime
cybercriminals
Data protection
data recovery
Digital Forensics
discarded hard disks
discarded storage devices
advanced persistent threat
Electronic mail
hard discs
Hard disks
invasive software
malicious activities
malicious actors
malicious attachment
biblio
Assuming a State of Compromise: A Best Practise Approach for SMEs on Incident Response Management
Submitted by BrandonB on Wed, 05/06/2015 - 10:39am
best practices
Companies
Computer crime
Cybercrime
economic feasibility
enterprise IT security experts
Forensics
Incident Response
incident response management
IT security
malware
remediation
small and medium sized enterprises
small-to-medium enterprises
SME
« first
‹ previous
1
2
3
4
next ›
last »