Suggested Topics within your search.
Suggested Topics within your search.
Computer crime
19
Network security
12
Computer security
7
Crime
7
Cyber security
6
Cybersecurity
5
Information retrieval
5
Network hardware
5
Artificial intelligence
4
Internet of things
4
Crime & criminology
3
Digital and information technologies: Legal aspects
3
Electronic crime countermeasures
3
Entertainment & media law
3
Ethics & moral philosophy
3
Intrusion detection
3
Learning systems
3
Privacy & data protection
3
Authentication
2
Coding theory & cryptology
2
Coding theory and cryptology
2
Communication wireless network
2
Communications networks
2
Computer networking and communications
2
Convolutional neural networks
2
Copyright infringement
2
Copyrights
2
Cybe security for smart city
2
Deep learning
2
Digital forensics
2
-
201Published 2020Subjects: “...computer crime...”
Open Access: DOAB: description of the publication
Open Access: DOAB, download the publication
eBook -
202Published 2022Subjects: “...computer crime...”
Open Access: DOAB: description of the publication
Open Access: DOAB, download the publication
eBook -
203by 林煒翔“...碩士 === 中央警察大學 === 警政研究所 === 86 === Computer crime has become one of the new patten of crimes...”
Published 1998
Get full text
Others -
204“... access and identity theft. Firstly, we will have an overview of computer crime legislation and what...”
Get full text
Others -
205“... crime in theories, finishing the opinion of our theory and amending the law, and introduces the computer...”
Get full text
Others -
206“... or technique of computer crime will continently have innovation or evolution. The harm and impact caused...”
Get full text
Others -
207by Rojas Parra, Jaime Hernán“... of existing criminal law and force, identification of established computer crime, selection of computer crime...”
Published 2016-12-01
Get full text
Article -
208“... computer crime and its evidence collection in our Criminal Laws and Criminal Procedure Laws. Due to its...”
Get full text
Others -
209by Janýšková, Zuzana“...INTERNET AND COMPUTER CRIME (SUMMARY) The purpose of this thesis is to provide an introduction...”
Published 2010
Get full text
Dissertation -
210“..., the result of Computer Crime would cause damages in EMR to different extent. Meanwhile, even though any...”
Get full text
Others -
211by Siniša Franjić“...Computer crime is a form of criminal behavior in which the use of computer technology...”
Published 2020-10-01
Get full text
Article -
212“...%) of these exceeding 1 Gbps[1]. In addition, under the CSI (Computer Crime and Security Survey) survey[2] that DDoS...”
Get full text
Others -
213
-
214“...碩士 === 大同大學 === 資訊經營學系(所) === 95 === With the rapid development of Internet, computer crime happens...”
Get full text
Others -
215“... crimes? In computer crime, it will be computer forensics to understand crime and find criminal. About...”
Get full text
Others -
216“... security. Many countries currently plan to develop dedicated computer crime units; training professionals...”
Get full text
Others -
217“... crime. Computer crime will leave traces of criminal activity, so it is necessary to analyze...”
Get full text
Article -
218by Johansen, Marie Kristin“... and secure infrastructure for the organizations. The Australian Computer Crime Surveys presents four...”
Published 2007
Get full text
Others -
219“...碩士 === 國立中山大學 === 資訊管理學系 === 87 === According to a computer crime and security survey from FBI...”
Get full text
Others -
220“..., the characteristics of fraud, an effort to minimize fraud through prevention, detection, investigation, computer crime...”
Get full text
Article